Speaker: Nilanjan De, Principal Architect @Cigital
Speaker: Nilanjan De, Principal Architect @Cigital
Speaker: Vinayak Godse, Senior Director-Data Protection @DSCI
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Ravi Mishra, Head Of Advisory @CISO Platform
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker:Arnab Chattopadhyay, Senior Technical Director @MetricStream
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Dr. Rajesh P. Deo, Senior Manager @Ernst&Young
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Ransomware is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. Here we have compiled some of the Good-reads blogs, articles, freely available Decryptors and removal kits to keep you up-to-date on the latest happenings in the Ransomware space.
1. (Free tools) AVG announces 6 new free decryption tools to retrieve your encrypted files : AVG has come out with six new tools designed to fight this affliction. Each is for a different form of this malware.
According to AVG These new free tools are for the decryption of six current Ransomware strains: Apocalypse, BadBlock, Crypt888, Legion, SZFLocker, and TeslaCrypt.
2. Locker Ransomware author dumps database of private keys, apologizes : Allegedly, the author of the "Locker" ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts worldwide to the public. The "author" claims that the release was a mistake, that no further keys will be utilized for encryption, and that automatic decryption of all affected hosts will begin on June 2nd 2016
3. (Free tool) ESET releases new free decryptor for TeslaCrypt ransomware: After TeslaCrypt authors announced that they are closing down their operations and made public their Universal master decryptor key, ESET created a free decryptor tool to unlock files affected by all variants between 3.0.0 and 4.2 of this Ransomware.
4. Ransomware removal kit published online, helps streamline infection response: A security researcher has made a Ransomware removal kit available online with the hope that it will help security professionals and system administrators alike in responding to instances of Ransomware infection. Researcher Jada Cyrus has published the kit on Atlassian Bitbucket. The kit itself consists of removal tools for common ransomware variants, as well as guides on how to perform the necessary removal tasks.
5. What is Ransomware and 15 Easy Steps To Keep Your System Protected [Updated]: A very comprehensive and updated guide on Ransomware. This Blogs outlines target vectors, attack anatomy, Ransomware families and much more.
( Read More: Checklist To Evaluate SIEM Vendors )
6. Behaviour analysis of CERBER ransomware: The Ransomware so called CERBER has been out since early march according to TrendMicro and so far has used different techniques for delivering the payload to the victim. For instance it has been seen to use compressed JavaScript files (.zip) or in other instances using Windows Script Files (WSFs) which had XML content and then executed by Windows’ wscript.exe utility.
7. When the cryptolocker strikes: Reasons for ransomware success and ways to prevent : What factors lead to the high success of cryptolockers, a type of Ransomware that scrambles your files and asks for a ransom to recover them again?
8. Catching Ransomware infections with a Honeypot script & integration into Zerto Virtual replication: This script uses the honeypot technique to detect Ransomware infections by comparing 2 files, a honeypot file and a witness file.
9. "Zepto" the new threat: Analysis and anatomy of New Ransomware known as "Zepto". The blog talks about how Zepto infects target computer and how to detect for its behaviour.
10. How to trade Bitcoins: Practically, all Ransomware attackers demand ransom in Bitcoins. Bitcoin are a relatively new currency which has significantly increased in value over the past few years. Bitcoins are known as a cryptocurrency and can be traded in order to earn money.
11. Ransomware thats 100% pure Javascript, no download required: By the start of 2016, many crooks were steadily shifting their infection strategy as the world began to realise that enabling macros was a really bad idea. These days, a lot of ransomware arrives in JavaScript attachments and this blogs analyses and presents the challenges associated with the same.
( Read More: ATP( Advanced Threat Protection) Technology Stack )
We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizations to look at the complete stack of technologies mentioned below and build a holistic program to secure against advanced attacks.
Advanced Threat Detection: ATP Products generally leverage one or more of the below mentioned techniques-
( Read More: Threat Intelligence (Workshop Presentation) )
It's time to go beyond using sandboxing as a standalone capability rather an organization needs to have a holistic approach for their ATP Program. You need to have efficient and robust analysis tools that can integrate with your existing security ecosystem and can continuously detect the most advanced threats.
But as Kevin Mitnick, World's Famous Hacker says "A company can spend hundreds or thousands of dollars on Firewall, IDS/IPS, ATP and other security technologies, but if attacker can call one trusted person within the company, and that person complies, and if attacker gets in, then all that money spent on technology is essentially wasted." Therefore, processes and people also play a crucial role in establishing the strong ATP Program.
( Read More: 9 Top Features To Look For In Next Generation Firewall (NGFW) )
Turbo Talks
How the Heartbleed bug was found?
Antti Karjalainen discoverer of Heartbleed
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found by Codenomicon. The mechanism that initially detected the vulnerability is presented. It is also discussed what made the Heartbleed bug so severe, and what kind of factors would have mitigated the consequences of the vulnerability.
Bitcoin Transaction Malleability - An Insight
Daniel Chechik
The bitcoin network vulnerability had disturbed the huge bitcoin network. Plenty trading websites like Silk Road,MTGox and more have been victim to "Bitcoin Transaction Malleability." This talk will take you through the vulnerability and how exactly it may be exploited.
5 Real ways to destroy business by breaking SAP Applications
Alexander Polyakov
Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into just one of your business critical systems? And if so - what kind of systems could be under attack? Is it easy to break them? Is it a myth that SAP systems could be accessed only internally? Time has come not only to answer all of these questions. This time the real examples of different attacks on Enterprise Business application systems will be shown, based on eight-year research experience in that field. First of all we will cover all possible business risks related to each end every type of systems such as ERP, SRM, HR, Business Intelligence, PLM’s and Industry solutions so that every high level executive will get the full understanding of what could happen. After that, we will show examples of how easy is it to do such critical actions in different systems by exploiting vulnerabilities and misconfigurations from more business-related - such as Abusing SRM systems - to win the bid, for example. From frauds in HR system and salary-increasing to more technical things, such as drilling into corporate network via SAP Portal or delivering backdoors, which look like official updates via SAP Router. Our presentation will be the first to show real threats for business during those attacks with demo of the most interesting ones, and a guide to avoid them from EAS-SEC.
A journey to protect POS
Nir Valtman Discoverer of Point-of-Sale Vulnerabilities
From Target to other retail chains were all about 'POS'. Point-Of-Sale vulnerability has been at its peak for a while. This talk illustrates the POS vulnerabilities from both retailer and software vendor's perspective. Get an insight into how the POS devices are compromised including difficult methods like memory scraping. This talk will demonstrate the working of POS vulnerability and how threats can be minimized. It will also explain the ways to mitigate the risk while you get the basic concepts and get to know which of these actually work.
Intrinsic Leadership
Deb Maes Neuro-Linguistic Master Practitioner & Trainer
This talk illustrates a new effectiveness model for modern leading, a new method of better HR management and how to harness great potential in your human resources. Learn to harmonize thoughts, emotions and intuition to create coherence between your thinking modalities and become grounded and confident in decision making — emerge a better, human-centric leader. The talk includes the cognitive and emotions aspect.
Cyber Safety in Cars and Medical Devices
Beau Woods - Creator of IOT Security Framework
We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life and safety systems, bits and bytes meet flesh and bone. We must know, not just hope, that devices with the ability to impact human life and public safety are worthy of our trust. Learn how the safety impacts of merging cyber security with cars and automobiles impacts all of our safety. Learn the current state of research and what it tell us about these devices' resilience to accidents and adversaries. Understand why our current approaches to cyber security won't work and, in many cases, will be more dangerous than doing nothing.
The notorious 9 in Cloud Security
Moshe Ferber
Cloud Computing presents major opportunities and benefits for the organization worldwide. It is scalable, flexible and efficient. But along with those major advantages, comes the threats. Most Cloud Computing threats and risks are well documented, but we are missing information regarding how those threats can be put into practice in the real world, what are the attack vector used and what is the risks and results for those events. In the presentation we will elaborate the notorious nine Cloud computing threats as described by the Cloud Security Alliance, and for each threat we will provide recent examples for known incidents, the attack vectors used and the damage resulted from the incident. By understanding the risks and case studies, we can better prepare our organization for cloud adoption. Among the recent events we will explore: Supply chain attacks, Attacks for Bitcoin mining, Attacks on the management GUI, API manipulation and more. We will talk about recent incidents for such as Code-spaces.com hack, Buffer and Mongo DB OAUTH credential theft, attacks on Twitter and Microsoft and many more.
More Shadow Walker- The Progression Of TLB-Splitting On X86
Jacob Torrey - Discoverer of TLB-Splitting on x86
This talk will cover the concept of mis-using the hardware (x86 translation lookaside buffer) to provide code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware. After requisite background is provided, the talk will then move to the new research, the author's method for splitting a TLB on Core i-series and newer processors and how it can again be used for defensive (MoRE code-injection detection) and offensive purposes (EPT Shadow Walker root-kit). This talk will be very high-level but aims to convey the complexities of the hardware and possible attack vectors that can happen at the lowest-levels of an organization's IT infrastructure.
Ants and Elephants in the CISO's Office
Paul Raines - CISO, UNDP
I will show how ISO 9001 and ISO 27001 can be used together to deliver business value and demonstrate to executive management and key stakeholders that you are exercising due diligence in protecting your organisation's information assets. The talk will briefly discuss the requirements of the two standards and show how ISO 27001 and ISO 9001 can be used to address both the tactical challenges of information security (the ants) as well as the strategic challenges of delivering business value (the elephants).
Embedding risk assessment into your project workstream
Michael Calderin - Security Officer, Bupa Global Latin America
Position information security more strategically within your organization by managing information risks early in the project lifecycle. A concise Impact Assessment can help you address serious risks at a time when they can be best addressed. Encourage your audience to participate by creating an unobtrusive process that engages the project team and security team and promotes dialog. This has been key in integrating information security into business and IT workstreams and demonstrating that information security personnel can and should be consulted whenever questions arise. With minimal effort, this type of thinking can create major impact for you and your organization.
Application Security Best Practices
Yuval Idan
Cybercrime is rising exponentially and millions of are at risk. Yuval Idan, APAC Technical Director at Checkmarx, will be speaking about today's prominent vulnerabilities and how Source Code Analysis (SCA) can help tackle these issues.The main topics of this talk include: Integrating Security as part of the Software Development Life Cycle (SDLC), learning how to engage developers in the Security Process and turn them into Champions with the help of a Source Code Analysis Solution (SCA) along with how to identify and fix security vulnerabilities early to significantly reduce costs Yuval will demonstrate live how these goals can be achieved.
Actionable Security Intelligence
Derek Manky
Heartbleed, Shellshock are just two of many critical vulnerabilities that are present in hundreds of thousands of embedded devices that are connected to the 'Internet of Things'. This talk will overview embedded vulnerabilities including ones discovered by FortiGuard Labs to shed light on a much larger issue at stake. This review will highlight the state of IoT security moving forward in 2015. Security strategy will be discussed including vendor response (PSIRT) and practical protection measures. Heartbleed has subsided, Shellshock is on stage - but many similar vulnerabilities need to be addressed with priority.
th
Workshops & Trainings (20-21 Nov)
Fuzz Testing Techniques for Discovering Zero Days
Antti Karjalainen ( discoverer of Heartbleed )
The workshop gives an introduction to fuzz testing. Common fuzzing techniques are presented, and it is discussed, what makes a good fuzzer. Different kind of failure modes that can be triggered by fuzz testing are demonstrated with real-world examples. It is also demonstrated, how the triggered failures can be detected automatically by using sophisticated oracles.
Implementing SAP security
Alexander Polyakov ( The father of ERPScan )
An SAP system is the heart of any large company; it enables all critical business processes, from procurement and payment to human resources and financial planning. All of the data stored in ERP systems is of great importance, and any illegal access can mean enormous losses, probably even termination of business processes. Within the last 7 years, SAP security experts have spoken a great deal about various attacks on SAP. Interest in the topic has been growing exponentially. This session will provide practical steps of implementing SAP Security in company from the beginning based on a real case-study in one of the world-lagest airlines.
Defending Online Attacks on Cloud Instances
Nir Valtman ( Discoverer of Point-of-Sale Vulnerabilities ) & Moshe Ferber ( Cloud Security Entreprenuer )
"Cloud instances lifecycles is changing. Instances can launch up, process hug amounts of data and terminate, and al within range of minutes."
This life cycle makes traditional security processes such patches, vulnerability scanning, hardening and forensics impossible due to lack of maintenance time. New methods must be adapted in order to cope with those challenges.Our idea is a technical live demo. For each part of the cloud instance lifecycle (instaling, launching, procesing, terminating) we show the atacking surface and how we implement the new automated security procedures (automatic patches, encryption of volume storage, automate configuration, log alerting, provisioning encryption keys) in order to reduce the atack surface and eliminate risk."
Overview of Harwdware Level Security
Jacob Torrey ( Discoverer of TLB-Splitting on x86 )
In this workshop, a brief summary will be provided on the current state-of-the-art in kernel and hypervisor-level attacks and defenses and how the cat-and-mouse game that is on-going in this field can impact your organization. After reviewing the threat landscape, the discussion will move to mitigation strategies and how to fold defending against these types of attacks into existing business models. A holistic view of the adversary model targeting OS and hypervisors will be provided and ranked against other common threats. The audience should leave this workshop with a better understanding of what is possible, what is common and what they can or should do to protect their organizations.
Building an Incident Management Program
Paul Raines ( CISO @UNDP,ex-OPCW )
The workshop will cover the ABCs of putting together an information security incident response team (ISIRT). It will cover the basics of being able to protect, detect, respond and learn from incidents. Based on industry best practices and the lessons learned from experience, the workshop will provide practical advice on how to develop an effective ISIRT with even limited resources.
Protecting SCADA environments
Daniel Lakier, CTO & President at SeeGee Technologies
This talk will take you through the fundamentals followed by the advanced levels of SCADA. What is SCADA, Why do we need to care, What are the Risks & Challenges,Operational Practical ( IT challenges), Why the traditional answer isn't enough. According to Daniel, The best answer today is Stealth Networking and next generation two factor authentication.
Network Machine Learning and the Security Industry: Past, Present, And Future
Bob (Robert H) Klein, Black Hat 2015 Speaker
Machine learning is an exciting new technology that is seeing widespread use in many industries, and IT Security is no exception. However, the term “machine learning” is very broad, and its meaning can vary significantly depending on the security application context (insider threat detection vs. malware detection, for example). In this talk, we explore how a variety of machine learning technologies can be used across many different security applications, and we discuss how these technologies will continue to evolve over time.
Lessons learnt from recent Cyber-attacks on SAP systems
Alexander Polyakov
This talk will take you through the past attacks on SAP systems in history and 10 lessons learnt from it.
Since for a long time, almost no real attacks on SAP and Oracle ERP systems were known to the public, it gave CISOs a false sense of security. While the number of breaches in less critical applications was increasing rapidly, and so was the awareness, only a small group of professionals were aware of attacks on business applications. The most popular example of such fraud was to create a fake vendor and a payment order for this vendor and then to approve it. According to the Association of Certified Fraud Examiners, losses from internal fraud constitute 7% of profit on average. To prevent those types of attacks, the segregation of duties concept was created. ERP security isn’t limited to SoD. The issue of unauthorized access to system and user accounts via vulnerabilities now matters. Moreover, the increasing number of SAP vulnerabilities in ERP systems (from 100 in 2007 to 3500 in 2015 only in SAP) makes these issues more critical than ever. But what’s more important, in 2012 we saw a first sight of cyber-attack via SAP Vulnerabilities. Our predictions proved accurate and by now we have witnessed a number of examples from Anonymous attacks on Greek Ministry of Finance via SAP to the attest breach of US Investigation Services (a largest subcontractor of OPM) that led to company’s bankruptcy. In this talk, take a look at the history of ERP attacks and learn 10 lessons how to avoid them.
Building Immune Systems For Our Enterprises: Detecting Emerging Threats in real Time
Dave Palmer, Director of Technology, Darktrace
This talk will take you through a new perspective to realize how the math evolves to detect and emerge from the threats. Learn the algorithms behind, statistics, probability, the techniques, its evolution and how it can create the immune system for your organization.
United Nation's program to help developing nations in IT Security
Paul Raines - CISO, United Nations Development Programme
Cybersecurity assistance for developing nations. This talk will highlight a new initiative within the United Nations Development Programme (UNDP) to provide cybersecurity assistance to the governments of developing nations to help protect their critical national infrastructure and digital economies. UNDP uses its own experienced, award winning cybersecurity team instead of hiring expensive, outside consultants. Thus, UNDP can deliver services to its clients at less cost, less overhead and with the hands-on experience of a team of world recognised experts. The services to be provided include cybersecurity training, risk assessment, incident response training and exercises, training in business continuity/disaster recovery and preparation for ISO 27001 certification.
wh
Top Technical Tracks
The quantity of vulnerabilities are exploding in today’s dynamic environments, while attackers are exploiting them faster than ever before—and with greater sophistication and stealth. In so- called “zero-day attacks,” exploits are created for vulnerabilities in which a patch has not been released. In fact, X-Force found that 77 percent of all exploitable vulnerabilities have a public exploit available on the very same day.3 Then, in addition to the potential lag time between the disclosure of vulnerabilities and the availability of a patch, organizations need time to determine which systems are affected, prioritize their remediation, and take corrective action to patch those machines.
What Will You Learn?
Understanding the threat landscape
Combining vulnerability management with risk management
Closing the gaps in risk and vulnerability management
An average CISO Tenure is 17 months. This is why we brought up the burnout issue. Some of the factor are listed below:
CISO Role Expectations-
To secure the enterprise, the CISO must use tools/security products. Here's a challenge in itself. The number of IT Security Vendors and Products are ever increasing. It's not even robust, a single google search doesn't give much insight into the numbers of the same. This results in decision complexity increases many folds. As a community initiative we are taking steps to make this less challenging for you (For details send a mail at analyst@cisoplatform.com)
How complex can the decision become?
Technically if we consider the 'decision tree model' (often used in computational complexity), the function is directly proportional to the no. of factors/parameters affecting the decision making. This means, the larger number of vendors, the larger the complexity. And all this is often done in your brain-it's a challenge we probably don't comprehend everyday. But that's what a CISO or other Senior Security Officer's brain faces.
For more details on the computational tree models follow the reference link
Ref: https://en.wikipedia.org/wiki/Decision_tree_model
Challenges Faced By The CISO (Why they get fired/quit)-
How To Simplify The Selection Of Security Vendors?
The one place to search up all available options and their real life user experience could reduce the dimensions of decisions making to 2 instead of the earlier complex parameters. A robust view will allow for tremendous time saving and probabilistic right product selection. This is what FireCompass does-beta version of this is available. To add the manual expertise and experience, some of the best industry analysts from cisoplatform have agreed to guid the process.To request demo or user feedback mail at analyst@cisoplatform.com.
Why Fire Compass
It is a community initiative available in freemium model as well as premium.
References-
http://www.csoonline.com/article/3077243/it-careers/vendor-overload-adds-to-ciso-burnout.html
http://www.csoonline.com/article/3057243/security/these-cisos-explain-why-they-got-fired.html
http://www.computerweekly.com/news/2240103602/Too-many-products-spoil-security-management
According to a recent research sited in the whitepaper, 86% security leaders have adopted or plan to adopt cloud initiatives. Cloud being cost-effective, investments in public, private and hybrid clouds are reasonable investments. This guide will give us an understanding in this area thus allowing us to understand the SIEM on Cloud model.
>>Download Complete Report Here
What Will You Learn?
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Incident Response & SIEM at RSA Conference 2016.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
1) The Incident Response Playbook for Android and iOS
Speaker: Andrew Hoog ( @ahoog42 )
What is your mobile device incident response plan? If you cannot answer that question, you should attend this session. The session will cover the challenges in mobile, how and why it is different from traditional incident response, and the building blocks you can use to craft your own mobile incident response plan.
2) Demystifying Security Analytics: Data, Methods, Use Cases
Speaker: Anton Chuvakin ( @anton_chuvakin )
Many vendors sell “security analytics” tools. Also, some organizations built their own security analytics toolsets and capabilities using Big Data technologies and approaches. How do you find the right approach for your organization and benefit from this analytics boom? How to start your security analytics project and how to mature the capabilities?
image courtesy: https://www.flickr.com/photos/123943225@N07/14380659947
3) The Rise of the Purple Team
Speaker: Robert Wood ( @robertwood50 ), William Bengtson ( @waggie2009 )
As attacker tactics, techniques and procedures evolve, so must the defenses and strategy used to defend against them. Traditional red teaming presents an opportunity to find gaps in security, but leaves more valuable information unabsorbed. Results and methodologies used in red team assessments can drive protections in place use by blue teams and a larger program and vice versa.
image courtesy: https://www.flickr.com/photos/111692634@N04/18495846450
4) Building a World-Class Proactive Integrated Security and Network Ops Center
Speaker: Hanna Sicker ( @SNOCgirl )
The SNOC (Security & Network Operations Center) is a cost-effective, world-class, proactive integrated function that leverages and optimizes your current NOC members while hiring a minimal number of additional security professionals. Learn how to use the SNOC framework to transform your existing NOC into a single effective team that is responsible for both network and security functions.
image courtesy: https://www.flickr.com/photos/jakerust/16649925388
5) Make IR Effective with Risk Evaluation and Reporting
Speaker: Justin Monti, Mischel Kwon
Today, determining risk of a cyberattack is the generic vulnerability or malware rating ignoring aspects of how the business is impacted. Understanding the vulnerability state of the network, reputational risk, business loss, cost of IR and reconstitution cost are rarely understood. This presentation will show a data-driven approach to IR prioritizing response based on risk and business impact.
6) Data Breach Litigation How To Avoid It And Be Better Prepared
Speaker: Ronald I. Raether, Jr. Andrea Hoy
Here's an overview of the presentation: Background: Where are the Data Breaches occuring?; How to Be Better Prepared for When Your Company Data is Brenched; How to Avoid it: Lessons Learned & Best Practices
7) Cloud Breach – Preparation and Response
Speaker: Monzy Merza ( @monzymerza )
Your next breach or insider attack will most likely have you digging for evidence in the cloud. Are you prepared? The old styles of imaging disks and tapping networks won't work! It won’t scale! This session will discuss response scenarios for cloud-enabled and cloud-dependent enterprises, a model for preparing for cloud response, and will show examples of cloud breach investigations.
8) Preserving the Privilege during Breach Response
Speaker: Jeff Kosseff ( @jkosseff )
When companies hire cybersecurity consultants to investigate incidents, those professionals’ reports and emails could be used against the company in court unless a privilege applies. This session provides an overview of the attorney-client privilege for post-breach investigations, and tips for increasing the chances that the privilege will apply and the data will remain confidential.
9) Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Speaker: Timothy Lee
This session will present a real case study of methodology and advanced cybersecurity tools used along with important tips and lessons learned on implementing an ISOC project at the second largest city of the nation. Topics include the critical success factors, advanced tools and technologies for ISOC, Situational Awareness, Threat Intelligence Sharing and cybersecurity collaboration.
10) Data Science Transforming Security Operations
Speaker: Alon Kaufman
Data science brings a huge promise to IT security and accordingly to the sprouting of DS teams across all enterprises, and numerous vendors. Indeed DS has the potential to transform the way security is done—yet, the secret sauce is how to do it in a way that actually provides clear value, embedded into the security workflow, and leverages the human knowledge in combined with the data.
Your Complete Guide To Top Talks @RSA Conference 2016 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.
In keeping with the latest happenings in Information security, this article is on the 10 finalists of RSA innovation sandbox contest held at the RSA Security conference, the world's leading Information security conference. Companies with innovative products and disruptive technologies are given platform to pitch their product. This competition promotes innovative thinking and encourages out-of-the-box ideas.
The finalist have to demonstrate their products and deliver a 3 minute long presentation in front of attendees and Judging panel. The judges based on participants demonstration and presentation decides the winner.
List of Finalists:
Winner of RSA Innovation sandbox 2016 contest:
Phantom
Headquarters: Palo Alto, California
Founded: 2014
Current CEO: Oliver Friedrichs
Phantom provides Security Automation & Orchestration Platform to close the security gap by Integrating with all the security systems and tools and managing the enterprise security operations in a smart way. Phantom helps streamline security operations for the swift response to any incidents and possible threats. Using Phantom you can semi-automate or fully automate responses, customize according o your organization need while accelerating the entire incident lifecycle.
Phantom uses high level python script, which initiates actions to be taken to remediate the Incident and start investigations. These High level Python scripts are incident specific and Phantom call them Playbooks. Playbooks can be used to execute actions on connected devices.
Other Finalists
Skyport Systems
Head quartered: Mountain view, CA
Founded: 2013
Current CEO: Art Gilliland
Skyport delivers secure-computing infrastructure for enterprise applications. Skysecure server can be deployed on-premise and are managed remotely. The server is designed to host business critical applications to protect against viruses, rootkits and malware. the system maintains a secure configuration by providing embedded, layered an compartmentalized security. The solution also provide full visibility by capturing network traffic from layer 2 to layer 7 for audits and investigations.
Illusive Networks
Headquarters: Tel Aviv, Israel.
Founded: 2014
Current CEO: Shlomo Touboul
Illusive networks adds a deceptive layer over the entire network - agentlessly deployed on every endpoint, server and network component, which paralyses the attacker who penetrates the network by feeding wrong information to them. So when the attacker breach your network illusive network ensure that they step into an deceptive world were the data is unreliable. This makes the attacker goals virtually impossible to achieve. The illusive network maintains that there is no cost to the IT because of these deceptions and it is completely transparent to the IT and attackers.
Bastille Networks
Headquarters: Atlanta, Georgia
Founded: 2014
Current CEO: Chris Risley
Bastille deals regarding Security for the Internet Of Things(IOT). The secure Solution provided by Bastille aims to identify to enterprises from the unintended consequence of IOT and allow preemptive response from the organization. Through its proprietary software, Bastille scans complete radio spectrum giving visibility over every wireless device on the premise. As a result, enterprises has full situational awareness and can accurately quantify risk and mitigate threats.
Menlo Security
Headquarters: Menlo Park, CA
Founded: 2013
Current CEO: Amir Ben-Efraim
Menlo Security provides solution to protect from the threats of advanced malware and other Web based attack vectors by introducing a new security model. The Model provides a new layer in the security stack that contains and eliminates all malware and grants secure access to the web. The company has patented Isolation platform which scans and eliminates malwares in the cloud. There is no need to deploy endpoint agents and the process is completely transparent to the users providing them safe and clean experience.
Prevoty
Headquarters: Los Angeles, CA
Founded: 2013
Current CEO: Julien Bellanger
Prevoty is a security software company dedicated to protecting users and enterprises by solving problems related to application security. Prevoty’s products provide real-time application security intelligence and RASP (Runtime Application Self-Protection) capabilities for enterprises.
ProtectWise
Headquarters: Denver, CO
Founded: 2013
Current CEO: Scott Chasin
ProtectWise delivers a cloud based network security solution that provide complete visibility and detection of enterprise threats and accelerated incident response. ProtectWise uses its cloud Network DVR, a virtual camera in the cloud to monitor, record and retain all network traffic for automated analysis and retrospection, creating a long-term network memory.
