Skip to content

CyberSymbiosis

The purpose of this site is to collect and share knowledge on human-machine relationship and promote it for the benefit of both.
Main navigation
  • Home
  • Contact
  • What is CyberSymbiosis?
  • About Viktor Polic, PhD, CISSP, CISA, CRISC

Presentation on Vulnerability Assessment: Latest Generation of Hybrid Vulnerability Scanners – CISO Summit Middle East, Dubai 2014

C C Read More

In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]

July 3, 2018 Publications, Talks

Talk on Data Owner’s Cloud Survival and Exit Strategies – Cloud Security Alliance EMEA Congress, Edinburgh 2013

C C Read More

I would like to dedicate this post to my friend and colleague Dr. Eduardo Gelbstein who sadly passed […]

July 1, 2018 Evolution of computers, Publications, Talks

Talk on creating a Security Coordination Center at CISO 360 Congress in Lisbon

C C Read More

For organizations with fragmented security operations, for example with one unit managing operations of perimeter network security another […]

June 26, 2018 Talks

My talk on Internet of Things (IoT) security at Webster University Geneva

C C Read More

On the 1st of June 2018 at Webster University in Geneva I talked about security of IoTs. From […]

June 3, 2018 Talks

Teaching at University: CSSS 2510 Cyber Attacks and Defense (2018)

C C Read More

Webster University undergraduate catalog description: The course provides students with insight on common cyber-attacks and the techniques for identifying, […]

May 30, 2018 Teaching at University

Teaching at University: CSSS 2410 Cybersecurity and Internet architecture (since 2017)

C C Read More

Webster University undergraduate catalog description: This course will introduce the student to the field of cybersecurity and Internet architecture. […]

May 29, 2018 Teaching at University

Teaching at Webster University: COSC 3410 Computer security (since 2003)

C C Read More

This course is designed for bachelor of science students with major in computer science.  Although level 3000 course […]

May 27, 2018 Teaching at University

Talking about privacy and the Internet of Things at Webster University Geneva

C C Read More

The week after official launch of the EU General Data Protection Regulation (GDPR) a conference on privacy and […]

May 24, 2018 Talks

Information value

C C Read More

It is difficult to perceive risks and opportunities related to information if we cannot estimate its value. In […]

May 14, 2018 Talks

THE FIRST 100 DAYS OF THE NEXT GENERATION CISO

C C Read More

The role of a Chief Information Security Officer (CISO) is not to manage technology, although information and communication […]

March 22, 2018 Talks

Posts navigation

Previous 1 2 3 Next
Blog at WordPress.com.
  • Home
  • Contact
Secondary navigation
  • LinkedIn
  • Twitter
  • Search

Begin typing your search above and press return to search. Press Esc to cancel.

CyberSymbiosis
Blog at WordPress.com.
  • Follow Following
    • CyberSymbiosis
    • Already have a WordPress.com account? Log in now.
    • CyberSymbiosis
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...