Optimizing the Mobile Cloud Era Through Agility and Automation
|
VMware
,
AirWatch
|
Illuminating the Deep Dark Web With Drugs, Exploits, and Zero-Days
|
|
Good Bot, Bad Bot, Ugly Bot. Battle of the Bots!
|
|
You’ve Done Everything Right, and Still There’s a Breach. Now What?
|
RSA
|
2015 Industrial Control Systems Vulnerability Trends
|
|
Defending Zero-Day-Lessons from the Ebola Outbreak
|
|
ShadowOS: Modifying the Android OS for Mobile Application Testing
|
|
Securing the Next-Generation Data Center
|
|
Achieving Cyber Identity Resolution via Electronic Warfare Techniques
|
|
The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud
|
|
Understanding Threats Using Big Data and Contextual Analytics
|
|
Outgunned in Cyberspace
|
FireEye, Inc.
|
Hot Topics in Privacy: A Conversation with Privacy Leaders
|
|
Inside of APK Protectors
|
|
Network of Steel – Designing Ultra-Resilient Networks to Counter Mega Scale Cyber Attacks
|
|
Validating the Security of the Borderless Infrastructure
|
Spirent Communications
|
Future of Networking Technologies – Incremental Change or Disruptive Shift?
|
|
Detecting Inherent Android Apps Threats and Vulnerabilities
|
|
Security 2.0: Assuring Your Security Investments Work for You
|
Layered Insight
|
Mitigating Cybersecurity Threats on Mobile Platforms
|
|
SSL Threats are Here—Is Your Architecture Ready?
|
Blue Coat
|
Crypto-Segmentation: Protecting Networked Applications When Firewalls Fail
|
|
The Android Developer’s Guide to 3rd Party SDK Assessment and Security
|
|
Assume Breach: An Inside Look at Cloud Service Provider Security
|
Google Inc.
|
Peer Collaboration - The Next Best Practice for Third Party Risk Management
|
|
Debunking Myths About Attribution and New Strategies to Protect Your Data
|
|
"Sophisticated Attacks": The New Normal For Security Programs
|
|
Understanding the Data Breaches of 2014. Did It Have To Be This Way?
|
Fortinet, Inc.
|
Unpacking Asia-Pacific Cyber Maturity
|
|
Hiring the Right Person for the Most Challenging Security Role of All
|
|
The Evolution of Cyber Attacks on Australian Banks
|
|
DNS in the Crossfire: 2 Years of Hijacks and Defacements
|
Michael Smith
|
Business with Compassionate Intelligence
|
|
New Ways of Emerging APT Actors: India, South Africa, Nigeria, and Indonesia
|
Wayne Huang
|
Shadow IT – Protecting Data and Applications Outside of Your Control
|
|
The New Key Management- Unlocking the Safeguards of Keeping Keys Private
|
|
Getting Serious About Privacy and Cyber Security in Asia Pacific
|
|
The Enemy You Know
|
Independent Security Evaluators
|
Mobile Malware: How Phones Get Hacked and How To Analyze the Malware…Live!
|
RSA
|
Security Considerations for Mobile Payment Devices: Trends, Risks and Countermeasures
|
PwC
|
Know Your Risks: Content Security Policy Report Aggregation and Analysis
|
|
DDoS: Barbarians At The Gate(way)
|
Akamai Technologies
|
Compliance Goal: Implementing Segregation of Duties In An Organization
|
|
Targeted Attacks, APT’s & Cyberwar - A MKT Buzz or a Real Business Threat?
|
Trend Micro, Inc.
|
Innovation Sandbox Most Innovative Start-Up
|
|
Building Blocks of Operational Systems Cyber Worthiness
|
|
The Terrorist’s Son – A Story of Choice
|
|
Mobile App Security Mandates Identity, Authenticity and Trustworthiness
|
|
Does FIDO Really Usher the Death of Passwords?
|
RSA
|
"Is It Secret? Is It Safe?" - Mining the Global Internet for Early Warning
|
Arbor Networks
|
Adaptive Trust for Secure Enterprise Mobility
|
|
Ransomware, a Good Driver for Backups
|
|
SANS Intense Hands-On Pen Testing Skill Development
|
|
Are Enterprises in a Losing Battle Against Targeted Attacks?
|
Trend Micro, Inc.
|
Migration of Malware - APAC Targeting Threats
|
|
Effective Partnerships: Security and Privacy in Smart Cities
|
|
Hackers vs. The Anti-Malware Vendors: The Blue-Pill in Mobile Applications
|
Yair Amit
,
Modern OS, Symantec
|
Malware Actors and Espionage: A Shift in the Criminal Value Chain
|
Fox-IT
|
Security Lessons Learned: Enterprise Adoption of Cloud Computing
|
|
What Do You Do When the Alarm Sounds? Managing Cyber Crises
|
Booz Allen Hamilton
|
Threat Forecasting (Leveraging Big Data for Predictive Analysis)
|
Spirent Communications
|
SANS Digital Forensics & Incident Response Workshop
|
|
Getting Ahead of Cybercrime
|
|
Securing Dispersed Networks
|
|
High Dimensional Visualization of Malware Families
|
Matt Wolff
,
Cylance
|
How APIs Turned Cloud Security on its Head
|
|
The Game Has Changed
|
|
Cloud Without Borders: Paving the Way for Global Security and Privacy
|
Qualys, Inc.
|
Mobile Security: All You Want to Know About Standards But Are Afraid to Ask
|
|
Nation State & Hacktivist Attacks: Targeted Hits on Asian Organizations
|
FireEye, Inc.
|
They Will Get In. Detect and Respond to Advanced Threats
|
LogRhythm
|
The Psychology of InfoSec
|
|
Securing the Cloud of Clouds
|
|
Detection of Advanced Attacks with a CPU Level Sandbox Technology
|
Check Point Software Technologies
|
SANS Incident Response and Indicators of Compromise
|
Instructor
,
SANS Institute
|
Security Risks in SDN and Other New Software Apps
|
|