SafeBreach
Headquarters: Menlo Park, CA
Founded: 2014
Current CEO: Guy Bejerano
SafeBreach provides a "hackers view" of an enterprise security posture. They executes active breach scenarios with Hackers Playbook of research and real-world investigative data and performs continuous validation to find holes in an environment before an attacker does. SafeBreach allows to benchmark and analyze the effect of attacks and the effectiveness of the defense products at any given moment.
Vera Security
Headquarters: Palo Alto, CA
Founded:2014
Current CEO: Ajay Arora
Vera security enables businesses to easily secure and track any digital information across all platforms and devices without borders and controlled endpoints. With its Zero-touch, Zero-friction data protection and Encryption Vera enable organizations to Secure any file across all devices, all users and all applications in real-time with Seamless user experience, Military-grade file encryption, Real-time policy enforcement, Centralized control and analytics.
Versa networks
Headquarters: Santa Clara, CA
Founded: 2012
Current CEO: Kumar Mehta
Versa solutions enable service providers and large enterprises to transform the WAN and branch networks based on a broad set of virtualized network functions (VNFs) to achieve unprecedented business advantages. Versa VNF-based solutions eliminate costly and proprietary network hardware to increase service agility and significantly reduce total cost of ownership (TCO).
(Source: RSA USA 2016, San Francisco)
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Information Security Trends talks at RSA Conference 2016.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
1) State of Cybersecurity: 2016 Findings and Implications
Speaker: Jennifer Lawinski ( @lawinski ), Ron Hale
This session will present key results of ISACA and RSA’s State of Cybersecurity Survey. Learn findings of the current cybersecurity landscape. Understand current threats and vulnerabilities as well as how enterprises are responding. Results will include top threats faced, as well as information on controls, skills employers are looking for, security organizational structures and incident plans.
2) The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Speaker: Johannes Ullrich ( @johullrich ); Ed Skoudis ( @edskoudis ); Mike Assante ( @assante_michael ); Alan Paller
Which are the most dangerous new attack techniques for 2016/2017? How do they work? How can you stop them? What's coming next and how can you prepare? This fast-paced session provides answers from the three people best positioned know: the head of the Internet Storm Center, the top hacker exploits expert/teacher in the U.S., and the top expert on cyberattacks on industrial control systems.
3) Introduction and a Look at Security Trends
Speaker: Hugh Thompson
The security industry has significantly changed over the last 25 years, as reflected in the content at RSA Conference. This introductory session will look at some of the major shifts, the economics that are driving the shifts, and the trends that are shaping current and future directions.
Your Complete Guide To Top Talks @RSA Conference 2016 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Security Awareness and Human Element at RSA Conference 2016.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
image courtesy: https://www.flickr.com/photos/lupuca/8720604364
1) Securing Today’s Online Kids
Speaker: Lance Spitzner ( @securethehuman )
Technology is an amazing enabler for kids today, but it also brings unique risks. This interactive talk will cover the top three risks facing kids online today, and what parents can do to help protect them. This talk is based on the experiences and lessons learned from numerous security professionals who are parents just like you.
2) AppSec Awareness: A Blueprint for Security Culture Change
Speaker: Christopher Romeo ( @edgeroute )
How does an individual change the application security culture of an organization? By deploying an application security awareness program with engaging content, humor and recognition. See the blueprint for how you can build an application security awareness program based on real life experience. Change the security DNA of everyone in your organization.
image courtesy: https://en.wikipedia.org/wiki/National_Computer_Security_Center
3) Proactive Measures to Mitigate Insider Threat
Speaker: Andrew Case ( @attrc )
The threat posed by rogue insiders affects every organization worldwide. The difficulties in balancing employees’ legitimate need to access corporate data along with the need to compartmentalize access are often in conflict. This presentation will walk through several real-world insider threat cases and discuss proactive measures that could have greatly mitigated the damage and losses.
image courtesy: https://de.wikipedia.org/wiki/Hacker
Speaker: Zee Abdelnabi ( @infosec_17 )
This session will review security techniques on how to navigate different personalities using traditional hacking techniques. Determine what “operating system” they are running. What patches are in place? What vulnerabilities can you exploit? What configuration issues does this person have? Your results based off the hack will help you work with the different personalities revealed.
5) Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
Speaker: William Adams ( @meritnetwork )
Cyber-exercises can be used to hone skills, build teams and practice procedures. With several different types of exercises available, which is the right type to achieve your objectives? Which is the right kind for the participants’ skill levels? Cyber-exercise expert Dr. Joe Adams explains the different types of existing exercises, how to create scenarios and how to get results from each event.
image courtesy: https://en.wikipedia.org/wiki/Anxiety
6) Using Behavioral Psychology and Science of Habit to Change User Behavior
Speaker: Bikash Barai ( @bikashbarai1 )
Why is it so hard to make users adopt security best practices? The answer lies in human psychology. In this talk the speaker shall explain the “Habit Cycle” and why habits are beyond the control of the conscious mind. The speaker shall deconstruct how habits are formed and the science behind the process. Why is it impossible to change habits? How can you replace old habits with new ones?
image courtesy: https://www.flickr.com/photos/hernanpc/7115374283
7) Securing the “Weakest Link”
Speaker: Adam Shostack ( @adamshostack )
Security professionals often call people “the weakest link.” We claim that they'll always make mistakes, however hard we try, and throw up our hands. But the simple truth is that we can help people do well at a wide variety of security tasks, and it’s easy to get started. Building on work in usable security and threat modeling, this session will give you actionable, proven ways to secure people.
image courtesy: https://www.flickr.com/photos/97481684@N08/14096568717
8) People-Centric Security: Transform Culture, Reduce Risk, Drive Success
Speaker: Lance Hayden ( @hay_lance ), Masha Sedova ( @modMasha )
This session links security culture and program performance, providing tools and guidance that will enable attendees to measure, manage and transform their own organizations’ security culture. Cases studies will be reviewed, and attendees will receive access to proven models, frameworks and tools for measurably improving the cultural maturity and behavioral reliability of their security program.
