ºÝºÝߣshows by User: BahtiyarBircan / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: BahtiyarBircan / Tue, 13 Nov 2018 11:25:23 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: BahtiyarBircan Internet of Things (IoT) Security - Part 1 /slideshow/internet-of-things-iot-security-part-1/122891803 iotsecuritypart1-181113112523
Presentation abou internet of things , IoT architecture, IoT vulnerabilities, recent attacks to IoT systems. ]]>

Presentation abou internet of things , IoT architecture, IoT vulnerabilities, recent attacks to IoT systems. ]]>
Tue, 13 Nov 2018 11:25:23 GMT /slideshow/internet-of-things-iot-security-part-1/122891803 BahtiyarBircan@slideshare.net(BahtiyarBircan) Internet of Things (IoT) Security - Part 1 BahtiyarBircan Presentation abou internet of things , IoT architecture, IoT vulnerabilities, recent attacks to IoT systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iotsecuritypart1-181113112523-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation abou internet of things , IoT architecture, IoT vulnerabilities, recent attacks to IoT systems.
Internet of Things (IoT) Security - Part 1 from Bahtiyar Bircan
]]>
213 1 https://cdn.slidesharecdn.com/ss_thumbnails/iotsecuritypart1-181113112523-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
PwnPhone - Cepteki Ninja /slideshow/pwnphone-cepteki-ninja/54469393 pwnphone-151028095616-lva1-app6891
PwnPhone Cepteki Ninja - OWASP-TR Mobile Security Summit , Istanbul 14.10.2015 ]]>

PwnPhone Cepteki Ninja - OWASP-TR Mobile Security Summit , Istanbul 14.10.2015 ]]>
Wed, 28 Oct 2015 09:56:16 GMT /slideshow/pwnphone-cepteki-ninja/54469393 BahtiyarBircan@slideshare.net(BahtiyarBircan) PwnPhone - Cepteki Ninja BahtiyarBircan PwnPhone Cepteki Ninja - OWASP-TR Mobile Security Summit , Istanbul 14.10.2015 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pwnphone-151028095616-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> PwnPhone Cepteki Ninja - OWASP-TR Mobile Security Summit , Istanbul 14.10.2015
PwnPhone - Cepteki Ninja from Bahtiyar Bircan
]]>
654 5 https://cdn.slidesharecdn.com/ss_thumbnails/pwnphone-151028095616-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Heybe Pentest Automation Toolkit - Sec4U /slideshow/heybe-pentest-automation-toolkit-sec4u/54469281 heybe-151028095259-lva1-app6892
Heybe Pentest Automation Toolkit - Sec4u Konferansi (sec4u.org). 24.10.2015 Ä°stanbul ]]>

Heybe Pentest Automation Toolkit - Sec4u Konferansi (sec4u.org). 24.10.2015 Ä°stanbul ]]>
Wed, 28 Oct 2015 09:52:59 GMT /slideshow/heybe-pentest-automation-toolkit-sec4u/54469281 BahtiyarBircan@slideshare.net(BahtiyarBircan) Heybe Pentest Automation Toolkit - Sec4U BahtiyarBircan Heybe Pentest Automation Toolkit - Sec4u Konferansi (sec4u.org). 24.10.2015 Ä°stanbul <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/heybe-151028095259-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Heybe Pentest Automation Toolkit - Sec4u Konferansi (sec4u.org). 24.10.2015 Ä°stanbul
Heybe Pentest Automation Toolkit - Sec4U from Bahtiyar Bircan
]]>
897 8 https://cdn.slidesharecdn.com/ss_thumbnails/heybe-151028095259-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Heybe Pentest Automation Toolkit - BlackHat USA 2015 /slideshow/heybe-pentest-automation-toolkit-blackhat-usa-2015/54468884 heybev-151028094221-lva1-app6891
Heybe Penetration Testing Automation toolkit. Presentation from BlackHat USA 2015 Arsenal ]]>

