Social Network For Security Executives: Help Make Right Cyber Security Decisions
(Read more: Top 5 Big Data Vulnerability Classes)
A fairly technical content, highlighting the major interesting hardware threats, main intentions behind attacks, the trust coefficient in places of misplaced trust, the 'less is more' philosophy application and also some tips for infosec selling.
The talk gives us an idea on the architectural front as to the most vulnerable areas and where caution is prime.
(Read more: Cyber Safety in Cars and Medical Devices)
What are the major OS threats that concern you as a CISO? Tell us in comments below.