pritha's Posts (627)

Sort by

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Hacking & Attack Technique at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669804085?profile=original

image courtesy: https://en.wikipedia.org/wiki/Yo-Mobile

1) Braking the Connected Car: The Future of Vehicle Vulnerabilities

Speaker: Akshay Anand ( @iamakshayanand ), Karl Brauer ( @karlbrauer )

In this presentation, analysts from Kelley Blue Book’s Automotive Industry Insights will illustrate how the connected car is quickly becoming an unrestricted playground for cyberthreats and how the next generation of in-car technology will intensify already-present vehicle vulnerabilities.

>>Go To Presentation

8669804462?profile=original

image courtesy: https://www.flickr.com/photos/132889348@N07/20445410340

2) Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities

Speaker: Stephen Sims@steph3nsims )

Ever wondered how to find bug fixes residing in Microsoft patches? In this presentation we will take a look at the tools and techniques used to reverse engineer Microsoft security patches. Many organizations take weeks to push out patches to their domains. If an attacker can locate the fix and get a working exploit going, they can use it to compromise your organization.

>>Go To Presentation

8669804484?profile=original

image courtesy: https://de.wikipedia.org/wiki/Hacker

3) Autonomous Hacking: The New Frontiers of Attack and Defense

Speaker: Giovanni Vigna@lastlinelabs )

Vulnerability analysis has largely been a process that requires substantial human expertise. However, very recently there has been a push for completely autonomous hacking systems, which can find flaws, exploit them and even provide patches, all without any human intervention. This talk presents recent advances in autonomous hacking and provides lessons learned from participating in the DARPA CGC.

>>Go To Presentation

8669804887?profile=original

4) Hacking a Professional Drone

Speaker: Nils Rodday

Professional drones are now actively used across various industries to perform daily critical operations. In this awareness session, Nils Rodday will perform a live hack which exploits vulnerabilities of the professional drone and effectively compromises the security of the system to take over control. His session will also discuss practical fixes and approaches for remediating these issues.

>>Go To Presentation

8669805458?profile=original

5) Linguistic Passphrase Cracking

Speaker: Mikael Simovits@mikaelsimovits ), Peder Sparell

With the constant increase of availability of processing power comes the need for longer passwords and hence the need for usage of passphrases in order to remember them. But are passphrases really safe? This session will explain how to crack passphrases up to 20 characters long, where normal password attacks most often fail, in a reasonable timespan using a normal gaming PC and a Markov process.

>>Go To Presentation

8669805496?profile=original

image courtesy: https://en.wikipedia.org/wiki/Harlequin_cabbage_bug

6) …But Now I See—A Vulnerability Disclosure Maturity Model

Speaker: Katie Moussouris@k8em0 )

Someone politely knocks on your door and reports that there’s a hole in your wall big enough for a person to climb through. You immediately threaten legal action. Crazy? In the world of vuln research, this happens. This session will review a Vuln Disclosure Maturity Model created describe best-in-class practices. For any company wanting to get better bug reports faster—this session is a must.

>>Go To Presentation

8669805679?profile=original

image courtesy: https://www.flickr.com/photos/rueful/8538388071

7) Breaking Closed Systems with Code-Signing and Mitigation Techniques

Speaker: Gavin Hill

Code signing is abundant in the enterprises and consumer space. This session will review the current landscape showing attacks against several open (Windows, Android, Mac) and closed (IOS, automotive operating) systems and show anomalies found by Venafi Labs focused on the theft and misuse of code signing certificates to breach organizations and propose a solution on how to address the issues.

>>Go To Presentation

8669806054?profile=original

image courtesy: http://www.geograph.org.uk/photo/2358069

8) Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil

Speaker: Alexander Polyakov@sh2kerr )

One of the industries most plagued by cyberattacks is the oil and gas industry. Several attacks against such companies as Aramco have been executed. SAP and Oracle systems are widely used there and are responsible for business critical processes such as Digital Oilfield Operations, Hydrocarbon Supply Chain and others. How you can prevent those attacks? The presenters will give answers.

>>Go To Presentation

8669806257?profile=original


9) Hacking Critical Infrastructure Like You’re Not a N00b

Speaker: Jason Larsen

This presentation is targeted towards an audience that already understands how to compromise the embedded systems that run a process and now is looking at manipulating the physics of the process itself. In as much as time allows, it will cover all the things necessary to accomplish more than exercising the automatic shutdown logic of a process.

>>Go To Presentation


8669805662?profile=original

10) The Seven Most Dangerous New Attack Techniques, and What's Coming Next

Speaker: Alan Paller, Ed Skoudis@edskoudis ), Johannes Ullrich@johullrich ), Mike Assante@assante_michael )

Which are the most dangerous new attack techniques for 2016/2017? How do they work? How can you stop them? What's coming next and how can you prepare? This fast-paced session provides answers from the three people best positioned know: the head of the Internet Storm Center, the top hacker exploits expert/teacher in the U.S., and the top expert on cyberattacks on industrial control systems.

>>Go To Presentation

8669806080?profile=original

image courtesy: https://www.flickr.com/photos/jakerust/16649925388

11) The Pivot

Speaker : Jonathan Trull@jonathantrull )

In today’s threat landscape, the attacker is an insider. Whether a state-sponsored actor or cybercriminal, attackers typically first compromise the endpoint with a client-side exploit and then pivot. In this session, we take a deep dive into how attackers pivot through organizations, identify the telltale signs of a pivot, and most importantly, identify steps for defending against it.

>>Go To Presentation


8669806664?profile=original

12) Sophisticated Attacks vs. Advanced Persistent Security

Speaker: Araceli Gomes@sleepdeficit_ ), Ira Winkler@irawinkler )

It appears that any successful attack these days is labeled, Sophisticated. The implication is that the attacks were unpreventable. The reality is very different. We dissect recent attacks, and then go through how they could have been prevented. Advanced Persistent Security principles are applied to demonstrate how even successful breaches can be contained to significantly reduce loss.

>>Go To Presentation


8669804484?profile=original

image courtesy: https://de.wikipedia.org/wiki/Hacker

13) Hacking Exposed LIVE: Attacking in the Shadows

Speaker: Stuart McClure@stuartmcclure )

Attackers have found compromise trivial for decades. But as additional security layers get deployed and next generation solutions come to market, attackers are turning to old and new techniques for bypassing security controls to launch their attacks and stay hidden. This session will explore the latest techniques and how simple defense techniques can foil even the most sophisticated attacks.

>>Go To Presentation

8669806872?profile=original

14) Hacking Exposed: The Mac Attack

Speaker: Dmitri Alperovitch@DAlperovitch ), George Kurtz ( @George_Kurtz )

Windows attacks receive all the attention. However, Mac and Linux have gained in popularity with the adversary. This session will focus on common Mac attack vectors and other cross-platform hacks that are typically seen in enterprise intrusions. We will also cover practical counter measures to make these alternate platforms more resilient.

>>Go To Presentation

8669806685?profile=original

15) What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016

Speaker: Avril Salter@avrilsalterUSA )

Next generation wireless standards define MU-MIMO, which promises 4x capacity gains. This session compares different multi-antenna technologies (SM, STBC, BF, MU-MIMO). It describes the subtle mistakes wireless security experts make sniffing wireless traffic. It explains how MU-MIMO introduces new challenges in capturing wireless traffic, which could make wireless sniffing near impossible.

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Read more…

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

 

8669807483?profile=original

image courtesy: https://www.flickr.com/photos/111692634@N04/15423276943

1) Aspirin as a Service: Using the Cloud to Cure Security Headaches

Speaker: Bill Shinn , Rich Mogull@rmogull )

Moving critical workloads into the cloud can be unnerving for security professionals. In reality, though, the cloud offers a whole new set of opportunities for the security team to do things even better than in their on-premises environment. Two seasoned cloud experts will explore the latest real-world, practical tools and techniques for becoming demonstrably more secure as you move to the cloud.

>>Go To Presentation


8669804484?profile=original

image courtesy: https://de.wikipedia.org/wiki/Hacker

2) Cloud Security Essentials 2.0 Full Stack Hacking & Recovery

Speaker: Shannon LIetz@devsecops ), Javier Godinez

Here's an overview of the presentation: A Basic Introduction – Cloud Hack Lab; Attack Harness, Enumeration and Testing Tools Cloud; Forensics at Scale; Opportunities for Tools

>>Go To Presentation


8669807083?profile=original

3) Security Program Development for the Hipster Company

Speaker: Robert Wood@robertwood50 )

Cloud services have evolved and can now replace nearly every facet of traditional infrastructure. This movement has enabled rapid scale while introducing a considerable element of risk. This session will discuss a framework for getting started building a security program in an organization that is built purely on cloud services, covering the contradictions and opportunities of that business model.

>>Go To Presentation


8669807656?profile=original

https://www.flickr.com/photos/mikecogh/5280585822

4) Designing Virtual Network Security Architectures

Speaker: Dave Shackleford@daveshackleford )

With the advent of virtualization and software-defined networking (SDN), the nature and design of today’s networks are changing rapidly. Network security models need to adapt to the virtual data center, and there are a plethora of new technologies that can help security and operations teams design scalable network security architectures that work in highly virtualized environments.

>>Go To Presentation


8669806893?profile=original

5) Cloud Breach – Preparation and Response

Speaker: Monzy Merza@monzymerza )

Your next breach or insider attack will most likely have you digging for evidence in the cloud. Are you prepared? The old styles of imaging disks and tapping networks won't work! It won’t scale! This session will discuss response scenarios for cloud-enabled and cloud-dependent enterprises, a model for preparing for cloud response, and will show examples of cloud breach investigations.

>>Go To Presentation

8669805468?profile=original

6) Take It to the Cloud: The Evolution of Security Architecture

Speaker: Dana Wolf ( @dayowolf )

As companies evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This session will review some of the new risks introduced by SaaS/IaaS adoption and show how to mitigate these risks using new approaches to security architecture. Presenters will also review the transition of security architecture itself to the cloud.

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

Read more…

Top 5 'GRC' talks from RSA Conference 2016 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top GRC talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669808085?profile=original

1) Bridging the Gap Between Threat Intelligence and Risk Management

Speaker: Wade Baker ( @wadebaker )

Here's an overview of the presentation: Bridging Risk & IR in Verizon's DBIR; Building Understanding; Finding Common Ground; Bridging the Gap; Crossing the Divide

>>Go To Presentation


8669808276?profile=original

2) The Newest Element of Risk Metrics: Social Media

Speaker: Ian Amit ( @iiamit )

In order to identify, measure and track the risk exposure that different elements of social media have on an organization, organizations require a threat metric framework to evaluate a network’s current risk posture. Learn how to take an ocean of data and distill it to the most critical risk indicators.

>>Go To Presentation


8669808871?profile=original

3) Building an Effective Supply Chain Security Program

Speaker: Dave Shackleford ( @daveshackleford )

We’ve realized that the supply chain in most organizations is a potential weak spot for security controls and awareness. The time has come to shore up our approaches to supply chain management, incorporating security best practices at all stages. This talk will break down exactly how to get started, what to look for, and how to better secure your supply chain across the board.

>>Go To Presentation

8669806080?profile=original

4) Integrating Cybersecurity into Supply Chain Risk Management

Speaker: Jon Boyens

Cyber–supply chain risks pose a new set of challenges for businesses (loss of critical IP, unwanted functionality in products) which jeopardize brand reputation and shareholder value. This session will present case study research from NIST on cutting-edge practices and tools that today’s industry leaders in supply chain risk management are deploying to secure their supply chains from end to end.

>>Go To Presentation

8669801079?profile=original

5) The Measure of Success:Security Metrics to Tell Your Story

Speaker: Julie Bernard ( @juliein10A ), Wendy Frank

Information Security as a problem is rather complex and it gets more difficult in terms of quantification. This presentation helps us with some metrics that will help us make security more understandable.

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

Read more…

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Mobile Security at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669806872?profile=original

1) Hacking Exposed: The Mac Attack

Speaker: Dmitri Alperovitch@DAlperovitch ), George Kurtz ( @George_Kurtz )

Windows attacks receive all the attention. However, Mac and Linux have gained in popularity with the adversary. This session will focus on common Mac attack vectors and other cross-platform hacks that are typically seen in enterprise intrusions. We will also cover practical counter measures to make these alternate platforms more resilient.

>>Go To Presentation

8669807677?profile=original

image courtesy: https://www.flickr.com/photos/khamtran/5871541424

2) Android Serialization Vulnerabilities Revisited

Speaker: Roee Hay ( @roeehay )

This session is about Android Serialization vulnerabilities. We revisit two vulns found in Android (CVE-2014-7911, CVE-2015-3837) which allowed for privilege escalation. We also present vulns found in third-party SDKs (CVE-2015-2000/1/2/3/4/20) which allowed for arbitrary code execution in apps which used them. But what has been done to prevent similar vulns? The session will answer this question.

>>Go To Presentation

8669807700?profile=original

image courtesy: https://www.flickr.com/photos/26087974@N05/4244333014

3) The State of End-User Security—Global Data from 30,000+ Websites

Speaker: Andreas Baumhof ( @abaumhof )

We live in a rapidly changing environment. Mobile commerce is skyrocketing, browsers/OS are changing, web applications enable increasing functionality—yet the only thing that seems constant is the amount of flaws and vulnerabilities we find in these software components. Using data from more than 30,000 websites, this session will explore the state of security ecosystem and myths and assumptions.

>>Go To Presentation

8669802465?profile=original

4)Building an Android Scale Incident Response Process

Speaker: Adrian Ludwig

The Android ecosystem has over one billion active devices from hundreds of OEMs and carrier networks. The Android Security Team will explain how the ecosystem is able to respond quickly and effectively to security incidents. This will be part historical analysis of actual incidents, such as the Stagefright vulnerabilities, and part data-focused analysis of technology and processes we developed.

>>Go To Presentation


8669808459?profile=original

5) How to Analyze an Android Bot

Speaker: Kevin McNamee ( @KevMcNamee )

This presentation will demonstrate a complete end-to-end analysis of an Android bot. This will include the decompilation and static analysis of bot code and the dynamic analysis of the bot’s behavior in a controlled sandboxed environment. The session will provide details of the lab environment and tools used for the analysis.

>>Go To Presentation

8669808499?profile=original

image courtesy: https://www.flickr.com/photos/neccorp/14445634744

6) Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device

Speaker: Nathan Lesser ( @natelsr )

Imagine being dependent on a wireless infusion pump to receive the correct dosage of life-supporting medication. Now imagine the implications, were that pump to be maliciously hacked. In this session learn more about how to successfully secure these medical devices, based on work being conducted at the National Cybersecurity Center of Excellence (NCCoE) with premier health care organizations.

>>Go To Presentation

8669809279?profile=original

image courtesy: https://www.flickr.com/photos/jasonahowie/7910370882

7) Finding Triggered Malice in Android Apps

Speaker: Christopher Kruegel@lastlinelabs )

Traditional techniques to detect malice in Android apps struggle to identify trigger-based changes to application logic. Unfortunately, such triggers are a key component of targeted malware, where the trigger is the mechanism that ensures that the code is only executed at the target. This talk will review how static analysis can be used to detect and leverage triggers for more robust detection.

>>Go To Presentation


8669809487?profile=original

8) Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware 

Speaker: John Miller

This session will cover two key trends in mobile malware observed over the past 12 months and explore the evolution in fraud-linked mobile malware where criminals are developing credential theft tools that attempt to duplicate the successes of Windows malware in modifying victim interactions with targeted services. Also a look at mobile ransomware variants becoming more numerous and damaging.

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

Read more…

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Threat Intelligence talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669808271?profile=original

1) Dreaming of IoCs Adding Time Context to Threat Intelligence

Speaker: Travis Smith ( @MrTrav )

Find an interesting Intelligence Framework followed by a good undertanding of logstash & logstash filtering, tardis, kibana reporting etc.

>>Go To Presentation

8669810856?profile=original

2) STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015


Speaker: Bret Jordan ( @jordan_bret ), Mark Davidson

Amid privacy concerns and after a decade-long battle, the U.S. Cybersecurity Information Sharing Act (CISA) of 2015 was passed. Critics claim CISA is a surveillance bill in disguise; proponents claim the act provides a needed legal framework for information sharing. Can CISA actually improve cyberdefense without risking privacy? Are there unforeseen roadblocks? What about STIX/TAXII?

>>Go To Presentation

8669810889?profile=original

3) IOCs Are Dead—Long Live IOCs!

Speaker: Ryan Kazanciyan ( @ryankaz42 )

Indicators of Compromise were meant to solve the failures of signature-based detection tools. Yet today’s array of IOC standards, feeds and products haven’t impeded attackers, and most intel is shared in flat lists of hashes, IPs and strings. This session will explore why IOCs haven’t raised the bar, how to better utilize brittle IOCs and how to use intrinsic network data to craft better IOCs.

>>Go To Presentation

8669806080?profile=original

4) Bridging the Gap Between Threat Intelligence and Risk Management

Speaker: Wade Baker ( @wadebaker )

Here's an overview of the presentation: Bridging Risk & IR in Verizon's DBIR; Building Understanding; Finding Common Ground; Bridging the Gap; Crossing the Divide

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

Read more…

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top CISO talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669808064?profile=original

image courtesy: https://www.flickr.com/photos/purpleslog/2870445260

1) Super CISO 2020: How to Keep Your Job

Speaker: Todd Fitzgerald ( @securityfitz )

This presentation gives some great insights on the present 2016 security scenario. Find content like security leadership in leading organizations, the C-Level stakeholders CISO needs to balance with, the workforce today, behavioral trends & more.

>> Go To Presentation


8669806080?profile=original

2) How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience

Speaker: Jan Nys ( @Jankbc777 )

This presentation gives you an understanding of the present security industry with key insights and also a roadmap to move ahead, threat landscape etc.

>> Go To Presentation


8669802465?profile=original

3) Security Program Development for the Hipster Company

Speaker: Robert Wood ( @robertwood50 )

Cloud services have evolved and can now replace nearly every facet of traditional infrastructure. This movement has enabled rapid scale while introducing a considerable element of risk. This session will discuss a framework for getting started building a security program in an organization that is built purely on cloud services, covering the contradictions and opportunities of that business model.

>> Go To Presentation

8669807700?profile=original

4) Partnership with a CFO: On the Front Line of Cybersecurity

Speaker: Dr. Christopher Pierson ( @DrChrisPierson )

'Many CFO's know that they need to spend more on cyber risk management', many such facts can help us understand the cyber security industry today. Communicating properly to the CFO can solve many pain points and this presentation helps us do so. Learn about Drivers, Compelling Arguments and more.

>> Go To Presentation

8669801079?profile=original

5) The Measure of Success: Security Metrics to Tell Your Story

Speaker: Julie Bernard@juliein10A ), Wendy Frank , Lisa Lee@lisainmiami )

Information Security as a problem is rather complex and it gets more difficult in terms of quantification. This presentation helps us with some metrics that will help us make security more understandable.

>> Go To Presentation

8669806872?profile=original

6) From Cave Man to Business Man, the Evolution of the CISO to CIRO

Speaker: James Christiansen ( @Riskydata )

The CISO is evolving to CIRO. Successful IT security leaders are transforming their skills to meet the demands for today and future needs of their organization. A CIRO understands how to prepare board presentations, information risk management, third-party risk and regulatory requirements, and how to balance those with the needs of the business. Earn your seat at the table by becoming a CIRO!

>> Go To Presentation

8669811868?profile=original

Image source: https://www.flickr.com/photos/christianmesiano/2826827826

7) Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Speaker: Sounil Yu ( @sounilyu )

The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission.

>> Go To Presentation


8669806299?profile=original

image courtesy: https://www.flickr.com/photos/hernanpc/7115374283

8) Vendor Security Practices: Turn the Rocks Over Early and Often

Speaker: Martin Andrews; Michael Hammer ( @MichaelHammer )

Too often security is reviewed at the end of the vendor selection process. It ends up blocking projects moving forward as you identify issues with already selected vendors. Reverse the process with security considered early and business teams can avoid investing precious time on unsuitable vendor candidates and get rankings for suitable ones. This session will show you how using real examples.

>> Go To Presentation


8669805679?profile=original

image courtesy: https://www.flickr.com/photos/rueful/8538388071

9) Adjusting Your Security Controls: It’s the New Normal

Speaker: Jim Routh ( @jmrouth1 )

Most of us learned cybersecurity practices based on the application of controls that were part of a framework. Once the framework was implemented then the controls didn’t change often. It’s time to adjust our thinking and recognize that on-going adjustment of controls may be a better indicator of cyber-maturity than adherence to any framework.

>> Go To Presentation

8669806491?profile=original

10) Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards

Speaker: Lakshmi Hanspal ( @lakshmihanspal )

There is more to outsourcing than just the bottom line and running lean. Any organization embarking on this journey needs to (1) clearly identify and articulate the compelling narrative for steering in this direction, (2) have risk transparency on associated risks when someone else is running your critical part of the business and (3) enumerate the benefits expected to be reaped.

>> Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Read more…

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669809094?profile=original

1) Transforming Security: Containers, Virtualization and Softwarization

Speaker: Dennis Moreau ( @DoctroMoreau )

This session will explore how we can leverage containers, network/endpoint virtualization technologies and virtualized security instrumentation, concurrently, to transformationally improve security visibility, security analytics, system resilience and actionable context, greatly increasing our ability to attest that systems will be secure and compliant in any state into which they may be driven.

>>Go To Presentation

8669808873?profile=original

2) Embedded Systems Security: Building a More Secure Device

Speaker: Randall Brooks ( @randallsbrooks )

Here's an overview of the presentation: What are common embedded systems?; What issues do they face?; Recommendations for securing embedded systems

>>Go To Presentation


8669811274?profile=original

3) Bring Your Own Internet of Things: BYO‐IoT

Speaker: Carsten Eiram ( @carsteneiram ), Jake Kouns ( @jkouns )

Here's an overview of the presentation: What is loT?; What's the Problem?; What's the Attack Surface?; IoT Security - Current State; Response and Actions

>>Go To Presentation


8669808085?profile=original

4) DevSecOps in Baby Steps

Speaker: Hart Rossman ( @HartDanger )

Here's an overview of the presentation: Getting to DevOps; DevOps to DevSecOps; Planning your Epics & Sprints; Use Cases & Examples

>>Go To Presentation

8669811692?profile=original

5) Lattice Cryptography

Speaker: Anamaria Costache; Joris Barrier

Somewhat homomorphic encryption schemes using lattices and lattice libraries are discussed. Topic 1: Which Ring-based Somewhat Homomorphic Encryption Scheme Is Best? Authors: Anamaria Costache and Nigel Smart Topic 2: NFLlib: NTT-based Fast Lattice Library Authors: Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian and Tancrède Lepoint

>>Go To Presentation

8669811495?profile=original

6) Hardware Attacks and Security

Speaker: Daisuke Moriyama; Peter Pessl

Physical side channel attacks and physical unclonable functions (PUFs) are discussed. Topic 1: Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability Authors: Peter Pessl and Stefan Mangard Topic 2: Towards a Unified Security Model for Physically Unclonable Functions Authors: Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi and Moti Yung

>>Go To Presentation


8669808871?profile=original

7) Integrating Cybersecurity into Supply Chain Risk Management

Speaker: Jon Boyens

Cyber–supply chain risks pose a new set of challenges for businesses (loss of critical IP, unwanted functionality in products) which jeopardize brand reputation and shareholder value. This session will present case study research from NIST on cutting-edge practices and tools that today’s industry leaders in supply chain risk management are deploying to secure their supply chains from end to end.

>>Go To Presentation

8669804085?profile=original

8) Braking the Connected Car: The Future of Vehicle Vulnerabilities

Speaker: Akshay Anand ( @iamakshayanand ); Karl Brauer ( @karlbrauer )

In this presentation, analysts from Kelley Blue Book’s Automotive Industry Insights will illustrate how the connected car is quickly becoming an unrestricted playground for cyberthreats and how the next generation of in-car technology will intensify already-present vehicle vulnerabilities.

>>Go To Presentation


8669808499?profile=original

9) Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device

Speaker: Nathan Lesser ( @natelsr )

Imagine being dependent on a wireless infusion pump to receive the correct dosage of life-supporting medication. Now imagine the implications, were that pump to be maliciously hacked. In this session learn more about how to successfully secure these medical devices, based on work being conducted at the National Cybersecurity Center of Excellence (NCCoE) with premier health care organizations.

>>Go To Presentation


8669812097?profile=original

10) A New Security Paradigm for IoT (Internet of Threats)

Speaker: Hadi Nahari ( @hadinahari )

All facets of computing have changed since the 1950s, except the security posture of our systems; nowhere is this more the case than in mobile and IoT. Some of our security foundations are outdated: chief among them “static” security, which assumes the threat landscape is static and predetermined. This session will describe the old static security paradigm and the new one: analytics-driven security.

>>Go To Presentation


8669812697?profile=original

11) What Is Next-Generation Endpoint Security and Why Do You Need It?

Speaker: Jon Oltsik ( @joltsik )

This session will clarify the definition of next-generation endpoint security and distinguish it from legacy antivirus software. It will also describe how next-generation endpoint security can help organizations improve incident prevention, detection and response.

>>Go To Presentation

8669813059?profile=original

12) Attacks on Critical Infrastructure: Insights from the “Big Board”

Speaker: Daniel Cohen ( @iFraudFighter ), Robert Griffin ( @RobtWesGriffin )

Targeted attacks on critical infrastructure continue to increase in number and severity. We’ll present the latest data on these attacks: What is their goal? What are the attacker strategies? How are attacks supported by the darknet? We’ll discuss banking threats discovered at the “Big Board” at the RSA Anti-Fraud Control Center and Smart Grid threat detection in the EU SPARKS project.

>>Go To Presentation

8669812256?profile=original

13) Security Advantages of Software-Defined Networking

Speaker: Edward Amoroso

Current practices using wide-area routing over Internet infrastructure decentralize the control of how information is transferred. Software-Defined Networking (SDN) centralizes network control functions, offering more holistic network security management and allowing for dynamic divisioning, multivendor end-to-end security and reduced dependence on the traditional perimeter approach.

>>Go To Presentation

8669813256?profile=original

14) Smart Megalopolises. How Safe and Reliable Is Your Data?

Speaker: Denis Legezo ( @legezo )

Road sensors which collect raw data for intelligent transport systems are hugely important, with key decisions around road improvement, traffic jam management and traffic light patterns based on the information they collect. Radars transmit this data to an operation center for detailed analysis, but can governments truly trust and rely on the data?

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Read more…

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top SoftwareApplication Security & DevOps talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669808873?profile=original

1) Embedded Systems Security: Building a More Secure Device

Speaker: Randall Brooks ( @randallsbrooks )

Here's an overview of the presentation: What are common embedded systems?; What issues do they face?; Recommendations for securing embedded systems

>>Go To Presentation

8669812277?profile=original

2) Introducing a Security Program to Large Scale Legacy Products

Speaker: Millard Taylor ( @tad_taylor )

A discussion of the real-world work and challenges to introduce and maintain a comprehensive security program to a large and complex set of legacy storage products. This includes developing a security architecture, vulnerability response, pushing for necessary security enhancements and application security. In this session, you will hear about which efforts worked well and which didn’t.

>>Go To Presentation

8669813469?profile=original

3) Agile Security—Field of Dreams

Speaker: Laksh Raghavan ( @laraghavan )

PayPal started its Waterfall to Agile transformation journey two years ago. That meant that the software security program had to morph as well. The Field of Dreams question of “if you build it, will they come?” was no longer a valid question! Come hear about real-world insights about integrating security into Agile—approaches, processes and tools put in place and the results from them.

>>Go To Presentation


8669813698?profile=original

4) Open-Source Security Management and Vulnerability Impact Assessment

Speaker: Gunter Bitz; Henrik Plate

Re-usage of Open Source Software (OSS) has increased in commercial software development by orders of magnitude. This presentation will show how OSS vulnerabilities can be managed at large scale (about 10,000 OSS usages in our case), and how to address sins from the past. At last a concept will be shown which automates the analysis of the exploitability potential of an insecure OSS component.

>>Go To Presentation

8669808085?profile=original

5) DevSecOps in Baby Steps

Speaker: Hart Rossman ( @HartDanger )

Here's an overview of the presentation: Getting to DevOps; DevOps to DevSecOps; Planning your Epics & Sprints; Use Cases & Example

>>Go To Presentation

8669814055?profile=original

6) Estimating Development Security Maturity in About an Hour

Speaker: Matthew Clapham ( @ProdSec )

The session describes a simple method of estimating a development team’s security maturity, i.e. how well they make a secure software product, by looking at five key factors. The factors and a simple rating system will be shown coupled with real-world samples. Applicable usage scenarios as well as comparison to other security maturity models will be given.

>>Go To Presentation

8669813900?profile=original

7) Understanding the “Why” in Enterprise Application Security Strategy

Speaker: Troy Grubb ( @TroyRGrubb )

The Hershey Company initiated a strategic initiative to identify all of the truly critical IT assets that enable the company’s continued success. The evaluation confirmed the importance of protecting their business critical SAP systems. To get executive cross functional buy-in the security team implemented an SAP Vulnerability Management program with a clear strategy of “why” to influence results.

>>Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Read more…

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks IAM,Artificial Intelligence,datasecurity,crypto & Others at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669810084?profile=original

1) DON'T Use Two-Factor Authentication...Unless You Need It!
Speaker: Michael Schwartz ( @GluuFederation )

Conventional wisdom tells us to use two-factor authentication—and it does help to improve security. But the best way to reduce user-friction is to never require a person to authenticate. This talk will provide a modern solution to reconcile these two divergent imperatives by leveraging standard profiles of OAuth2 for “trust elevation.” It’s not just the front door that needs protection!

>>Go To Presentation

8669814077?profile=original

2) Rise of the Hacking Machines

Speaker: Konstantinos Karagiannis ( @konstanthacker )

This presentation gives you a good insight on Artificial Intelligence from classification to some evolution factors like the scanners without AI and more.

>>Go To Presentation

8669813879?profile=original

3) Intelligent Application Security

Speaker: Julian Cohen ( @HockeyInJune )

This presentation gives you a good insight into application security, it's stats, case studies along with a suggested new security strategy.

>>Go To Presentation

8669814272?profile=original


4) Applying Auto-Data Classification Techniques for Large Data Sets

Speaker: Anchit Arora ( @ancarora )

In the current data security landscape, large volumes of data are being created across the enterprise. Manual techniques to inventory and classify data makes it a tedious and expensive activity. To create a time and cost effective implementation of security and access controls, it becomes key to automate the data classification process.

>>Go To Presentation

8669814476?profile=original

5) Realities of Data Security

Speaker: Scott Carlson ( @relaxed137 )

PayPal delivers secure payment solutions across the world. Managing the security of customer data is expected across the financial services industry. This talk will focus on real-world strategies that PayPal has employed within our data environment, all while supporting multiple “As a Service,” “World-wide Scale,” “NoSQL” and “Cloud” technologies within a 10+-year-old company.

>>Go To Presentation

8669811692?profile=original

6) Crypto 101: Encryption, Codebreaking, SSL and Bitcoin

Speaker: Benjamin Jun ( @BenjaminJun )

Cryptography is the underpinning of digital security. Get introduced to the building blocks of crypto, how they’re applied to secure web connections and bitcoin, and how cryptosystems are attacked in the wild.

>>Go To Presentation

8669812277?profile=original


7) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


8669814668?profile=original

Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Read more…

Aspirin as a Service: Using the Cloud to Cure Security Headaches

Moving critical workloads into the cloud can be unnerving for security professionals. In reality, though, the cloud offers a whole new set of opportunities for the security team to do things even better than in their on-premises environment. Two seasoned cloud experts will explore the latest real-world, practical tools and techniques for becoming demonstrably more secure as you move to the cloud.

Speakers

Bill Shinn; Rich Mogull@rmogull )

Principal Security Solutions Architect, Amazon Web Services

Bill Shinn spends his time helping security teams understand privacy, security and compliance as they move their business to AWS. Prior to AWS, Shinn spent over 12 years managing and leading information security operations and architecture initiatives at some of the largest U.S. financial institutions, including U.S. Bank and JPMorgan Chase.

 

Rich Mogull has 20 years experience in information security, physical security and risk management. He specializes in cloud security, data security, application security, emerging security technologies and security management. He is also the principle course designer of the Cloud Security Alliance training class and actively works on developing hands-on cloud security techniques. Prior to founding Securosis, he was a Research Vice President at Gartner on the security team. Prior to his seven years at Gartner, he worked as an independent consultant, web application developer, software development manager at the University of Colorado, and systems and network administrator.

Detailed Presentation:

(Source: RSA USA 2016, San Francisco)

8669803288?profile=original

Read more…

List Of CISO Platform Task Force & Goals

Below are the few indicator topics upon which we will centre our discussion for different domains.

Cloud Security

  • How to assess the organizational need and readiness for cloud services
  • How to define the policies and controls for protection against risk in cloud services
  • How to evaluate the risk factors while opting for cloud services
  • How to evaluate cloud security providers
  • How to comply with regulations and standards and address data residency related concerns

Threat Modeling for Banking & Telcos

  • Understanding the various models of for conducting threat model
  • Practical use cases for threat modeling
  • Practical exercise of Threat Modeling for specific industry verticals
  • Threat Modeling for Banking Ecosystem (Only for participating banks)
  • Threat Modeling for Telcos (Only for participating telecom organizations)

SOC and SIEM

  • Learn how to architect your SOC or SIEM solution
  • Learn the benefits of moving from traditional SIEM to Security analytics
  • How to assess your organizational maturity for SIEM solutions?
  • How to evaluate SIEM vendors/tools
  • How to build Security and operations center
  • How to build incident response process and organization
  • Learn the Success and failure factors behind SIEM implementation from experts

Enterprise Mobility Security

  • Learn the taxonomy of EMM solution
  • How to architect your Mobility solution
  • How to apply data security policies to users/devices that frequent on and off your corporate network 
  • How to enable BYOD trend without compromising on the security of data and violating the regulatory mandates
  • How to evaluate different Mobility vendors/tools

iAM

  • How do you plan for IAM, PIM and PAM tool deployment in your organization 
  • How do you sell your idea to implement IAM solution to your management 
  • How do you evaluate IAM/PIM vendors and tools ?
  • How do you decide between the Multiple deployment options ?
  • How do you audit and report the actions of privileged users ?
  • What are the best practices, success and failure factors in IAM tool implementation ?
  • How do you measure the effectiveness of your IAM/PIM deployment

Data Security and DLP

  • How to do data classification ?
  • How to assess the organizational need and readiness for DLP solution
  • How to define requirements for selecting proper data security solution
  • How to evaluate a DLP vendor/Tool ?
  • What are the Success factors and failure factors in DLP implementation ?
  • How to define metrics to  measure the effectiveness of DLP tool ?

Advanced Persistent Threats

  • How do you deal with targeted and sophisticated attacks?
  • Critical capabilities for a APT solution and taxonomy
  • How do you prevent and respond to Ransomware attacks ?
  • How to you Identify and block complex javascript based attacks ?
  • What are the questions to ask APT vendor before selecting any APT solution ?
  • What metrics can be used to define & measure the effectiveness of your APT solution ?

DDOS attacks

  • How to Identify and remediate DDOS attacks ?
  • What are the different ways and tools to protect yourself from DDOS attacks ?
  • Critical capabilities for a DDOS security solution
  • How to evaluate DDOS vendors and tools ?
  • What are the best practices in implementing DDOS solution ?

Vendor risk management

  • Understanding the Vendor risks
  • How do you assess and manage the risk associated by the use of third party IT products and services ?
  • How to create a vendor risk management process and framework within your organization

SCADA Security

  • Understanding the risks and attack vectors for SCADA
  • Critical controls for SCADA security
  • Building a roadmap for securing SCADA

Enterprise Security Strategy

  • How to understands the Information Risk Model of your organization
  • Connecting the risks to controls using frameworks like COBIT
  • Building a roadmap and dashboard
  • Framework to present enterprise security strategy to management

IT GRC

  • Learn how to architect for GRC solution
  • How to Jumpstart your GRC program with freely available tools and content
  • Assess your organization's readiness for IT GRC solution
  • Learn to set up and  risk assessment workflow, risk acceptance process and IT risk metrics
  • Learn how to automate incidence response workflows
  • Learn to  measure and report compliance with regulation and other standards.
  • Critical capabilities for a IT GRC solution and taxonom
  • CISOs who implemented GRC to share their real life experiences
Read more…

Security intelligence is the act of gathering every available piece of information passing through an organization’s network in order to better understand who’s doing what with whom. Similar to business intelligence, it involves the automated processing of large volumes of data in order to develop profiles, seasonality patterns and other network usage insights; but unlike business intelligence, the goal is not to gain a deeper understanding of a market or identify related customer buying patterns. Rather, security intelligence seeks to understand what is normal with respect to user, application, and data-access behaviors so that when abnormal conditions exist, they can be detected.

8669805069?profile=original

What Will You Learn?

  • Setting Security Intelligence Goals
  • Moving Beyond Log Management & SIEM
  • Determining The Business Value Of Security Intelligence

>>Download Complete Report Here

Read more…

Crypto 101: Encryption, Codebreaking, SSL and Bitcoin

Cryptography is the underpinning of digital security. Get introduced to the building blocks of crypto, how they’re applied to secure web connections and bitcoin, and how cryptosystems are attacked in the wild.

Speakers

Benjamin Jun @BenjaminJun )

Ben is a professional seeker of HVF (Hard Valuable Fun) problems. He operates HVF Labs, a company creation lab and halfway house for former company founders. Ben formerly co-founded Cryptography Research, and over 20 billion consumer devices have shipped with security technologies he helped develop and architect. His security components play a role in leading payment systems, mobile phones, digital content, and semiconductor companies. Ben serves on the Board of Advisors of the RSA Conference.

Detailed Presentation:

 

(Source: RSA USA 2016, San Francisco)

8669803085?profile=original

Read more…

Realities of Data Security (RSA Conference 2016)

Realities of Data Security

PayPal delivers secure payment solutions across the world. Managing the security of customer data is expected across the financial services industry. This talk will focus on real-world strategies that PayPal has employed within our data environment, all while supporting multiple “As a Service,” “World-wide Scale,” “NoSQL” and “Cloud” technologies within a 10+-year-old company.

