Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

 

8669810856?profile=original

1) Critical Hygiene for Preventing Major Breaches

Speakers : Tony Sager, Mark Simos, Jonathan Trull

Microsoft's Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. Microsoft and the Center for Internet Security (CIS) will share step by step recommendations to defend against these attacks, including information on cybersecurity solutions that Microsoft has open-sourced to protect our customers.

>>Go To Presentation

8669804295?profile=original

2) Developing useful metrics

Speakers : David Tobar, Lisa Young

It is critical to measure the right things in order to make better-informed management decisions, take appropriate actions and change behaviors. But how do managers figure out what those right things are? A measurement approach tied to strategic business objectives ensures that planning, budgeting and the allocation of operational resources are focused on what matters to the organization.

>> Go To Presentation

8669808271?profile=original

3) Top Five Secrets to Successfully Jumpstarting Your Cyber-Risk Program

Speakers : Husam Brohi, Chris Houlder

Businesses like Autodesk understand that cyber-risk management is essential, but they often don’t know where to begin. Autodesk implemented a cyber-risk framework in six months by using Agile software development, risk modeling and risk quantification. This session will explore the company’s success secrets and offers advice on how security leaders can jumpstart their cyber-risk program.

>>Go To Presentation

8669806080?profile=original

4) Crown Jewels Risk Assessment: Cost Effective Risk Identification

Speaker : Doug Landoll

Enterprise security risk assessments are typically shallow or expensive due to the vastness of the systems and data. But a study on sensitive data found that the organization’s “crown jewels” (top 0.01% to 2.0% sensitive data) accounts for 70% of the value to the enterprise. This allows for a unique approach to performing a security risk assessment—namely the crown jewels approach.

>>Go To Presentation

8669804484?profile=original

5) A Field Guide to Insider Threat Helps Manage the Risk

Speaker : Tim Casey

This session will provide a full characterization of insider threat types in a simple field guide with 60 separate threat vectors. Just as a field guide of birds helps narrow down species, our Insider Threat Field Guide identifies the primary ways insiders can harm your organization, informing your strategy and resource allocation for more effective insider risk management.

>>Go To Presentation

8669805468?profile=original

6) Threat Modeling Demystified

Speaker : Brook S.E.Schoenfield

Most organizations require threat models. The industry has recommended threat modeling for years. What holds us back? Master security architect, author and teacher Brook Schoenfield will take participants through a threat model experience based upon years of teaching. Expect a kick start. Practitioners will increase understanding. Experts will gain insight for teaching and programs.

>> Go To Presentation

8669802465?profile=original

7) Hot Topics In Cyber Law 2017

Speakers : Richard Abbott, Thomas Smedinghoff, Lucy Thomson

ABA Information Security leaders kick off Law Track with the annual expert panel on critical new issues. “Hot Topics” gives attendees a snapshot of new developments in law, public policy, regulation, court cases and legal framework for our industry. Focus on privacy and civil liberties, identity, cyber-conflict, IOT, standards, corporate structuring and the international technology marketplace.

>> Go To Presentation

8669813698?profile=original

8) Cyber-Insurance: Fraud, Waste or Abuse?

Speakers : David Nathans

Cyber-insurance is quickly becoming one of the hottest selling products on the market and an ever-increasing variety is being offered to businesses. Did you know that a security breach caused by dry rot, acts of terrorism or a known vulnerability won’t pay out? After careful review of cyber-policies, you may find them to be fraudulent, a waste of money, abuse of power or the best thing ever.

>> Go To Presentation

8669805662?profile=original

9) Toward Distributed and Virtualized Enterprise Security

Speakers : Dr. Edward Amoroso

Architectural issues with perimeter protections will be shown to create exploitable vulnerabilities for enterprise security teams. A design approach leading toward distributed, virtualized support for cloud workloads with hyper-resiliency and flexible security policy support is shown. Provocative commentary on how such a security architecture applies to large networks such as the US Department of State is included.

>> Go To Presentation

8669808499?profile=original

10) Cybersecurity Roadmap: Global Healthcare Security Architecture

Speakers : Nick H. Yoo

Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed the global security architecture and roadmap addressing security gaps by architecture domain and common security capability. This session will discuss the architecture framework, capability matrix, the architecture development methodology and key deliverables.

>> Go To Presentation

 

8669812277?profile=original


11) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


8669814668?profile=original

Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)