Top 8 talks for 'Network Security, Cryptography, Encryption & Blockchain' from RSA Conference 2017 (USA)

 

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

1) Open Security Controller - Security  Orchestration for OpenStack

Speaker: Manish Dave, Tarun Vishwanathan

Open Security Controller enables orchestration of multiple security functions in an OpenStack DC. OSC integrates with multiple SDN controllers and Security VNFs to automate protection of DC resources.

>> Go to presentation

2) Hacking Blockchain

Speaker: Konstantinos Karagiannis

Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity management, verifiable records and digital assets such as stocks. Is the industry building new systems on a cryptographically weak foundation? What threats does blockchain face?

>> Go to presentation

3) IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud

Speaker: Emil Isaakian

In this technical deep dive, Emil Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MACSec/ESS. Additionally he’ll show use cases to show how to succesfully deploy MACSec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier Ethernet), LAN and cloud infrastructure.

>> Go to Presentation

4) Cybersecurity vs. Tokenization

Speaker: Jeff Stapleton, Sandra Lambert

Tokenization is the latest data protection method, but does it help or hinder cybersecurity—this is the current debate. This session will look at who, what, where, when, how and why of using tokens.

>> Go to presentation

5) Client side encryption without knowing  its limits is a ticking time bomb!

Speaker: Mohamed Quatar Research Institute

Cloud and mobile computing give room to an unprecedented level of access points into corporate data leaving you to rethink how to protect it. Client-side encryption is increasingly being used as a solution. While it solves the problem of unauthorized access, it is still in its infancy and has many limitations and pitfalls that IT practitioners should consider before embracing it.

>> Go to presentation

6) How Google Protects Its Corporate  Security Perimeter without Firewalls

Speaker: Heather Adkins, Rory Ward

The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its groundbreaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place, where it's headed and how you can apply this approach to your organization.

>> Go to presentation

7) Fighting Cybercrime Using the Blockchain

Speaker: Kathryn Haun, Jonathan Levin

Bitcoin is sometimes described as the “currency of criminals,” and we all see stories about how criminals use bitcoin to move money and extract ransoms. But did you know that law enforcement also uses the blockchain—bitcoin’s distributed, immutable, permanent record of transactions—to investigate cybercrime? Come learn more about how bitcoin’s underlying technology helps fight cybercrime

>> Go to presentation

8) The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection

Speaker: Dmitriy Ayrapetov

The dramatic rise in malicious code designed to evade detection, specifically from network sandboxes, caused industry analysts to suggest the deployment of multiple network sandboxes for the same network. Learn how to maximize protection from advanced persistent threats by using multiple security engines within the same sandbox and best practices to stop advanced malware including ransomware.

>> Go to presentation


9) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Views: 108

Comment

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts