Internal Influence: A Sampling of Domestic Information Operations | CYBERWARCON 2019
Operation Ghost: The Dukes aren’t back - they never left! | CYBERWARCON 2019
Chimera | CYBERWARCON 2019
RedSourcing: Cyberwar On a Budget | CYBERWARCON 2019
Keynote - Andy Greenberg's Reflections on Sandworm | CYBERWARCON 2019
The Secret Life of Sandworms | CYBERWARCON 2019
The Disinformation Industry | CYBERWARCON 2019
Full-Spectrum Information Ops for Critical Infrastructure Attacks & Disruption | CYBERWARCON 2019
China’s Influence Campaign Targeting the Hong Kong Protests: What the Data... | CYBERWARCON 2019
Ch-Ch-Changes: The Arc of the CHOLLIMA’s and DPRK’s State-Driven Cyber Ecosystem | CYBERWARCON 2019
Your Persistent Friend: The Untold History of Iran’s Effectiveness in Using... | CYBERWARCON 2019
The Last Remaining Cover for Action | CYBERWARCON 2021
GreyEnergy: Beyond BlackEnergy and NotPetya
Unmasking UNC1151, the Ghost Behind Ghostwriter | CYBERWARCON 2021
Planes, Ships, and Satellites: Cyber in Warfare | CYBERWARCON 2021
Infosec 1930 - CYBERWARCON Keynote
Behind the Next Destructive Attack
Barely Whispering
An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen
Outsourcing Cyberwar