Cloud governance is not hard
Mobile security for SIC 2012
Securing mobile population for White Hats
Qualys Webex 24 June 2008
Federation For The Cloud Opportunities For A Single Identity
Cloud security and security architecture
Security models for security architecture
Mobile security summit - 10 mobile risks
Encryption in the Cloud - BrightTalk Data Security Summit 2013
Meaningfull security metrics
Secure your cloud applications by building solid foundations with enterprise (security) architecture
2012 10 cloud security architecture
CAMM presentation for Cyber Security Gas and Oil june 2011
Camm Presentation E Crime June 2011
Mobile phone as Trusted identity assistant
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Request tracker pro OPF Karvina 2009
C-Level tools for Cloud security
Practical application of information security models