• 0:55 Information Assurance at Eastern Michigan University
  • 4:15 CYBERCRIME 2010 OPENER
  • 1:47 The Center at UAB - Fighting Cybercrime
  • 2:0 Cybercrime and effects on economy
  • 0:48 Cyber Crime Analysis
  • 9:22 ISACA CEO Ronald Hale: Free-for-All in Cyber Crime Not Just for the Banks
  • 3:21 Information Assurance
  • 54:43 2009-09-23 CERIAS - The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb...
  • 7:53 Center for Information Assurance
  • 10:27 Security Governance - Information Assurance Overview
  • 1:32 From Law Enforcement to Computer Forensics
  • 10:59 Information Assurance Student Group Promo Part 1
  • 2:17 Information Technology
  • 34:3 Software and Supply Chain Risk Management (SSCRM) Assurance Framework
  • 1:1:6 Cybersecurity & Hacking - The Mia Connect Power Chat
  • 1:1 Vigilance: Information Assurance
  • 58:8 2013 ISSA Intl Conference Keynote Eugene Spafford (Spaf) Exec Dir, CERIAS & Prof - Purdue University
  • 48:45 (Audio only) PANEL: Women in Information Security - moderated by Joan Goodchild
  • 42:55 ShmooCon 2014: Vehicle Forensics - The Data Beyond the Dashboard
  • 2:4 Benjamin - Information Assurance Grad Student
  • 2:0:8 DEFCON 16: Panel: Meet the Feds 2008
  • 8:37 Information Assurance Student Group Promo Part 2
  • 38:35 DEF CON 15 - Panel - Meet the Feds
  • 38:38 DEFCON 15: Panel 1: Meet the Fed
  • 1:1 Norton Cybercrime Index
  • 0:47 Cybersecurity - The Mia Connect Power Chat
  • 0:11 Information Assurance TV
  • 8:36 The Center
  • 8:0 Botnet Overview by Paul C Dwyer Security GRC & Cyber Crime Advisor
  • 42:52 S2 Ep.11: Women & Technology : The Gender Gap in Science & Tech
  • 19:14 2013 PI Meeting: Understanding and Disrupting the Economics of Cybercrime
  • 56:3 FEF Cybersecurity Solutions in Government August 2014
  • 2:1 National Cyber Security Policy Released
  • 0:57 Cybercrime - The Silent Epidemic
  • 30:52 Compliance, Data Security and Cybercrime - HackSurfer Hangout
  • 1:32:25 Cyber Security: The Africa's response to cyber security threats - Day 4 - 31 Oct 2013
  • 1:1:49 DEF CON 9 - Jim Christy - Meet the FED Panel
  • 23:59 RSA Conference 2011 - The Evolution of Software Security Assurance and its Relevance Today
  • 39:57 CryptoMail Rock&Roll - Manuel Cacitti
  • 18:10 State Sanctioned Hacking - The Elephant in the Room: Frank Heidt at TEDxMidwest
  • 1:18:22 Surveillance, Cyber Crime & Cyber Espionage
  • 1:43 Mobile Device Security App by Software Assurance, LLC
  • 55:48 Webcast - Looking Into 2015: The InfoSec Checklist
  • 12:16 Cyber Warfare - Cyber Crime - Paul C Dwyer - Part 1
  • 0:16 Master of Science in Systems Engineering and Management at UT Dallas - short version
  • 1:21 Cyber Risk Awareness and Data Protection Course - Executive IP
  • 8:51 2008 Pacific Rim Collegiate Cyber Defense - Part 1
  • 43:6 Global Cyber Threats Webinar Presented by KDDI America, Telehouse America & Seccuris
  • 0:48 Cyber Warfare Commercial - IWC
  • 1:37 Cyber threat assessments