Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Security Awareness and Human Element at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669805263?profile=original

image courtesy: https://www.flickr.com/photos/lupuca/8720604364

1) Securing Today’s Online Kids

Speaker: Lance Spitzner@securethehuman )

Technology is an amazing enabler for kids today, but it also brings unique risks. This interactive talk will cover the top three risks facing kids online today, and what parents can do to help protect them. This talk is based on the experiences and lessons learned from numerous security professionals who are parents just like you.

>>Go To Presentation

8669805468?profile=original

2) AppSec Awareness: A Blueprint for Security Culture Change

Speaker: Christopher Romeo@edgeroute )

How does an individual change the application security culture of an organization? By deploying an application security awareness program with engaging content, humor and recognition. See the blueprint for how you can build an application security awareness program based on real life experience. Change the security DNA of everyone in your organization.

>>Go To Presentation

 

8669805662?profile=original

image courtesy: https://en.wikipedia.org/wiki/National_Computer_Security_Center

3) Proactive Measures to Mitigate Insider Threat

Speaker: Andrew Case@attrc )

The threat posed by rogue insiders affects every organization worldwide. The difficulties in balancing employees’ legitimate need to access corporate data along with the need to compartmentalize access are often in conflict. This presentation will walk through several real-world insider threat cases and discuss proactive measures that could have greatly mitigated the damage and losses.

>>Go To Presentation

 

8669804484?profile=original

image courtesy: https://de.wikipedia.org/wiki/Hacker

4) The Art of Hacking a Human   

Speaker: Zee Abdelnabi@infosec_17 )

This session will review security techniques on how to navigate different personalities using traditional hacking techniques. Determine what “operating system” they are running. What patches are in place? What vulnerabilities can you exploit? What configuration issues does this person have? Your results based off the hack will help you work with the different personalities revealed.

>>Go To Presentation

 

8669805080?profile=original

5) Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?

Speaker: William Adams ( @meritnetwork )

Cyber-exercises can be used to hone skills, build teams and practice procedures. With several different types of exercises available, which is the right type to achieve your objectives? Which is the right kind for the participants’ skill levels? Cyber-exercise expert Dr. Joe Adams explains the different types of existing exercises, how to create scenarios and how to get results from each event.

>>Go To Presentation

8669806263?profile=original

image courtesy: https://en.wikipedia.org/wiki/Anxiety

6) Using Behavioral Psychology and Science of Habit to Change User Behavior

Speaker: Bikash Barai ( @bikashbarai1 )

Why is it so hard to make users adopt security best practices? The answer lies in human psychology. In this talk the speaker shall explain the “Habit Cycle” and why habits are beyond the control of the conscious mind. The speaker shall deconstruct how habits are formed and the science behind the process. Why is it impossible to change habits? How can you replace old habits with new ones?

>>Go To Presentation

 

8669806299?profile=original

image courtesy: https://www.flickr.com/photos/hernanpc/7115374283

7) Securing the “Weakest Link”

Speaker: Adam Shostack ( @adamshostack )

Security professionals often call people “the weakest link.” We claim that they'll always make mistakes, however hard we try, and throw up our hands. But the simple truth is that we can help people do well at a wide variety of security tasks, and it’s easy to get started. Building on work in usable security and threat modeling, this session will give you actionable, proven ways to secure people.

>>Go To Presentation

 

8669806101?profile=original

image courtesy: https://www.flickr.com/photos/97481684@N08/14096568717

8) People-Centric Security: Transform Culture, Reduce Risk, Drive Success 

Speaker: Lance Hayden@hay_lance ), Masha Sedova@modMasha )

This session links security culture and program performance, providing tools and guidance that will enable attendees to measure, manage and transform their own organizations’ security culture. Cases studies will be reviewed, and attendees will receive access to proven models, frameworks and tools for measurably improving the cultural maturity and behavioral reliability of their security program.

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)