Shreya Shree's Blog (57)

Hot Topics In Cyber Law 2017

Hot Topics In Cyber Law 2017 (RSA Conference 2017)

ABA Information Security leaders kick off Law Track with the annual expert panel on critical new issues. “Hot Topics” gives attendees a snapshot of new developments in law, public policy, regulation, court cases and legal framework for our industry. Focus on privacy and civil liberties, identity, cyber-conflict, IOT, standards, corporate structuring and…

Continue

Added by Shreya Shree on May 3, 2017 at 11:00am — No Comments

Hacking Exposed: The Adversary Oscars

Hacking Exposed: The Adversary Oscars (RSA Conference 2017)

Demos and mitigation strategies from real-world case studies of advanced intrusions like the hack of the Democratic National Committee and others that CrowdStrike has detected globally. The session will showcase demos of intrusion tradecraft of sophisticated nation-state adversaries from Russia, China and…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Hot Topics In Cyber Law 2017

Hot Topics In Cyber Law 2017 (RSA Conference 2017)

ABA Information Security leaders kick off Law Track with the annual expert panel on critical new issues. “Hot Topics” gives attendees a snapshot of new developments in law, public policy, regulation, court cases and legal framework for our industry. Focus on privacy and civil liberties, identity, cyber-conflict, IOT, standards, corporate structuring and…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Crown Jewels Risk Assessment: Cost Effective Risk Identification

Crown Jewels Risk Assessment: Cost Effective Risk Identification (RSA Conference 2017)

Enterprise security risk assessments are typically shallow or expensive due to the vastness of the systems and data. But a study on sensitive data found that the organization’s “crown jewels” (top 0.01% to 2.0% sensitive data) accounts for 70% of the value to the enterprise. This allows for a unique approach to…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

How Nation-States and Criminal Syndicates Use Exploits to Bypass Security

How Nation-States and Criminal Syndicates Use Exploits to Bypass Security (RSA Conference 2017)

Malware authors create millions of unique malware samples every year to bypass web filters and antivirus software. There are significant differences between exploit code written by a nation-state attacker and the code in exploit kits that abuse the same vulnerability. This talk will explain how nation-state…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Cybersecurity Roadmap: Global Healthcare Security Architecture

Cybersecurity Roadmap: Global Healthcare Security Architecture (RSA Conference 2017)

Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed the global security architecture and roadmap addressing security gaps by architecture domain and common security capability. This session will discuss the architecture framework, capability matrix, the architecture development…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

OSX Pirrit: Why You Should Care About Malicious Mac Adware

OSX Pirrit: Why You Should Care About Malicious Mac Adware (RSA Conference 2017)

Adware isn’t taken seriously, especially threats targeting Macs. But OSX Pirrit, which can obtain root access and has components found in malware, shows that adware can become a huge security issue. Amit Serper will explain how OSX Pirrit works, why security professionals may want to rethink how commodity threats are handled…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Hacking Exposed: The Adversary Oscars

Hacking Exposed: The Adversary Oscars (RSA Conference 2017)

Demos and mitigation strategies from real-world case studies of advanced intrusions like the hack of the Democratic National Committee and others that CrowdStrike has detected globally. The session will showcase demos of intrusion tradecraft of sophisticated nation-state adversaries from Russia, China and…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Top Five Secrets to Successfully Jumpstarting Your Cyber-Risk Program

Top Five Secrets to Successfully Jumpstarting Your Cyber-Risk Program (RSA Conference 2017)

Businesses like Autodesk understand that cyber-risk management is essential, but they often don’t know where to begin. Autodesk implemented a cyber-risk framework in six months by using Agile software development, risk modeling and risk quantification. This session will explore the company’s success secrets and offers…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Cloud Security Assessments: You're Doing It Wrong!

Cloud Security Assessments: You're Doing It Wrong! (RSA Conference)

Moving to the cloud was supposed to increase the speed of business, but progress grinds to a halt once the risk management team gets involved in vetting cloud service providers. Behind the scenes, customers flood cloud providers with lengthy, bespoke questionnaires trying to quantify business risk—which doesn’t scale. Hear best practices…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

What is needed in the Next Generation Cloud trusted platform?

What is needed in the Next Generation Cloud trusted platform? (RSA Conference)

The most important engineering pillar in the cloud security ecosystem is how you build a trusted platform. It is more than just 2FA and encrypting all data. We will walk through some next generation thinking in Google’s vNext cloud security pillar and how you should look at the cloud security stack layers to ensure you truly…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Top 10 talks for 'Cyber risk, governance, policies, metrics, insurance and frameworks' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Toward Distributed and Virtualized Enterprise Security

Toward Distributed and Virtualized Enterprise Security (RSA Conference 2017)

Architectural issues with perimeter protections will be shown to create exploitable vulnerabilities for enterprise security teams. A design approach leading toward distributed, virtualized support for cloud workloads with hyper-resiliency and flexible security policy support is shown. Provocative commentary on how such a…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Threat Modeling Demystified

Threat Modeling Demystified (RSA Conference 2017)

Most organizations require threat models. The industry has recommended threat modeling for years. What holds us back? Master security architect, author and teacher Brook Schoenfield will take participants through a threat model experience based upon years of teaching. Expect a kick start. Practitioners will increase understanding. Experts will gain insight for…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

A Field Guide to Insider Threat Helps Manage the Risk

A Field Guide to Insider Threat Helps Manage the Risk (RSA Conference 2017)

This session will provide a full characterization of insider threat types in a simple field guide with 60 separate threat vectors. Just as a field guide of birds helps narrow down species, our Insider Threat Field Guide identifies the primary ways insiders can harm your organization, informing your strategy and resource allocation for…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Developing useful metrics

Developing useful metrics (RSA Conference 2017)

It is critical to measure the right things in order to make better-informed management decisions, take appropriate actions and change behaviors. But how do managers figure out what those right things are? A measurement approach tied to strategic business objectives ensures that planning, budgeting and the allocation of operational resources are focused on…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Top 4 talks on 'Hacking and Exploit Analysis' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

The Malware Monetization Machine

The Malware Monetization Machine (RSA Conference 2017)

A new generation of Internet startups is focused on converting malware infections into revenue. Who are these new CEOs, what can we learn from their business models? No longer in the shadows of the dark web, they are businessmen scaling operations and driving revenue. This session will discuss how malware is being monetized as a sustainable business,…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? (RSA Conference 2017)

Cyber-insurance is quickly becoming one of the hottest selling products on the market and an ever-increasing variety is being offered to businesses. Did you know that a security breach caused by dry rot, acts of terrorism or a known vulnerability won’t pay out? After careful review of cyber-policies, you may find them to be fraudulent, a waste…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

Critical Hygiene for Preventing Major Breaches

Critical Hygiene for Preventing Major Breaches (RSA Conference 2017)

Microsoft's Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. Microsoft and the Center for Internet Security (CIS) will share step by step recommendations to defend against these attacks, including information on cybersecurity…

Continue

Added by Shreya Shree on May 3, 2017 at 10:30am — No Comments

 

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts