Type of Security breach
|
Lockpicking |
10 |
|
Pins are Critical in Lock Picking
|
Lock Picking |
10 |
|
Cybersecurity jobs aren't always computer jobs
|
Cybersecurity Workforce |
40 |
|
OCRI vs OCR
|
I stand for something! |
6 |
|
How many cybersecurity jobs?
|
Cybersecurity Workforce |
25 |
|
Decode again but with what?
|
Cryptography |
61 |
|
It is the best
|
Conversions |
37 |
|
Speak the truth
|
Conversions |
28 |
|
Process Management
|
CLI |
15 |
|
Linux search
|
CLI |
15 |
|
Linux is awesome
|
CLI |
15 |
|
Linux file permissions
|
CLI |
15 |
|
File Manipulation
|
CLI |
15 |
|
File content
|
CLI |
15 |
|
Disk usage
|
CLI |
15 |
|
Balancing Security
|
CIA Triad |
12 |
|
Cincinnati ISSA
|
Acronyms & Initialisms |
10 |
|
Breakout of Crime
|
Breakouts |
36 |
|
Attendees like math
|
Attendee Question |
4 |
|
What is the domain?
|
Active Directory |
114 |
|
Who's the Boss?
|
Acronyms & Initialisms |
11 |
|
It's all mine
|
Acronyms & Initialisms |
9 |
|