Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Cryptography is the underpinning of digital security. Get introduced to the building blocks of crypto, how they’re applied to secure web connections and bitcoin, and how cryptosystems are attacke
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Cryptography is the underpinning of digital security. Get introduced to the building blocks of crypto, how they’re applied to secure web connections and bitcoin, and how cryptosystems are attacke
Realities of Data Security
PayPal delivers secure payment solutions across the world. Managing the security of customer data is expected across the financial services industry. This talk will focus on real-world strategies that PayPal has employed w
Applying Auto-Data Classification Techniques for Large Data Sets
In the current data security landscape, large volumes of data are being created across the enterprise. Manual techniques to inventory and classify data makes it a tedious and expensive
Intelligent Application Security
This presentation gives you a good insight into application security, it's stats, case studies along with a suggested new security strategy.
Speakers
Julian Cohen ( @HockeyInJune )
Detailed Presentation:
Rise of the Hacking Machines
This presentation gives you a good insight on Artificial Intelligence from classification to some evolution factors like the scanners without AI and more.
Speakers
Konstantinos Karagiannis ( @konstanthacker )
Detailed
DON'T Use Two-Factor Authentication...Unless You Need It!
Conventional wisdom tells us to use two-factor authentication—and it does help to improve security. But the best way to reduce user-friction is to never require a person to authenticate. This
Introduction and a Look at Security Trends
The security industry has significantly changed over the last 25 years, as reflected in the content at RSA Conference. This introductory session will look at some of the major shifts, the economics that are
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Which are the most dangerous new attack techniques for 2016/2017? How do they work? How can you stop them? What's coming next and how can you prepare? This fast-paced session pro
State of Cybersecurity: 2016 Findings and Implications
This session will present key results of ISACA and RSA’s State of Cybersecurity Survey. Learn findings of the current cybersecurity landscape. Understand current threats and vulnerabilities as w
Smart Megalopolises. How Safe and Reliable Is Your Data?
Road sensors which collect raw data for intelligent transport systems are hugely important, with key decisions around road improvement, traffic jam management and traffic light patterns based
Security Advantages of Software-Defined Networking
Current practices using wide-area routing over Internet infrastructure decentralize the control of how information is transferred. Software-Defined Networking (SDN) centralizes network control funct
Attacks on Critical Infrastructure: Insights from the “Big Board”
Targeted attacks on critical infrastructure continue to increase in number and severity. We’ll present the latest data on these attacks: What is their goal? What are the attacker stra
What Is Next-Generation Endpoint Security and Why Do You Need It?
This session will clarify the definition of next-generation endpoint security and distinguish it from legacy antivirus software. It will also describe how next-generation endpoint sec
A New Security Paradigm for IoT (Internet of Threats)
All facets of computing have changed since the 1950s, except the security posture of our systems; nowhere is this more the case than in mobile and IoT. Some of our security foundations are outdat
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Imagine being dependent on a wireless infusion pump to receive the correct dosage of life-supporting medication. Now imagine the implications, were that pump to be maliciou
Braking the Connected Car: The Future of Vehicle Vulnerabilities
In this presentation, analysts from Kelley Blue Book’s Automotive Industry Insights will illustrate how the connected car is quickly becoming an unrestricted playground for cyberthreat
Integrating Cybersecurity into Supply Chain Risk Management
Cyber–supply chain risks pose a new set of challenges for businesses (loss of critical IP, unwanted functionality in products) which jeopardize brand reputation and shareholder value. This
Hardware Attacks and Security
Physical side channel attacks and physical unclonable functions (PUFs) are discussed. Topic 1: Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability Authors: Peter Pessl and Stefan Mangard
Lattice Cryptography
Somewhat homomorphic encryption schemes using lattices and lattice libraries are discussed. Topic 1: Which Ring-based Somewhat Homomorphic Encryption Scheme Is Best? Authors: Anamaria Costache and Nigel Smart Topic 2: NFLlib: NT
DevSecOps in Baby Steps
Here's an overview of the presentation: Getting to DevOps; DevOps to DevSecOps; Planning your Epics & Sprints; Use Cases & Examples
Speakers
Hart Rossman ( @HartDanger )
Detailed Presentation:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…