Your Complete Guide To Top Talks @RSA Conference 2016 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Hacking & Attack Technique at RSA Conference 2016.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
image courtesy: https://en.wikipedia.org/wiki/Yo-Mobile
1) Braking the Connected Car: The Future of Vehicle Vulnerabilities
Speaker: Akshay Anand ( @iamakshayanand ), Karl Brauer ( @karlbrauer )
In this presentation, analysts from Kelley Blue Book’s Automotive Industry Insights will illustrate how the connected car is quickly becoming an unrestricted playground for cyberthreats and how the next generation of in-car technology will intensify already-present vehicle vulnerabilities.
image courtesy: https://www.flickr.com/photos/132889348@N07/20445410340
2) Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
Speaker: Stephen Sims ( @steph3nsims )
Ever wondered how to find bug fixes residing in Microsoft patches? In this presentation we will take a look at the tools and techniques used to reverse engineer Microsoft security patches. Many organizations take weeks to push out patches to their domains. If an attacker can locate the fix and get a working exploit going, they can use it to compromise your organization.
image courtesy: https://de.wikipedia.org/wiki/Hacker
3) Autonomous Hacking: The New Frontiers of Attack and Defense
Speaker: Giovanni Vigna ( @lastlinelabs )
Vulnerability analysis has largely been a process that requires substantial human expertise. However, very recently there has been a push for completely autonomous hacking systems, which can find flaws, exploit them and even provide patches, all without any human intervention. This talk presents recent advances in autonomous hacking and provides lessons learned from participating in the DARPA CGC.
4) Hacking a Professional Drone
Speaker: Nils Rodday
Professional drones are now actively used across various industries to perform daily critical operations. In this awareness session, Nils Rodday will perform a live hack which exploits vulnerabilities of the professional drone and effectively compromises the security of the system to take over control. His session will also discuss practical fixes and approaches for remediating these issues.
5) Linguistic Passphrase Cracking
Speaker: Mikael Simovits ( @mikaelsimovits ), Peder Sparell
With the constant increase of availability of processing power comes the need for longer passwords and hence the need for usage of passphrases in order to remember them. But are passphrases really safe? This session will explain how to crack passphrases up to 20 characters long, where normal password attacks most often fail, in a reasonable timespan using a normal gaming PC and a Markov process.
image courtesy: https://en.wikipedia.org/wiki/Harlequin_cabbage_bug
6) …But Now I See—A Vulnerability Disclosure Maturity Model
Speaker: Katie Moussouris ( @k8em0 )
Someone politely knocks on your door and reports that there’s a hole in your wall big enough for a person to climb through. You immediately threaten legal action. Crazy? In the world of vuln research, this happens. This session will review a Vuln Disclosure Maturity Model created describe best-in-class practices. For any company wanting to get better bug reports faster—this session is a must.
image courtesy: https://www.flickr.com/photos/rueful/8538388071
7) Breaking Closed Systems with Code-Signing and Mitigation Techniques
Speaker: Gavin Hill
Code signing is abundant in the enterprises and consumer space. This session will review the current landscape showing attacks against several open (Windows, Android, Mac) and closed (IOS, automotive operating) systems and show anomalies found by Venafi Labs focused on the theft and misuse of code signing certificates to breach organizations and propose a solution on how to address the issues.
image courtesy: http://www.geograph.org.uk/photo/2358069
8) Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil
Speaker: Alexander Polyakov ( @sh2kerr )
One of the industries most plagued by cyberattacks is the oil and gas industry. Several attacks against such companies as Aramco have been executed. SAP and Oracle systems are widely used there and are responsible for business critical processes such as Digital Oilfield Operations, Hydrocarbon Supply Chain and others. How you can prevent those attacks? The presenters will give answers.
9) Hacking Critical Infrastructure Like You’re Not a N00b
Speaker: Jason Larsen
This presentation is targeted towards an audience that already understands how to compromise the embedded systems that run a process and now is looking at manipulating the physics of the process itself. In as much as time allows, it will cover all the things necessary to accomplish more than exercising the automatic shutdown logic of a process.
10) The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Speaker: Alan Paller, Ed Skoudis ( @edskoudis ), Johannes Ullrich ( @johullrich ), Mike Assante ( @assante_michael )
Which are the most dangerous new attack techniques for 2016/2017? How do they work? How can you stop them? What's coming next and how can you prepare? This fast-paced session provides answers from the three people best positioned know: the head of the Internet Storm Center, the top hacker exploits expert/teacher in the U.S., and the top expert on cyberattacks on industrial control systems.
image courtesy: https://www.flickr.com/photos/jakerust/16649925388
Speaker : Jonathan Trull ( @jonathantrull )
In today’s threat landscape, the attacker is an insider. Whether a state-sponsored actor or cybercriminal, attackers typically first compromise the endpoint with a client-side exploit and then pivot. In this session, we take a deep dive into how attackers pivot through organizations, identify the telltale signs of a pivot, and most importantly, identify steps for defending against it.
12) Sophisticated Attacks vs. Advanced Persistent Security
Speaker: Araceli Gomes ( @sleepdeficit_ ), Ira Winkler ( @irawinkler )
It appears that any successful attack these days is labeled, Sophisticated. The implication is that the attacks were unpreventable. The reality is very different. We dissect recent attacks, and then go through how they could have been prevented. Advanced Persistent Security principles are applied to demonstrate how even successful breaches can be contained to significantly reduce loss.
image courtesy: https://de.wikipedia.org/wiki/Hacker
13) Hacking Exposed LIVE: Attacking in the Shadows
Speaker: Stuart McClure ( @stuartmcclure )
Attackers have found compromise trivial for decades. But as additional security layers get deployed and next generation solutions come to market, attackers are turning to old and new techniques for bypassing security controls to launch their attacks and stay hidden. This session will explore the latest techniques and how simple defense techniques can foil even the most sophisticated attacks.
14) Hacking Exposed: The Mac Attack
Speaker: Dmitri Alperovitch ( @DAlperovitch ), George Kurtz ( @George_Kurtz )
Windows attacks receive all the attention. However, Mac and Linux have gained in popularity with the adversary. This session will focus on common Mac attack vectors and other cross-platform hacks that are typically seen in enterprise intrusions. We will also cover practical counter measures to make these alternate platforms more resilient.
15) What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016
Speaker: Avril Salter ( @avrilsalterUSA )
Next generation wireless standards define MU-MIMO, which promises 4x capacity gains. This session compares different multi-antenna technologies (SM, STBC, BF, MU-MIMO). It describes the subtle mistakes wireless security experts make sniffing wireless traffic. It explains how MU-MIMO introduces new challenges in capturing wireless traffic, which could make wireless sniffing near impossible.
Your Complete Guide To Top Talks @RSA Conference 2016 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference 2016.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
image courtesy: https://www.flickr.com/photos/111692634@N04/15423276943
1) Aspirin as a Service: Using the Cloud to Cure Security Headaches
Speaker: Bill Shinn , Rich Mogull ( @rmogull )
Moving critical workloads into the cloud can be unnerving for security professionals. In reality, though, the cloud offers a whole new set of opportunities for the security team to do things even better than in their on-premises environment. Two seasoned cloud experts will explore the latest real-world, practical tools and techniques for becoming demonstrably more secure as you move to the cloud.
image courtesy: https://de.wikipedia.org/wiki/Hacker
2) Cloud Security Essentials 2.0 Full Stack Hacking & Recovery
Speaker: Shannon LIetz ( @devsecops ), Javier Godinez
Here's an overview of the presentation: A Basic Introduction – Cloud Hack Lab; Attack Harness, Enumeration and Testing Tools Cloud; Forensics at Scale; Opportunities for Tools
3) Security Program Development for the Hipster Company
Speaker: Robert Wood ( @robertwood50 )
Cloud services have evolved and can now replace nearly every facet of traditional infrastructure. This movement has enabled rapid scale while introducing a considerable element of risk. This session will discuss a framework for getting started building a security program in an organization that is built purely on cloud services, covering the contradictions and opportunities of that business model.
https://www.flickr.com/photos/mikecogh/5280585822
4) Designing Virtual Network Security Architectures
Speaker: Dave Shackleford ( @daveshackleford )
With the advent of virtualization and software-defined networking (SDN), the nature and design of today’s networks are changing rapidly. Network security models need to adapt to the virtual data center, and there are a plethora of new technologies that can help security and operations teams design scalable network security architectures that work in highly virtualized environments.
5) Cloud Breach – Preparation and Response
Speaker: Monzy Merza ( @monzymerza )
Your next breach or insider attack will most likely have you digging for evidence in the cloud. Are you prepared? The old styles of imaging disks and tapping networks won't work! It won’t scale! This session will discuss response scenarios for cloud-enabled and cloud-dependent enterprises, a model for preparing for cloud response, and will show examples of cloud breach investigations.
6) Take It to the Cloud: The Evolution of Security Architecture
Speaker: Dana Wolf ( @dayowolf )
As companies evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This session will review some of the new risks introduced by SaaS/IaaS adoption and show how to mitigate these risks using new approaches to security architecture. Presenters will also review the transition of security architecture itself to the cloud.
Your Complete Guide To Top Talks @RSA Conference 2016 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top GRC talks at RSA Conference 2016.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
1) Bridging the Gap Between Threat Intelligence and Risk Management
Speaker: Wade Baker ( @wadebaker )
Here's an overview of the presentation: Bridging Risk & IR in Verizon's DBIR; Building Understanding; Finding Common Ground; Bridging the Gap; Crossing the Divide
2) The Newest Element of Risk Metrics: Social Media
Speaker: Ian Amit ( @iiamit )
In order to identify, measure and track the risk exposure that different elements of social media have on an organization, organizations require a threat metric framework to evaluate a network’s current risk posture. Learn how to take an ocean of data and distill it to the most critical risk indicators.
3) Building an Effective Supply Chain Security Program
Speaker: Dave Shackleford ( @daveshackleford )
We’ve realized that the supply chain in most organizations is a potential weak spot for security controls and awareness. The time has come to shore up our approaches to supply chain management, incorporating security best practices at all stages. This talk will break down exactly how to get started, what to look for, and how to better secure your supply chain across the board.
4) Integrating Cybersecurity into Supply Chain Risk Management
Speaker: Jon Boyens
Cyber–supply chain risks pose a new set of challenges for businesses (loss of critical IP, unwanted functionality in products) which jeopardize brand reputation and shareholder value. This session will present case study research from NIST on cutting-edge practices and tools that today’s industry leaders in supply chain risk management are deploying to secure their supply chains from end to end.
5) The Measure of Success:Security Metrics to Tell Your Story
Speaker: Julie Bernard ( @juliein10A ), Wendy Frank
Information Security as a problem is rather complex and it gets more difficult in terms of quantification. This presentation helps us with some metrics that will help us make security more understandable.
Your Complete Guide To Top Talks @RSA Conference 2016 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.