Social Network For CISO (Chief Information Security Officers)
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.
(Source: RSA Conference USA 2017)
1) Open Security Controller - Security Orchestration for OpenStack
Speaker: Manish Dave, Tarun Vishwanathan
Open Security Controller enables orchestration of multiple security functions in an OpenStack DC. OSC integrates with multiple SDN controllers and Security VNFs to automate protection of DC resources.
2) Hacking Blockchain
Speaker: Konstantinos Karagiannis
Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity management, verifiable records and digital assets such as stocks. Is the industry building new systems on a cryptographically weak foundation? What threats does blockchain face?
3) IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
Speaker: Emil Isaakian
In this technical deep dive, Emil Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MACSec/ESS. Additionally he’ll show use cases to show how to succesfully deploy MACSec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier Ethernet), LAN and cloud infrastructure.
4) Cybersecurity vs. Tokenization
Speaker: Jeff Stapleton, Sandra Lambert
Tokenization is the latest data protection method, but does it help or hinder cybersecurity—this is the current debate. This session will look at who, what, where, when, how and why of using tokens.
5) Client side encryption without knowing its limits is a ticking time bomb!
Speaker: Mohamed Quatar Research Institute
Cloud and mobile computing give room to an unprecedented level of access points into corporate data leaving you to rethink how to protect it. Client-side encryption is increasingly being used as a solution. While it solves the problem of unauthorized access, it is still in its infancy and has many limitations and pitfalls that IT practitioners should consider before embracing it.
6) How Google Protects Its Corporate Security Perimeter without Firewalls
Speaker: Heather Adkins, Rory Ward
The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its groundbreaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place, where it's headed and how you can apply this approach to your organization.
7) Fighting Cybercrime Using the Blockchain
Speaker: Kathryn Haun, Jonathan Levin
Bitcoin is sometimes described as the “currency of criminals,” and we all see stories about how criminals use bitcoin to move money and extract ransoms. But did you know that law enforcement also uses the blockchain—bitcoin’s distributed, immutable, permanent record of transactions—to investigate cybercrime? Come learn more about how bitcoin’s underlying technology helps fight cybercrime
8) The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection
Speaker: Dmitriy Ayrapetov
The dramatic rise in malicious code designed to evade detection, specifically from network sandboxes, caused industry analysts to suggest the deployment of multiple network sandboxes for the same network. Learn how to maximize protection from advanced persistent threats by using multiple security engines within the same sandbox and best practices to stop advanced malware including ransomware.
Description: AI Assistant For Security Product Buying
FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).
Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.