Star 0

Talks

Title Humans
Optimizing the Mobile Cloud Era Through Agility and Automation VMware , AirWatch
Illuminating the Deep Dark Web With Drugs, Exploits, and Zero-Days
Good Bot, Bad Bot, Ugly Bot. Battle of the Bots!
You’ve Done Everything Right, and Still There’s a Breach. Now What? RSA
2015 Industrial Control Systems Vulnerability Trends
Defending Zero-Day-Lessons from the Ebola Outbreak
ShadowOS: Modifying the Android OS for Mobile Application Testing
Securing the Next-Generation Data Center
Achieving Cyber Identity Resolution via Electronic Warfare Techniques
The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud
Understanding Threats Using Big Data and Contextual Analytics
Outgunned in Cyberspace FireEye, Inc.
Hot Topics in Privacy: A Conversation with Privacy Leaders
Inside of APK Protectors
Network of Steel – Designing Ultra-Resilient Networks to Counter Mega Scale Cyber Attacks
Validating the Security of the Borderless Infrastructure Spirent Communications
Future of Networking Technologies – Incremental Change or Disruptive Shift?
Detecting Inherent Android Apps Threats and Vulnerabilities
Security 2.0: Assuring Your Security Investments Work for You Layered Insight
Mitigating Cybersecurity Threats on Mobile Platforms
SSL Threats are Here—Is Your Architecture Ready? Blue Coat
Crypto-Segmentation: Protecting Networked Applications When Firewalls Fail
The Android Developer’s Guide to 3rd Party SDK Assessment and Security
Assume Breach: An Inside Look at Cloud Service Provider Security Google Inc.
Peer Collaboration - The Next Best Practice for Third Party Risk Management
Debunking Myths About Attribution and New Strategies to Protect Your Data
"Sophisticated Attacks": The New Normal For Security Programs
Understanding the Data Breaches of 2014. Did It Have To Be This Way? Fortinet, Inc.
Unpacking Asia-Pacific Cyber Maturity
Hiring the Right Person for the Most Challenging Security Role of All
The Evolution of Cyber Attacks on Australian Banks
DNS in the Crossfire: 2 Years of Hijacks and Defacements Michael Smith
Business with Compassionate Intelligence
New Ways of Emerging APT Actors: India, South Africa, Nigeria, and Indonesia Wayne Huang
Shadow IT – Protecting Data and Applications Outside of Your Control
The New Key Management- Unlocking the Safeguards of Keeping Keys Private
Getting Serious About Privacy and Cyber Security in Asia Pacific
The Enemy You Know Independent Security Evaluators
Mobile Malware: How Phones Get Hacked and How To Analyze the Malware…Live! RSA
Security Considerations for Mobile Payment Devices: Trends, Risks and Countermeasures PwC
Know Your Risks: Content Security Policy Report Aggregation and Analysis
DDoS: Barbarians At The Gate(way) Akamai Technologies
Compliance Goal: Implementing Segregation of Duties In An Organization
Targeted Attacks, APT’s & Cyberwar - A MKT Buzz or a Real Business Threat? Trend Micro, Inc.
Innovation Sandbox Most Innovative Start-Up
Building Blocks of Operational Systems Cyber Worthiness
The Terrorist’s Son – A Story of Choice
Mobile App Security Mandates Identity, Authenticity and Trustworthiness
Does FIDO Really Usher the Death of Passwords? RSA
"Is It Secret? Is It Safe?" - Mining the Global Internet for Early Warning Arbor Networks
Adaptive Trust for Secure Enterprise Mobility
Ransomware, a Good Driver for Backups
SANS Intense Hands-On Pen Testing Skill Development
Are Enterprises in a Losing Battle Against Targeted Attacks? Trend Micro, Inc.
Migration of Malware - APAC Targeting Threats
Effective Partnerships: Security and Privacy in Smart Cities
Hackers vs. The Anti-Malware Vendors: The Blue-Pill in Mobile Applications Yair Amit , Modern OS, Symantec
Malware Actors and Espionage: A Shift in the Criminal Value Chain Fox-IT
Security Lessons Learned: Enterprise Adoption of Cloud Computing
What Do You Do When the Alarm Sounds? Managing Cyber Crises Booz Allen Hamilton
Threat Forecasting (Leveraging Big Data for Predictive Analysis) Spirent Communications
SANS Digital Forensics & Incident Response Workshop
Getting Ahead of Cybercrime
Securing Dispersed Networks
High Dimensional Visualization of Malware Families Matt Wolff , Cylance
How APIs Turned Cloud Security on its Head
The Game Has Changed
Cloud Without Borders: Paving the Way for Global Security and Privacy Qualys, Inc.
Mobile Security: All You Want to Know About Standards But Are Afraid to Ask
Nation State & Hacktivist Attacks: Targeted Hits on Asian Organizations FireEye, Inc.
They Will Get In. Detect and Respond to Advanced Threats LogRhythm
The Psychology of InfoSec
Securing the Cloud of Clouds
Detection of Advanced Attacks with a CPU Level Sandbox Technology Check Point Software Technologies
SANS Incident Response and Indicators of Compromise Instructor , SANS Institute
Security Risks in SDN and Other New Software Apps