Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

8669809487?profile=original

1) Your Sector Doesn’t Matter:  Achieving Effective Threat Prioritization

Speaker: John Hultquist, John Miller

Many organizations’ security functions determine what threats they care about based on what threats are known to be affecting their sector, or comparably simple criteria. In reality, this approach is poorly suited to dealing with the significant security issues of today. Malicious actors scope their victims based on multiple factors, and understanding these factors is essential to managing risk.

>> Go to presentation

8669810889?profile=original

2) Au Natural: Adventures in NLP  and Threat Intel

Speaker: Adam Meyers

In July 2016, Google released their Cloud Natural Language API; multilingual entity extraction sounded like a fun thing to play with and it was cheap. This led to a series of experiments to derive a usable prototype for NLP integration with threat intelligence. This presentation will explore the use of NLP in Threat Intel and demonstrates findings from its use against the Virus Total platform.

>> Go to presentation

8669808271?profile=original

3) Opening the Door to DoD Perspectives  on Cyber Threat Intelligence

Speaker: Ron Carback

Cyberthreats are growing in volume and variety. It is critical for the security industry to understand how to help DoD improve its cyber-intelligence. Defense Intelligence Officer for Cyber, Mr. Carback, will share DoD imperatives that will baseline your understanding of the actors, their intent and impact, the role of cyber-intelligence in DoD, and how we can partner together.

>> Go to presentation

8669802465?profile=original

4) Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team

Speakers: Todd Kight, Anthony Talamantes

With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber Operations.

>> Go to presentation

8669814077?profile=original

5) Weaponizing Intelligence: Interdiction in Today’s Threat Landscape

Speaker: Matthew Olney

The threat environment is evolving every single day. As adversaries find more efficient and effective ways of making money they will reinvest that money to create more advanced and evasive malware. Disrupting that economy is key. This talk will focus on moving from gathering threat intelligence toward providing consistent offensive threat interdiction.

>> Go to presentation

8669810084?profile=original

6) Intelligence-Led Security: Powering the Future of Cyber-Defense

Speaker: Marshall Heilman

A new class of intelligence-led security is powering the future of cyber-defense, driven by deeper and broader visibility into the attacker ecosystem. This session will look at how intelligence is influencing the development of security products/services and how defenses will benefit from the integration of data from across IT/security operations with insights on the evolving threat landscape.

>> Go to presentation

8669808085?profile=original

7) A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts

Speaker: Dan Plastina

Despite the positive advancements in machine learning and intelligence, security professionals remain overwhelmed. How is it that we keep wasting time and energy on analyzing and assembling the information presented by our supposedly “intelligent” solutions? This session will explore a conjoint approach that would help our industry climb out of the sea of data that is most certainly going to drown us.

>> Go to presentation

8669812277?profile=original


8) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


8669814668?profile=original

Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)