Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference 2016.
RSA Conference held its 25th annual
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference 2016.
RSA Conference held its 25th annual
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Hacking & Attack Technique at RSA Conference 2016.
RSA Conference held its
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Security Awareness and Human Element at RSA Conference 2016.
RSA Conferenc
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Information Security Trends talks at RSA Conference 2016.
RSA Conference held its 2
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Moving critical workloads into the cloud can be unnerving for security professionals. In reality, though, the cloud offers a whole new set of opportunities for the security team to do
Below are the few indicator topics upon which we will centre our discussion for different domains.
Cloud Security
Security intelligence is the act of gathering every available piece of information passing through an organization’s network in order to better understand who’s doing what with whom. Similar to business intelligence, it involves the automated proces
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Cryptography is the underpinning of digital security. Get introduced to the building blocks of crypto, how they’re applied to secure web connections and bitcoin, and how cryptosystems are attacke
Realities of Data Security
PayPal delivers secure payment solutions across the world. Managing the security of customer data is expected across the financial services industry. This talk will focus on real-world strategies that PayPal has employed w
Applying Auto-Data Classification Techniques for Large Data Sets
In the current data security landscape, large volumes of data are being created across the enterprise. Manual techniques to inventory and classify data makes it a tedious and expensive
Intelligent Application Security
This presentation gives you a good insight into application security, it's stats, case studies along with a suggested new security strategy.
Speakers
Julian Cohen ( @HockeyInJune )
Detailed Presentation:
Rise of the Hacking Machines
This presentation gives you a good insight on Artificial Intelligence from classification to some evolution factors like the scanners without AI and more.
Speakers
Konstantinos Karagiannis ( @konstanthacker )
Detailed
DON'T Use Two-Factor Authentication...Unless You Need It!
Conventional wisdom tells us to use two-factor authentication—and it does help to improve security. But the best way to reduce user-friction is to never require a person to authenticate. This
Introduction and a Look at Security Trends
The security industry has significantly changed over the last 25 years, as reflected in the content at RSA Conference. This introductory session will look at some of the major shifts, the economics that are
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Which are the most dangerous new attack techniques for 2016/2017? How do they work? How can you stop them? What's coming next and how can you prepare? This fast-paced session pro
State of Cybersecurity: 2016 Findings and Implications
This session will present key results of ISACA and RSA’s State of Cybersecurity Survey. Learn findings of the current cybersecurity landscape. Understand current threats and vulnerabilities as w
Smart Megalopolises. How Safe and Reliable Is Your Data?
Road sensors which collect raw data for intelligent transport systems are hugely important, with key decisions around road improvement, traffic jam management and traffic light patterns based
Security Advantages of Software-Defined Networking
Current practices using wide-area routing over Internet infrastructure decentralize the control of how information is transferred. Software-Defined Networking (SDN) centralizes network control funct
Attacks on Critical Infrastructure: Insights from the “Big Board”
Targeted attacks on critical infrastructure continue to increase in number and severity. We’ll present the latest data on these attacks: What is their goal? What are the attacker stra
What Is Next-Generation Endpoint Security and Why Do You Need It?
This session will clarify the definition of next-generation endpoint security and distinguish it from legacy antivirus software. It will also describe how next-generation endpoint sec
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…