Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

8669803265?profile=original

1) Open Security Controller - Security  Orchestration for OpenStack

Speaker: Manish Dave, Tarun Vishwanathan

Open Security Controller enables orchestration of multiple security functions in an OpenStack DC. OSC integrates with multiple SDN controllers and Security VNFs to automate protection of DC resources.

>> Go to presentation

8669806685?profile=original

2) Hacking Blockchain

Speaker: Konstantinos Karagiannis

Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity management, verifiable records and digital assets such as stocks. Is the industry building new systems on a cryptographically weak foundation? What threats does blockchain face?

>> Go to presentation

8669810856?profile=original

3) IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud

Speaker: Emil Isaakian

In this technical deep dive, Emil Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MACSec/ESS. Additionally he’ll show use cases to show how to succesfully deploy MACSec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier Ethernet), LAN and cloud infrastructure.

>> Go to Presentation

8669810889?profile=original

4) Cybersecurity vs. Tokenization

Speaker: Jeff Stapleton, Sandra Lambert

Tokenization is the latest data protection method, but does it help or hinder cybersecurity—this is the current debate. This session will look at who, what, where, when, how and why of using tokens.

>> Go to presentation

8669807256?profile=original

5) Client side encryption without knowing  its limits is a ticking time bomb!

Speaker: Mohamed Quatar Research Institute

Cloud and mobile computing give room to an unprecedented level of access points into corporate data leaving you to rethink how to protect it. Client-side encryption is increasingly being used as a solution. While it solves the problem of unauthorized access, it is still in its infancy and has many limitations and pitfalls that IT practitioners should consider before embracing it.

>> Go to presentation

8669806893?profile=original

6) How Google Protects Its Corporate  Security Perimeter without Firewalls

Speaker: Heather Adkins, Rory Ward

The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its groundbreaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place, where it's headed and how you can apply this approach to your organization.

>> Go to presentation

8669806299?profile=original

7) Fighting Cybercrime Using the Blockchain

Speaker: Kathryn Haun, Jonathan Levin

Bitcoin is sometimes described as the “currency of criminals,” and we all see stories about how criminals use bitcoin to move money and extract ransoms. But did you know that law enforcement also uses the blockchain—bitcoin’s distributed, immutable, permanent record of transactions—to investigate cybercrime? Come learn more about how bitcoin’s underlying technology helps fight cybercrime

>> Go to presentation

8669808459?profile=original

8) The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection

Speaker: Dmitriy Ayrapetov

The dramatic rise in malicious code designed to evade detection, specifically from network sandboxes, caused industry analysts to suggest the deployment of multiple network sandboxes for the same network. Learn how to maximize protection from advanced persistent threats by using multiple security engines within the same sandbox and best practices to stop advanced malware including ransomware.

>> Go to presentation

8669812277?profile=original


9) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


8669814668?profile=original

Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)