cryptoaustralia / awesome-privacy-conferences
A curated list of upcoming privacy conferences
☆8Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-privacy-conferences
- Baseline organizational policies and practices☆10Updated 7 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 7 years ago
- a collection of teaching resources☆12Updated 6 years ago
- Replaced with Foreman + Puppet to not reinvent the wheel.☆9Updated 8 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated last year
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆68Updated 4 years ago
- A place to collect the different document templates for ROS☆61Updated 5 years ago
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- Maltego Transforms to Query Traffic Records☆33Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- activist.js is a drop-in library for resilience to network interference☆30Updated 2 years ago
- My learning guide for preparation of the CISSP exam☆13Updated 9 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆78Updated last month
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆51Updated 10 months ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 5 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- Qubes component: app-linux-pdf-converter☆52Updated last month
- security in a box - tools and tactics for your digital security☆19Updated 9 years ago
- Spam trap management☆23Updated 5 months ago
- A resource which illustrates how surveillance is being carried out around the world.☆18Updated 8 years ago
- ☆198Updated 8 years ago
- Legal, procedural and policies document templates for operating an IRT☆63Updated 8 months ago
- MindMaps for the CISSP certification☆31Updated 9 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆82Updated 4 years ago
- ☆37Updated 9 years ago