Star 0

Talks

Title Humans
Cisco Unified Security Metrics: Measuring Your Organization’s Security Health Cisco Systems
APIs - 下一个黑客目标,或是业务与安全的机会? (安全基础结构)- APIs – The Next Hacker Target, or a Business and Security Opportunity? (Security Infrastructure)
Next Generation Enterprise Security Palo Alto Networks
From Data to Wisdom: Big Lessons in Small Data
What Are Your Key Definitive Strategies Against Advanced Persistent Threat Today?
「アンドロイド端末用スパイフォンを使ったサイバースパイ」(モバイルセキュリティ)- Cyber-Espionage Using an Android Spyphone (Mobile Security) Nokia
EITC Lessons Learned: Building Our Internal Security Intelligence Capability
How to Hadoop Without the Worry: Protecting Big Data at Scale Davi Ottenheimer
解开安全的锁链:软件 定义安全的战略和实践 - Security Unchained - Thoughts and Practices around Software Defined Security (Cloud and Data Security) NSFOCUS
Third Party Components in Applications: Understanding Application Security Codenomicon Ltd.
クラウド環境の信頼性の見直し:攻撃をしっかり防ぐための8つの基本ステップ-(クラウド及びデータセキュリティ)- Cloud Trust Redefined: Eight Essential Steps in a Strong Defense (Cloud and Data Security) Davi Ottenheimer
A Strategic Approach to Threat Intelligence Context Information Security Ltd.
Application Security - The Invisible Onslaught Gets Worse
Malware Defenses and Beyond 2014
Leave the App Alone! - Attack and Defense of Android App Hijack Baidu Inc.
Mobile Payment Services: Security Risks, Trends and Countermeasures
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Continuous Delivery and Risk Assessment CA
Supply Chain: The Exposed Flank Akamai Technologies
Cyber-Espionage Using an Android Spyphone Nokia
Securely Enable the Open Enterprise CA
Split and Conquer: Don’t Put All Your Keys in One Basket RSA
United We Stand, Divided We Fall RSA
The Second Machine Age
Minimizing the Threat of Mobile Banking Cybercrime Trend Micro, Inc.
Cybercrime Layers – How Cybercriminals Defeat Security Measures IBM Security
Is the Security Industry Ready for On Appliance SSL Decryption Features?
APIs – The Next Hacker Target, or a Business and Security Opportunity?
Son of SpyEye – a Crimeware Soap Opera Fox-IT
IP及び電話機能を利用した犯罪の多発-手口を知って賢い対策を!(サイバー犯罪と法執行機関)- IP and Telephony Crime Has Converged – Wake Up, Wise Up & Get Protected! (Cybercrime and Law Enforcement) Evolved Intelligence
Infrastructure Complexity – a Business Puzzle Worth Solving NTT
Cybercrime – Where Did We Go Wrong?
Cyber Early Warning and the Commonality of Cyber Warfare and Electronic Warfare
Accelerate Your Security Operations With Machine Speed Responses to Cyber Attacks CSG Invotas
Whose IP Is It Anyways: Tales of IP Reputation Failures IBM
The Perimeter is Dead! Birth of the Elastic Network
DDoS Past, Present, and Future Terrence Gareau
Combat Sophisticate Threats – How Big Data and Open SOC Could Help Cisco Systems
Mobile Security Attacks: A Glimpse From the Trenches Yair Amit , Modern OS, Symantec
The First Casualty of the Cyber Cold War Juniper Networks
Get Real: Operationalizing an Intelligence Driven Security Program
IP Challenges in Asia: Keeping Your Data Safe from Malware & Other Threats Shoshn Partners
Restoring Trust After a Data Breach Tripwire
あなたの冷蔵庫があなたを陥れようとしている? IoT攻撃と セキュリティソフトの埋め込み-(セキュリティ インフラストラクチャー)- Is Your Fridge Conspiring Against You? IoT Attacks and Embedded Defenses (Security Infrastructure) Qualys
IP and Telephony Crime Has Converged – Wake Up, Wise Up & Get Protected! Evolved Intelligence
Project 2020 - Preparing Your Organization for Future Cyber Threats, Today Trend Micro, Inc.
New Approaches for Defending IT in Today’s Threat Landscape
企業が直面する「脅威の現実」と「セキュリティ対策の現実 - The ‘Real Threats’ We Face Today vs. The ‘State of Reality’ (Threats & Risk Management) Trend Micro, Inc.
The Fall of Lance Armstrong and the Importance of the Truth The Sunday Times
Building and Breaking Privacy Barriers
Is Your Fridge Conspiring Against You? IoT Attacks and Embedded Defenses Qualys
Cloud Trust Redefined: Eight Essential Steps in a Strong Defense Davi Ottenheimer
EAS-SEC Project: Securing Enterprise Business Applications Alexander Polyakov , ERPScan
The Role of the ISACs in Critical Infrastructure Resilience FS-ISAC
Memory Forensics & Security Analytics: Detecting Unknown Malware
Brothers In Arms: How the Financial Sector Fought the Brobot Attacks FS-ISAC
Innovation Sandbox (Most Innovative Company Contest)
The Analytics Enabled SOC - Best Practices for Improving Incident Response and Breach Investigation Splunk
One Failure Leads to Another: Developing Leading Indicators for Security Threats and Risks
Software Defined Perimeter: Securing the Cloud to the Internet of Things
Securing Secure Browsers
Combatting Cyber Attacks Through Advanced Analytics & Intelligence Verizon
SANS Digital Forensics & Incident Response Workshop
Out-Connect the Threats Dell
离我的App远点儿! - Android应用劫持的攻与防 Baidu Inc.
了解并抵御现代DDoS的威胁(网络犯罪与执法) - Understanding and Defending Against the Modern DDoS Threat (Cybercrime and Law Enforcement)
The History of Internet Failures and How We Might Break the Cycle Qualys
Revenge of the Full Proxy
Learning Malware Languages: Fun with Dick and Jane’s Malware Damballa, Inc.
The Impact of National Laws on International Cloud Deployments Maddocks
Understanding and Defending Against the Modern DDoS Threat
Practical Attacks Against MDM Solutions Dan Koretsky , Lacoon Mobile Security
Will Your Company Be to Intellectual Property What Mt. Gox Was to Bitcoin?
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control APAC, SafeNet