Speakers

Scott Carlson@relaxed137 )

Director - Security Strategy, PayPal

Scott Carlson is a driven technologist specialized in Information Security, Data Centers, Virtualization and Systems Architecture. Having spent the past 18 years in Fortune 500 companies leading engineering efforts across financial, education and Web 2.0 sectors, Carlson can speak technology, manage projects, can be AGILE, play well with others in SCRUMs and can draw diagrams that even senior executives understand. His speaking experience includes VMworld, Interop, RSA Conference USA, OpenStack Summit and the Arizona Technology Forum.

Detailed Presentation:

 

(Source: RSA USA 2016, San Francisco)

8669803288?profile=original

Read more…

Applying Auto-Data Classification Techniques for Large Data Sets

In the current data security landscape, large volumes of data are being created across the enterprise. Manual techniques to inventory and classify data makes it a tedious and expensive activity. To create a time and cost effective implementation of security and access controls, it becomes key to automate the data classification process.

Speakers

Anchit Arora ( @ancarora )

Program Manager, Cisco

Anchit Arora has over 10 years of information security experience across a variety of industry verticals. His areas of expertise include data security and governance, security and risk assessments of IT applications and systems, security strategy development, IT audits and SOX compliance. He has held prior positions with Ernst & Young (E&Y) and Portland General Electric. In his current role, as a Program Manager with Cisco, he is responsible for driving several strategic initiatives to protect Cisco’s intellectual property and customer data. Arora can be contacted at ancarora@cisco.com.

Detailed Presentation:

 

(Source: RSA USA 2016, San Francisco)

8669803085?profile=original

Read more…

DON'T Use Two-Factor Authentication...Unless You Need It!

Conventional wisdom tells us to use two-factor authentication—and it does help to improve security. But the best way to reduce user-friction is to never require a person to authenticate. This talk will provide a modern solution to reconcile these two divergent imperatives by leveraging standard profiles of OAuth2 for “trust elevation.” Its not just the front door that needs protection!

Speakers

Michael Schwartz@GluuFederation ); 

Mike Schwartz is the Founder of Gluu, a security software company serving companies, governments and universities around the world. Schwartz is a domain expert in application security, authentication and API access management. The Gluu Server is one of the leading implementations of OpenID Connect. Schwartz has participated in the development of standards like the User Managed Access (UMA) profile of OAuth2, a new standard for API access management. He also is Co-chair of the Open Trust Taxonomy for OAuth2, a working group at Kantara to create new standards for multiparty federation. Before starting Gluu, Schwartz was a security integrator for many large enterprises. He also was the Founder of an ISP in the ’90s. He now resides with his family (and pigeons) in Austin, TX.

Detailed Presentation:

(Source: RSA USA 2016, San Francisco)

8669803288?profile=original

Read more…

Introduction and a Look at Security Trends

The security industry has significantly changed over the last 25 years, as reflected in the content at RSA Conference. This introductory session will look at some of the major shifts, the economics that are driving the shifts, and the trends that are shaping current and future directions.

Speakers

Hugh Thompson 

Herbert (Hugh) Thompson is Program Chair for RSA Conference and a world-renowned expert on IT security. Thompson has co-authored several books on the topic and has written more than 80 academic and industrial publications on security. In 2006, he was named one of the “Top 5 Most Influential Thinkers in IT Security” by SC Magazine and has been interviewed by top news organizations, including the BBC, CNN, MSNBC, Financial Times, Washington Post and others. He has been an Adjunct Professor at Columbia University in New York and is Senior VP and Chief Security Strategist at Blue Coat Systems, Inc.

Detailed Presentation:

 

(Source: RSA USA 2016, San Francisco)

8669803288?profile=original

Read more…

The Seven Most Dangerous New Attack Techniques, and What's Coming Next

Which are the most dangerous new attack techniques for 2016/2017? How do they work? How can you stop them? What's coming next and how can you prepare? This fast-paced session provides answers from the three people best positioned know: the head of the Internet Storm Center, the top hacker exploits expert/teacher in the U.S., and the top expert on cyberattacks on industrial control systems.

Speakers

Johannes Ullrich@johullrich ); Ed Skoudis@edskoudis ); Mike Assante@assante_michael )

As Dean of Research for the SANS Technology Institute, Johannes Ullrich is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in the networking industry. Prior to working for SANS, Ullrich worked as a lead support engineer for a web development company and as a research physicist. Ullrich holds a Ph.D. in Physics from SUNY Albany and is located in Jacksonville, FL. He teaches courses on web application security, intrusion detection, IPv6 and more.

Ed Skoudis ( @edskoudis )

Instructor at SANS

Ed Skoudis Instructor at SANS is a security expert on hacker attacks and defenses, a world-renowned author and president of Counter Hack Challenges—the company that has built the most sophisticated cyber-competitions and ranges used by the U.S. military. He's demonstrated hacker techniques against financial institutions for the U.S. Senate and frequently speaks at security conferences. He is also a SANS Faculty Fellow who teaches thousands of information security professionals how to improve their skills and better defend their networks. He was also the expert called in by the White House to test the security viability if the Trusted Internet Connection (TIC) and provides after-attack analysis on most of the major attacks against commercial organizations where credit card data is lost.

Mike Assante ( @assante_michael )

ICS Director, SANS

Michael Assante is an internationally recognized thought leader in cybersecurity of industrial control systems. Assante held the position of Vice President and Chief Security Officer at the North American Electric Reliability Corporation and oversaw the implementation of cybersecurity standards across the North American electric power industry. Prior to joining NERC, Assante held notable positions at Idaho National Labs and was Vice President and Chief Security Officer for American Electric Power. Assante is a former U.S. Navy intelligence officer with experience in information warfare and information security management.

Detailed Presentation:

 

(Source: RSA USA 2016, San Francisco)

8669803085?profile=original

Read more…