Top 8 talks on 'Emerging Technologies' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

 


1) Machine Learning: Cybersecurity Boon or Boondoggle?

Speaker :  Dr. Zulfikar Ramzan

Machine learning (ML) and artificial intelligence (AI) are the latest “shiny new things” in cybersecurity technology but while ML and AI hold great promise for automating routine processes and tasks and accelerating threat detection, they are not a panacea. This session will demonstrate what they can and can’t do in a cybersecurity program through real world examples of possibilities and limits.

>> Go To Presentation

2) Ridge-based Profiled Differential Power Analysis

Speakers : Yu Yu 

Ridge-based differential power analysis techniques and side-channel attacks on intermediate states with no partial key guessing are discussed. Topic 1: Ridge-Based Profiled Differential Power Analysis Authors: Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu and Chi Zhang Topic 2: My Traces Learn What You Did in the Dark: Recovering Secret Signals without Key Guesses Authors: Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao and Xiangliang Ma.

>> Go To Presentation


3) Advances in Cloud-Scale Machine Learning for Cyber-Defense

Speakers : Mark Russinovich

Picking an attacker’s signals out of billions of log events in near real time from petabyte scale storage is a daunting task, but Microsoft has been using security data science at cloud scale to successfully disrupt attackers. This session will present the latest frameworks, techniques and the unconventional machine-learning algorithms that Microsoft uses to protect its infrastructure and customers.

>> Go To Presentation


4) Applied Machine Learning: Defeating Modern Malicious Documents

Speakers : Evan Gaustad

A common tactic adopted by attackers for initial exploitation is the use of malicious code embedded in Microsoft Office documents. This attack vector is not new, but attackers are still having success. This session will dive into the details of these techniques, introduce some machine learning approaches to analyze and detect these attempts, and explore the output in Elasticsearch and Kibana.

>> Go To Presentation


5) Hello false flags! The art of deception in targeted attack distribu...

Speakers : Brian Bartholomev (@Mao_Ware), Juan Andrés Guerrero-Saade

When it comes to targeted attacks, everyone is obsessed with attribution. It’s a near impossible question to answer. Attackers often try to muddy the waters through deception tactics like false flags. This talk will draw on unpublished research to provide real-world examples of false flag operations and explain why understanding them is crucial for researchers and users of threat intelligence.

>> Go To Presentation

6) Confusion and Deception:  New Tools for Data Protection

Speakers : Craig Astrich, Daniel Frank

Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecosystem, legacy data protection methods leave many gaps. By looking through the adversary’s eyes, you can create subterfuges, delay attack progress or reduce the value of any data ultimately accessed—and shift the risk equation.

>> Go To Presentation

7) Automated Prevention of Ransomware with Machine Learning and GPOs

Speakers : Rob Soto, Joseph Zadeh

This talk will highlight a signature-less method to detect malicious behavior before the delivery of the ransomware payload can infect the machine. The ML-driven detection method is coupled with the automated generation of a Group Policy Object and in this way we demonstrate an automated way to take action and create a policy based on observed IOC’s detected in a zero-day exploit pattern.

>> Go To Presentation


8) Applied Cognitive Security: Complementing the Security Analyst

Speakers : Vijay Dheap, Brant Hale 

Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights to qualify incidents and investigate risks quickly and accurately.

>> Go To Presentation

Views: 44

Comment

You need to be a member of CISO Platform to add comments!

Join CISO Platform

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts