Top Myths of IPV-6 Security Posted by CISO Platform on December 11, 2013 at 2:19am Views: 125 Get Embed Code <iframe width="1" height="1" src="https://www.youtube.com/embed/28Bq_3PCZxg" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe> Tags: conference, annual_summit_2013 Presented by Fernando Gont at CISO Platform Annual Summit, 2013. Fernando specializes in the field of communications protocols security, working for private ... You need to be a member of CISO Platform to add comments! Join CISO Platform Comments This reply was deleted. E-mail me when people leave their comments – Follow Popular Videos Attacks on Smart TV and Connected Smart Devices (Best Of The World) The Dark Future of Privacy By Menny Barzilay (Ex CISO, Israeli Defense) (Keynote) How To Actually Grow Your SOC? - Anton Chuvakin Why Is Gartner Talking About External Attack Surface Management (EASM)? Building a Security Organization Structure Keynote by Nandan Nilekani - India's Security Future at CISO Platform
Comments