Intelligence-Driven Security: The New Model
|
RSA
|
The Future of Cloud Identity Security
|
|
Cracked SSL?
|
|
Practical Security Risk Management Strategies in a Mobile and Consumerised IT World
|
Protiviti
|
Mastering Security in Agile/Scrum, Case Study
|
|
HOB, The Company and their Core Products for Global Secure Remote Access
|
|
Big Data: Big Threat or Big Opportunity for Security?
|
Qualys, Inc.
|
Reality Check: 3D View of your Security Stance
|
Check Point Software Technologies
|
Liars and Outliers: Enabling the Trust that Society Needs to Thrive (Schneier) Securing the Virtual Environment: How to Defend the Enterprise Against Attack (Ottenheimer)
|
Davi Ottenheimer
|
Incident Response: How is it Affected by Social Media?
|
|
No Followers? No Botnet? No Problem! Asymmetric Denial of Service Attacks
|
Microsoft Corporation
|
How To Rob An Online Bank And Get Away With It
|
Mitja Kolsek
,
ACROS Security
|
The Dark Side of BYOD – Privacy, Personal Data Loss and Device Seizure
|
|
Are We Protecting The Wrong Thing?
|
Palo Alto Networks
|
Training Employees to Recognise and Avoid Advanced Threats
|
RSA
|
Step into the Future: HTML5 and its Impact on SSL VPNs
|
|
Your Indiscriminate Data
|
|
How SCIM Simplifies Migration to Cloud Services
|
|
Cyber Incident Reporting in the EU
|
|
Cloud Provider Auditing and Assurance
|
|
Ways To Interpret Security Standards - What We Can Learn from the Law
|
|
Moving Your SOC Beyond The Bloatware
|
|
The Rise of Creativity in Cyber Security
|
|
Defending Behind the Device: Mobile Application Risks
|
|
Using Social Engineering Tactics for Big Data Espionage
|
|
DarkMarket: How Hackers Became the New Mafia
|
|
Big Data: Nought to Sixty in 5 Minutes
|
|
How Can You Configure the Human Firewall?
|
RSA
|
BYOD vs. Choose Your Own Device & the Tools for Success?
|
|
Industry Hot Topics – Exposed and Dissected
|
Qualys
|
Evolve or Lose
|
|
Securing the Desktop with Micro-Virtualization
|
|
The Science Lab: Live RAT Dissection
|
|
Cloud Provisioning and Security Using Oauth2 and SCIM
|
|
"Are We Getting Better?" Why We Don't Know. What We Can Do About It.
|
|
Informatica Data Privacy – How to Mitigate Risk and Make the Business Case
|
|
SSL and Browser Security: Why is it Such an Uphill Battle?
|
Qualys
|
Phishing your Employees: Lessons Learned from Phishing over 3.5 Million People
|
|
Securing Big Data: Learning and Differences from Cloud Security
|
Cisco Systems
|
The Legal Attack Vector: How To Protect Yourself
|
|
Ensure IT Resiliency with Actionable Security Intelligence
|
|
The Struggle for Control of the Internet
|
|
We Are Anonymous: Inside The Hacker World Of LulzSec, Anonymous, And The Global Cyber Insurgency
|
|
Dissecting Advanced Targeted Attacks – Separating Myths from Facts
|
Candid Wueest
,
Symantec
|
Hacker Interrupted: Preventing Hackers on Your Website Using Deception
|
|
Cases of JavaScript Misuse and How to Avoid Them
|
|
Using Security Intelligence to Stay Out of the Headlines
|
|
MITB Attacks: What Works? What Doesn't?
|
|
Smartphone Security Winners & Losers
|
|
Risks and Rewards in Cloud Adoption
|
Microsoft Corporation
|
They’re Inside…Now What?
|
|
The XX Factor: Why Women are Key to the Future of Security
|
Markel Corporation
|
Poortego: An OS-INT correlation tool for the 99%
|
Zscaler, Inc.
|
Full Employment: Good or Bad News for the Information Security Profession?
