Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

8669813879?profile=original


1) Lessons from a Recovering Runtime Application Self-Protection Addict

Speaker: Jacob West (@sfjacob)

This talk will detail knowledge gained from years spent building runtime application self-protection technology. RASP sounds like a silver bullet—security pixie dust that protects vulnerable code. But does it solve real problems? Who integrates and operates it? Is it fast enough? Accurate enough? Reliable enough? Will answering these questions change your thinking on RASP?

>>Go To Presentation

( Compare More: Discover & Compare RASP Products Click Here )

8669814055?profile=original


2) Practical Appsec Lessons Learned in the Age of Agile and DevOps

Speakers: Zane Lackey (@zanelackey)

The SDLC has been the model for web application security over the last decade. However, the SDLC was originally designed in a Waterfall world and often causes more problems than it solves in the shift to agile, DevOps and CI/CD. This talk will share actionable tips on the most effective application security techniques in today’s increasingly rapid environment of application creation and delivery.

>>Go To Presentation

8669814476?profile=original


3) Collaborative Security: Securing Open Source Software

Speaker: Dr. Nicko van Someren

There’s no guarantee that software will ever be free from vulnerabilities, whether it is open source or proprietary, but there is still plenty we can do. The Linux Foundation CTO Nicko van Someren will discuss new tools and techniques that help improve the security and quality of open source projects, presenting data from various open source projects including pre- and post-Heartbleed OpenSSL.

>>Go To Presentation

8669811274?profile=original


4) Securing 100 Products - How Hard Can It Be?

Speakers: Nir Valtman (@ValtmaNir)

Many companies establish their Secure Development Lifecycle. The adoption of it crucial especially for corporations with dozens of applications. The main challenges they face are the diversity of architecture, dev languages, methodologies, compliance, regulations, etc. This talk will shed light on scaling up and out the application security capabilities and maximizing the software security maturity.

>>Go To Presentation

( Compare More: Discover & Compare Application Security Testing Products Click Here )

8669811868?profile=original


5) A Worldwide Journey to Build a Secure Development Environment

Speakers: Dawn Cappelli, Geof Storms

We know we need to identify and protect critical assets. But how? If your company develops a multitude of hardware and software products in a global environment it is very challenging. This session will describe how we approached the design and building of a Secure Development Environment (SDE), giving you a jump start your own SDE using our lessons learned to help balance security and productivity.

>>Go To Presentation

8669806491?profile=original


6) How to Transform Developers into Security People

Speakers: Christopher Romeo (@edgeroute)

Developers should be the first line of security defense. Security teams purchase secure coding classes and claim success. Hours of training does not change the developer mindset. When developers hear security, they respond as either unlearned, overworked, apathetic or gung ho. This session will explore why developers reject security and will provide a programmatic approach to answer the challenges.

>>Go To Presentation

8669808871?profile=original


7) A Successful Application Security  Program ‐ Envision Build and Scale

Speakers: Jyothi Charyulu (@sg02411), Jaya Chilakamarri

Learn how to build an application security program that is successfully integrated into various stages of software development life cycle and product life cycle. This lab will draw from the facilitators’ successful experience at Sabre, focusing on the top five maxims to design, build and scale. 

>>Go To Presentation

8669808085?profile=original


8) DevSecOps—Building Continuous Security into IT and App Infrastructures

Speakers: Chris Carlson

Cloud services, Continuous Integration, and Continuous Deployment require security teams to adapt security controls to DevOps processes. This session will explore how security delivered as a service helps security teams work with DevOps to embed continuous security into IT and application infrastructure for improved and automated auditing, compliance and control of applications.

>>Go To Presentation

8669812277?profile=original


9) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Security Products

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


8669814668?profile=original

Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)