Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669809094?profile=original

1) Transforming Security: Containers, Virtualization and Softwarization

Speaker: Dennis Moreau ( @DoctroMoreau )

This session will explore how we can leverage containers, network/endpoint virtualization technologies and virtualized security instrumentation, concurrently, to transformationally improve security visibility, security analytics, system resilience and actionable context, greatly increasing our ability to attest that systems will be secure and compliant in any state into which they may be driven.

>>Go To Presentation

8669808873?profile=original

2) Embedded Systems Security: Building a More Secure Device

Speaker: Randall Brooks ( @randallsbrooks )

Here's an overview of the presentation: What are common embedded systems?; What issues do they face?; Recommendations for securing embedded systems

>>Go To Presentation


8669811274?profile=original

3) Bring Your Own Internet of Things: BYO‐IoT

Speaker: Carsten Eiram ( @carsteneiram ), Jake Kouns ( @jkouns )

Here's an overview of the presentation: What is loT?; What's the Problem?; What's the Attack Surface?; IoT Security - Current State; Response and Actions

>>Go To Presentation


8669808085?profile=original

4) DevSecOps in Baby Steps

Speaker: Hart Rossman ( @HartDanger )

Here's an overview of the presentation: Getting to DevOps; DevOps to DevSecOps; Planning your Epics & Sprints; Use Cases & Examples

>>Go To Presentation

8669811692?profile=original

5) Lattice Cryptography

Speaker: Anamaria Costache; Joris Barrier

Somewhat homomorphic encryption schemes using lattices and lattice libraries are discussed. Topic 1: Which Ring-based Somewhat Homomorphic Encryption Scheme Is Best? Authors: Anamaria Costache and Nigel Smart Topic 2: NFLlib: NTT-based Fast Lattice Library Authors: Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian and Tancrède Lepoint

>>Go To Presentation

8669811495?profile=original

6) Hardware Attacks and Security

Speaker: Daisuke Moriyama; Peter Pessl

Physical side channel attacks and physical unclonable functions (PUFs) are discussed. Topic 1: Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability Authors: Peter Pessl and Stefan Mangard Topic 2: Towards a Unified Security Model for Physically Unclonable Functions Authors: Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi and Moti Yung

>>Go To Presentation


8669808871?profile=original

7) Integrating Cybersecurity into Supply Chain Risk Management

Speaker: Jon Boyens

Cyber–supply chain risks pose a new set of challenges for businesses (loss of critical IP, unwanted functionality in products) which jeopardize brand reputation and shareholder value. This session will present case study research from NIST on cutting-edge practices and tools that today’s industry leaders in supply chain risk management are deploying to secure their supply chains from end to end.

>>Go To Presentation

8669804085?profile=original

8) Braking the Connected Car: The Future of Vehicle Vulnerabilities

Speaker: Akshay Anand ( @iamakshayanand ); Karl Brauer ( @karlbrauer )

In this presentation, analysts from Kelley Blue Book’s Automotive Industry Insights will illustrate how the connected car is quickly becoming an unrestricted playground for cyberthreats and how the next generation of in-car technology will intensify already-present vehicle vulnerabilities.

>>Go To Presentation


8669808499?profile=original

9) Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device

Speaker: Nathan Lesser ( @natelsr )

Imagine being dependent on a wireless infusion pump to receive the correct dosage of life-supporting medication. Now imagine the implications, were that pump to be maliciously hacked. In this session learn more about how to successfully secure these medical devices, based on work being conducted at the National Cybersecurity Center of Excellence (NCCoE) with premier health care organizations.

>>Go To Presentation


8669812097?profile=original

10) A New Security Paradigm for IoT (Internet of Threats)

Speaker: Hadi Nahari ( @hadinahari )

All facets of computing have changed since the 1950s, except the security posture of our systems; nowhere is this more the case than in mobile and IoT. Some of our security foundations are outdated: chief among them “static” security, which assumes the threat landscape is static and predetermined. This session will describe the old static security paradigm and the new one: analytics-driven security.

>>Go To Presentation


8669812697?profile=original

11) What Is Next-Generation Endpoint Security and Why Do You Need It?

Speaker: Jon Oltsik ( @joltsik )

This session will clarify the definition of next-generation endpoint security and distinguish it from legacy antivirus software. It will also describe how next-generation endpoint security can help organizations improve incident prevention, detection and response.

>>Go To Presentation

8669813059?profile=original

12) Attacks on Critical Infrastructure: Insights from the “Big Board”

Speaker: Daniel Cohen ( @iFraudFighter ), Robert Griffin ( @RobtWesGriffin )

Targeted attacks on critical infrastructure continue to increase in number and severity. We’ll present the latest data on these attacks: What is their goal? What are the attacker strategies? How are attacks supported by the darknet? We’ll discuss banking threats discovered at the “Big Board” at the RSA Anti-Fraud Control Center and Smart Grid threat detection in the EU SPARKS project.

>>Go To Presentation

8669812256?profile=original

13) Security Advantages of Software-Defined Networking

Speaker: Edward Amoroso

Current practices using wide-area routing over Internet infrastructure decentralize the control of how information is transferred. Software-Defined Networking (SDN) centralizes network control functions, offering more holistic network security management and allowing for dynamic divisioning, multivendor end-to-end security and reduced dependence on the traditional perimeter approach.

>>Go To Presentation

8669813256?profile=original

14) Smart Megalopolises. How Safe and Reliable Is Your Data?

Speaker: Denis Legezo ( @legezo )

Road sensors which collect raw data for intelligent transport systems are hugely important, with key decisions around road improvement, traffic jam management and traffic light patterns based on the information they collect. Radars transmit this data to an operation center for detailed analysis, but can governments truly trust and rely on the data?

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)