|
|
Cloud Security Alliance Summit Europe: Assurance, Transparency & Education
|
|
A Flexible and Comprehensive Approach to a Cloud Compliance Program
|
Microsoft Corporation
|
UK Government Identity Assurance Programme - Easier Done than Said
|
|
Cyber Crime, Easy as Pie and Damn Ingenious
|
SANS Institute
|
The Mobile Criminal: A Pocket Full of Maliciousness
|
Gunter Ollmann
,
NCC Group
|
Should you Train Employees on Security Awareness?
|
|
Games of Keys and Clouds: Finding a (Nash) Equilibrium of Trust
|
RSA
|
Cyber Jihad vs. Cyberterrorism - Separating Hype From Reality
|
|
Microsoft Security Intelligence Report
|
WW Cybersecurity & Data Protection, Microsoft
|
The Mobile Enterprise: 7 Strategies to Manage Risk & Maximise Opportunity
|
Intel Corporation
|
Breaking the Failure Cycle – Why Breaches from Known Threats Still Happen
|
Dell SecureWorks
|
Flipit: A Game-Theory Handle on Password Reset and Other Renewal Defences
|
RSA
|
Security Implications of the Internet Transition to IPv6
|
Cisco Systems
|
Cabinet Office, Government Digital Service, Identity Assurance Programme
|
|
Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition
|
Wendy Nather
,
Duo Security
|
Rock Your Communications with HTML5 WebSocket – Secure!
|
|
Customisable Security: Leveraging Big Data for Mobile Security
|
|
Democracy and the Internet
|
|
Dealing with Big Data in Cyber Intelligence
|
Palo Alto Networks
|
7 Highly Effective Habits of a Security Awareness Program
|
|
Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?
|
|
Using Big Data to Solve the Riddle of Supply Chain Security
|
|
Social [Media|Impact|Contracts|Unrest|Activism] in a Hyper-Connected Future
|
|
Hacking the Virtual World
|
|
2012: Mayans, Mayhem And Malware
|
|
Privacy by Design, Security by Design
|
|
Implementing an Intelligent SOC
|
RSA
|
How to Set Up Integrated Security Governance Processes
|
|
Duqu, Flame, Gauss: Followers of Stuxnet
|
|
Trust, Security, and Society
|
Bruce Schneier
,
IBM Security
|
Opening the Kimono: Automating Behavioural Analysis for Mobile Apps
|
Michael Sutton
|
Surviving as a CISO in a World of Zombie Auditors, Twitter Twits, and Cavity Searches
|
Eddie Schwartz
,
Verizon
|
Active Defence: How to Counter Your Attackers
|
Davi Ottenheimer
|
Testing Darwinism: The History and Evolution of Network Resiliency
|
|
Securing the Supply Chain: Guide to Risk Management
|
|
Intelligence-Driven Security: In Action
|
RSA
|
Conflicting Visions of Cloud Identity
|
Microsoft Corporation
|
Protecting Your Data on Mobile Devices
|
|
Me and My Digital Shadow: Protecting and Detecting on the Social Web
|
|
The Growing Threat of Embedded Hacking
|
Cylance
|
ENISA's Work on Cloud Security and Cyber Exercises
|
|
Csirt, Cyber Extortion, Ddos Attacks, & Forensics
|
|
Hacking Senior Management - Selling Security to the Board
|
|
Deceiving Permissions - Rules for Android Malware Detection
|
|
Securing the Human: Our Industry’s Greatest Challenge
|
|
Encryption for Clouds
|
Davi Ottenheimer
|
What the Security Profession Can Learn From the Intelligence Profession
|
|
How to Build a Cyber Intelligence Capability
|
|
Entitlement; And Why Identity Needs to be About More Than Just People
|
|
De-identification: Entitlement or Identity?
|
|
Social Media: Whose Data is it Anyway?
|
|
Will Accredited Private Sector Organisations Provide Better Identity Services Than Governments?
|
|
10 Reasons Not to Virtualize: The Security Perspective
|
|
The Art of Cyber War: Know Thy Enemy, Know Thyself
|
|
Developing Secure Software in the Age of Advanced Persistent Threats
|
|
Privacy by Design—From Theory to Practice
|
Intel Corporation
|
Cloud Provider Assurance
|
|
Adversary ROI: Evaluating Security from the Threat Actor’s Perspective
|
|
How to Grow and Transform Your Risk and Security Programme into the Cloud
|
Qualys
|