Heybe Penetration Testing Automation toolkit. Presentation from BlackHat USA 2015 Arsenal ]]>
Wed, 28 Oct 2015 09:42:21 GMT /slideshow/heybe-pentest-automation-toolkit-blackhat-usa-2015/54468884 BahtiyarBircan@slideshare.net(BahtiyarBircan) Heybe Pentest Automation Toolkit - BlackHat USA 2015 BahtiyarBircan Heybe Penetration Testing Automation toolkit. Presentation from BlackHat USA 2015 Arsenal <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/heybev-151028094221-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Heybe Penetration Testing Automation toolkit. Presentation from BlackHat USA 2015 Arsenal
Heybe Pentest Automation Toolkit - BlackHat USA 2015 from Bahtiyar Bircan
]]>
1358 6 https://cdn.slidesharecdn.com/ss_thumbnails/heybev-151028094221-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cloud Computing v.s. Cyber Security /slideshow/cloud-computing-vs-cyber-security/50002340 bahtiyar-150630120853-lva1-app6891
This presentation surveys relation between cloud computing and cyber security. Cloud computing is one of trends enabling technology in all areas of life. This includes cyber security. Presentation review relationship of cyber security and cloud in context of cyber defense and cyber offense. Last section is dedicated to experiment how easy it is to conduct cyber attack using cloud, completely anonymously. Presentation was first given at NATO IST-125 Panel meeting, METU,Ankara TURKIYE 2015.06.11]]>

This presentation surveys relation between cloud computing and cyber security. Cloud computing is one of trends enabling technology in all areas of life. This includes cyber security. Presentation review relationship of cyber security and cloud in context of cyber defense and cyber offense. Last section is dedicated to experiment how easy it is to conduct cyber attack using cloud, completely anonymously. Presentation was first given at NATO IST-125 Panel meeting, METU,Ankara TURKIYE 2015.06.11]]>
Tue, 30 Jun 2015 12:08:53 GMT /slideshow/cloud-computing-vs-cyber-security/50002340 BahtiyarBircan@slideshare.net(BahtiyarBircan) Cloud Computing v.s. Cyber Security BahtiyarBircan This presentation surveys relation between cloud computing and cyber security. Cloud computing is one of trends enabling technology in all areas of life. This includes cyber security. Presentation review relationship of cyber security and cloud in context of cyber defense and cyber offense. Last section is dedicated to experiment how easy it is to conduct cyber attack using cloud, completely anonymously. Presentation was first given at NATO IST-125 Panel meeting, METU,Ankara TURKIYE 2015.06.11 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bahtiyar-150630120853-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation surveys relation between cloud computing and cyber security. Cloud computing is one of trends enabling technology in all areas of life. This includes cyber security. Presentation review relationship of cyber security and cloud in context of cyber defense and cyber offense. Last section is dedicated to experiment how easy it is to conduct cyber attack using cloud, completely anonymously. Presentation was first given at NATO IST-125 Panel meeting, METU,Ankara TURKIYE 2015.06.11
Cloud Computing v.s. Cyber Security from Bahtiyar Bircan
]]>
5786 10 https://cdn.slidesharecdn.com/ss_thumbnails/bahtiyar-150630120853-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-BahtiyarBircan-48x48.jpg?cb=1588064948 With 16-year technical experience in cyber security and information security and experience of having contributed to the national cyber security studies of Turkey. I started my business career in the early years of cyber security. Initially, I got involved in technical areas and took responsibilities in: - design, implementation and security of enterprise networks, - penetration tests and security audits, - computer forensics, - information security risk analysis and vulnerability assessments, - ISO 27001 based Information Security Management System projects, - trainings on security administration and information security management. I then took place at almost every stage of national ... https://cdn.slidesharecdn.com/ss_thumbnails/iotsecuritypart1-181113112523-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/internet-of-things-iot-security-part-1/122891803 Internet of Things (Io... https://cdn.slidesharecdn.com/ss_thumbnails/pwnphone-151028095616-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/pwnphone-cepteki-ninja/54469393 PwnPhone - Cepteki Ninja https://cdn.slidesharecdn.com/ss_thumbnails/heybe-151028095259-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/heybe-pentest-automation-toolkit-sec4u/54469281 Heybe Pentest Automati...