Star 0

Talks

Title Humans
Intelligence-Driven Security: The New Model RSA
The Future of Cloud Identity Security
Cracked SSL?
Practical Security Risk Management Strategies in a Mobile and Consumerised IT World Protiviti
Mastering Security in Agile/Scrum, Case Study
HOB, The Company and their Core Products for Global Secure Remote Access
Big Data: Big Threat or Big Opportunity for Security? Qualys, Inc.
Reality Check: 3D View of your Security Stance Check Point Software Technologies
Liars and Outliers: Enabling the Trust that Society Needs to Thrive (Schneier) Securing the Virtual Environment: How to Defend the Enterprise Against Attack (Ottenheimer) Davi Ottenheimer
Incident Response: How is it Affected by Social Media?
No Followers? No Botnet? No Problem! Asymmetric Denial of Service Attacks Microsoft Corporation
How To Rob An Online Bank And Get Away With It Mitja Kolsek , ACROS Security
The Dark Side of BYOD – Privacy, Personal Data Loss and Device Seizure
Are We Protecting The Wrong Thing? Palo Alto Networks
Training Employees to Recognise and Avoid Advanced Threats RSA
Step into the Future: HTML5 and its Impact on SSL VPNs
Your Indiscriminate Data
How SCIM Simplifies Migration to Cloud Services
Cyber Incident Reporting in the EU
Cloud Provider Auditing and Assurance
Ways To Interpret Security Standards - What We Can Learn from the Law
Moving Your SOC Beyond The Bloatware
The Rise of Creativity in Cyber Security
Defending Behind the Device: Mobile Application Risks
Using Social Engineering Tactics for Big Data Espionage
DarkMarket: How Hackers Became the New Mafia
Big Data: Nought to Sixty in 5 Minutes
How Can You Configure the Human Firewall? RSA
BYOD vs. Choose Your Own Device & the Tools for Success?
Industry Hot Topics – Exposed and Dissected Qualys
Evolve or Lose
Securing the Desktop with Micro-Virtualization
The Science Lab: Live RAT Dissection
Cloud Provisioning and Security Using Oauth2 and SCIM
"Are We Getting Better?" Why We Don't Know. What We Can Do About It.
Informatica Data Privacy – How to Mitigate Risk and Make the Business Case
SSL and Browser Security: Why is it Such an Uphill Battle? Qualys
Phishing your Employees: Lessons Learned from Phishing over 3.5 Million People
Securing Big Data: Learning and Differences from Cloud Security Cisco Systems
The Legal Attack Vector: How To Protect Yourself
Ensure IT Resiliency with Actionable Security Intelligence
The Struggle for Control of the Internet
We Are Anonymous: Inside The Hacker World Of LulzSec, Anonymous, And The Global Cyber Insurgency
Dissecting Advanced Targeted Attacks – Separating Myths from Facts Candid Wueest , Symantec
Hacker Interrupted: Preventing Hackers on Your Website Using Deception
Cases of JavaScript Misuse and How to Avoid Them
Using Security Intelligence to Stay Out of the Headlines
MITB Attacks: What Works? What Doesn't?
Smartphone Security Winners & Losers
Risks and Rewards in Cloud Adoption Microsoft Corporation
They’re Inside…Now What?
The XX Factor: Why Women are Key to the Future of Security Markel Corporation
Poortego: An OS-INT correlation tool for the 99% Zscaler, Inc.
Full Employment: Good or Bad News for the Information Security Profession?
Cloud Security Alliance Summit Europe: Assurance, Transparency & Education
A Flexible and Comprehensive Approach to a Cloud Compliance Program Microsoft Corporation
UK Government Identity Assurance Programme - Easier Done than Said
Cyber Crime, Easy as Pie and Damn Ingenious SANS Institute
The Mobile Criminal: A Pocket Full of Maliciousness Gunter Ollmann , NCC Group
Should you Train Employees on Security Awareness?
Games of Keys and Clouds: Finding a (Nash) Equilibrium of Trust RSA
Cyber Jihad vs. Cyberterrorism - Separating Hype From Reality
Microsoft Security Intelligence Report WW Cybersecurity & Data Protection, Microsoft
The Mobile Enterprise: 7 Strategies to Manage Risk & Maximise Opportunity Intel Corporation
Breaking the Failure Cycle – Why Breaches from Known Threats Still Happen Dell SecureWorks
Flipit: A Game-Theory Handle on Password Reset and Other Renewal Defences RSA
Security Implications of the Internet Transition to IPv6 Cisco Systems
Cabinet Office, Government Digital Service, Identity Assurance Programme
Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition Wendy Nather , Duo Security
Rock Your Communications with HTML5 WebSocket – Secure!
Customisable Security: Leveraging Big Data for Mobile Security
Democracy and the Internet
Dealing with Big Data in Cyber Intelligence Palo Alto Networks
7 Highly Effective Habits of a Security Awareness Program
Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?
Using Big Data to Solve the Riddle of Supply Chain Security
Social [Media|Impact|Contracts|Unrest|Activism] in a Hyper-Connected Future
Hacking the Virtual World
2012: Mayans, Mayhem And Malware
Privacy by Design, Security by Design
Implementing an Intelligent SOC RSA
How to Set Up Integrated Security Governance Processes
Duqu, Flame, Gauss: Followers of Stuxnet
Trust, Security, and Society Bruce Schneier , IBM Security
Opening the Kimono: Automating Behavioural Analysis for Mobile Apps Michael Sutton
Surviving as a CISO in a World of Zombie Auditors, Twitter Twits, and Cavity Searches Eddie Schwartz , Verizon
Active Defence: How to Counter Your Attackers Davi Ottenheimer
Testing Darwinism: The History and Evolution of Network Resiliency
Securing the Supply Chain: Guide to Risk Management
Intelligence-Driven Security: In Action RSA
Conflicting Visions of Cloud Identity Microsoft Corporation
Protecting Your Data on Mobile Devices
Me and My Digital Shadow: Protecting and Detecting on the Social Web
The Growing Threat of Embedded Hacking Cylance
ENISA's Work on Cloud Security and Cyber Exercises
Csirt, Cyber Extortion, Ddos Attacks, & Forensics
Hacking Senior Management - Selling Security to the Board
Deceiving Permissions - Rules for Android Malware Detection
Securing the Human: Our Industry’s Greatest Challenge
Encryption for Clouds Davi Ottenheimer
What the Security Profession Can Learn From the Intelligence Profession
How to Build a Cyber Intelligence Capability
Entitlement; And Why Identity Needs to be About More Than Just People
De-identification: Entitlement or Identity?
Social Media: Whose Data is it Anyway?
Will Accredited Private Sector Organisations Provide Better Identity Services Than Governments?
10 Reasons Not to Virtualize: The Security Perspective
The Art of Cyber War: Know Thy Enemy, Know Thyself
Developing Secure Software in the Age of Advanced Persistent Threats
Privacy by Design—From Theory to Practice Intel Corporation
Cloud Provider Assurance
Adversary ROI: Evaluating Security from the Threat Actor’s Perspective
How to Grow and Transform Your Risk and Security Programme into the Cloud Qualys