­

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Blackhat 2010 Policy Privacy Deterrence and Cyber War Panel Part

July 23, 2012 Author: Category: Greg's Blog

View full post on The Cyber Wars

read more

Blackhat 2010 Policy Privacy Deterrence and Cyber War Panel Part 00

July 23, 2012 Author: Category: Greg's Blog

View full post on The Cyber Wars

read more

DEFCON 18: Live Fire Exercise: Baltic Cyber Shield 2010 1/3

July 22, 2012 Author: Category: Greg's Blog

Speaker: Kenneth Geers In May, 2010, the Cooperative Cyber Defence Centre of Excellence in Estonia and the Swedish National Defence College hosted the Baltic Cyber Shield (BCS) international cyber defense exercise (CDX). For two days, six Blue Teams from northern […] ↓ Read the rest of this entry… View full…

read more

Iranian Star 2010 18 years old

July 21, 2012 Author: Category: Greg's Blog

Me and my cousin in Iran / Yazd. We was in Dakhme. Is an old persian cemetary. He sang for me a very old persian song. Summer 2006 View full post on The Cyber Wars

read more

Black Hat USA 2010: Cyber war:Are we at war? And if we are, how should we fight it? 5/5

July 21, 2012 Author: Category: Greg's Blog

Clip 5/5 Speaker: General (Ret.) Michael V. Hayden It appears that no contemporary issue is more discussed and less understood than “cyber war.” Former Director of National Intelligence Mike McConnell says that the war is underway. Howard Schmidt, White House […] ↓ Read the rest of this entry… View full…

read more

CBI site including 270+ Indian Websites hacked by Pakistani Group HEX786 2010

July 20, 2012 Author: Category: Greg's Blog

CBI site including 270+ Indian Websites hacked by Pakistani Group HEX786 Is it the beginning of cyber war? On 26th November 2010, Indian hackers called “Indian Cyber Army” hacked 40 major government websites of Pakistan by entering into the root […] ↓ Read the rest of this entry… View full…

read more

RSA Conference 2010 – 2010 Cyber Security Trends and Future Cyber Security Disruptors

July 19, 2012 Author: Category: Greg's Blog

Richard Howard will discuss current cyber security trends identified in 2009 and manifesting in 2010 from Cyber Crime, Cyber War, Cyber Espionage and Cyber Terrorism. He will then look to the horizon to identify some potential Cyber Security Disruptors; ideas […] ↓ Read the rest of this entry… View full…

read more

Black Hat USA 2010: Cyber war:Are we at war? And if we are, how should we fight it? 4/5

July 17, 2012 Author: Category: Greg's Blog

Clip 4/5 Speaker: General (Ret.) Michael V. Hayden It appears that no contemporary issue is more discussed and less understood than “cyber war.” Former Director of National Intelligence Mike McConnell says that the war is underway. Howard Schmidt, White House […] ↓ Read the rest of this entry… View full…

read more

Black Hat USA 2010: Cyber war:Are we at war? And if we are, how should we fight it? 3/5

July 17, 2012 Author: Category: Greg's Blog

Clip 3/5 Speaker: General (Ret.) Michael V. Hayden It appears that no contemporary issue is more discussed and less understood than “cyber war.” Former Director of National Intelligence Mike McConnell says that the war is underway. Howard Schmidt, White House […] ↓ Read the rest of this entry… View full…

read more

Black Hat USA 2010: Cyber war:Are we at war? And if we are, how should we fight it? 1/5

July 16, 2012 Author: Category: Greg's Blog

Clip 1/5 Speaker: General (Ret.) Michael V. Hayden It appears that no contemporary issue is more discussed and less understood than “cyber war.” Former Director of National Intelligence Mike McConnell says that the war is underway. Howard Schmidt, White House […] ↓ Read the rest of this entry… View full…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved