By proceeding, you agree to our Terms of Use and Privacy Policy.
Information Security Governance Risk and Compliance Threat Modeling Secure Development Information Policy We understand these We understand how important they are to your business We learn your business and how you use information We assess your organization s tolerance for risk and then provide clear insight for your technology operations development and management Leviathan provides a broad set of information security services ranging from low level technical engineering to strategic business consulting We re as comfortable with fuzzing the firmware on your novel embedded device as we are with conducting a penetration test reviewing your source code or evaluating the security of your Internet scale application and our consultants speak to both engineers and boardrooms Our methodology is grounded in measurable facts and field tested by humans Our consultants are experts in their fields known around the world for their research Our clients range from the Fortune 50 to startups and from lawyers to banks to utilities Innovate fearlessly
30-03 June 2023
The conference focuses on hardware security, aiming to bring together professionals, researchers, and enthusiasts from the field to share their expertise and knowledge. The event will cover topics such as embedded systems security, firmware security,
Event Ended
USA
Paid
Santa Clara