How Google Protects Its Corporate Security Perimeter without Firewalls (RSA Conference 2017)
The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its ground breaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place,…Continue
Cybersecurity vs. Tokenization (RSA Conference 2017)
Tokenization is the latest data protection method, but does it help or hinder cybersecurity-this is the current debate. This session will look at who, what, where, when, how and why of using tokens.
Hacking Blockchain (RSA Conference)
Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity management, verifiable records and digital assets such as stocks. Is the industry building new systems on a cryptographically…Continue
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud (RSA Conference 2017)
In this technical deep dive, Email Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MAC Sec/ESS. Additionally he'll show use cases to show how to successfully deploy MAC Sec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier…Continue