Star 0

Talks

Title Humans
Ma, I Got Me a Cloud Too! Building and Managing a Secure Private Cloud PayPal Pte Ltd
Rethinking Web-Application Architecture for the Cloud StrongKey
The Droid Exploitation Saga Subho Halder , XY Security
Next-Generation Threat Protection To Counter Advanced Attacks FireEye, Inc.
Keynote Session from James Pang INTERPOL Digital Crime Centre
Big Data Transforms Security RSA
Criminal Education: Lessons from the Criminals and their Methods HP Software Enterprise Security Products, HP
Know Your Enemy, Know Yourself
My Experiments with Truth: A Different Route to Bug Hunting
Extending Network Security: Taking a Threat-Centric Approach to Security
Arming Security Investigators – Architecting Solutions for Security Investigations and Monitoring Cisco Systems
Secure Mobile App Development: Differences from Traditional Approach
Accelerating The Analyst Workflow: Learning From Investigative Actions Cisco Systems
Understanding and Building Threat Models Rapid7
New Threats to Cloud Infrastructure and Big Data Davi Ottenheimer
Lessons Learned From a Rigorous Analysis of Two Years of Zero-Day Attacks
Securing REST APIs – Protecting the new world of Mobile and Cloud services, using OAuth and API Keys Vordel
Preventing Zero-Day Attacks in Mobile Devices
BYOD and Mobile Security: Empowering Employees While Securing Corporate Assets AirWatch
The State Of SAP Security 2013: Vulnerabilities, Threats and Trends Alexander Polyakov , ERPScan
2013: Attack Trends For The Year Ahead FireEye, Inc.
Taking Down the World’s Largest Botnets FireEye, Inc.
Cyber Security Operation with Cyber Intelligence Reporting
The Future of Digital Forensics ETRI
The Three Adversaries – Know Your Enemy RSA
Mobile Web Reputation: Tracing Bad Territories on Your Smartphone Trend Micro, Inc.
Cloud Security – Are You Forgetting Something
STAMP: An Automated Unknown Zero-Day Vulnerability Discovery System for Mobile Platforms Institute for Infocomm Research
The e-fraud Storm Is Coming: How to Detect It Early and Protect Yourself National Australia Bank
Vulnerability Management and Research – Penetration Testing overview Australian Tax Office
Guest of Honour: Masagos Zulkifli Bin Masagos Mohamad
The New Type of Mobile Malware Which Utilizes Stolen Personal Information Ahnlab
Welcome Remarks Asia Pacific Japan RSA
The Invisible Shield: How Security Powers Our Everyday Commerce – and Lives
Application Security: From Web to Mobile, Different Vectors and New Attacks Integralis
Smile You've Been Profiled: How Intrusion Deception Is Shrinking Hacker Profits Juniper Networks
Advanced Threats and Intelligent Defense
How to Make Security Everyone’s Responsibility In The Modern Enterprise EMC
Data and Application Security: A Context Based Approach
Common IT Security Mistakes Made by Asian Organisations Dimension Data
Cyborgs, Zombies & Knights Global Security & Government Services, Akamai Technologies
APAC of Possibilities – Tips for Increasing Cloud Security and Adoption Trend Micro, Inc.
If Only We Would Look Juniper Networks
Sharing Threat Intelligence Analytics for Collaborative Attack Analysis Cisco Systems
Securing Software Against Library Attacks National University of Singapore
Practical Identity and Access Management for Cloud – A Primer on Three Common Adoption Patterns for Cloud Security IBM
Contextual Privacy – Redefining Privacy for the Perpetually Connected World
Alternatives to Certification Authorities for a Secure Web DarkMatter LLC
Architecture of a New DDoS and Web Attack Mitigation System for Data Center NSFOCUS
APTs By The Dozen: Dissecting Advanced Attacks FireEye, Inc.
Big Data Calls For Big Security!
The True Cost of Security – The Impact to End Use QoS in a Mobile World Spirent Communications
Catch Me If You Can
Assuming a State of Compromise: Effective Detection of Security Breaches
An Investigation into the Methods Used for Trafficking of Child Abuse Material Marquard University
Cloud Security through COBIT, ISO27001 ISMS Controls, Assurance and Compliance Singapore ISC Pte Ltd
Secure Freedom
Protecting Web Applications Imperva Inc.
Cutting Through the Hype: What is True "Next Generation" Security? HP Software Enterprise Security Products
Hacking the Virtualized World
DARPA Active Authentication Program: Behavioral Biometrics
Developing an Enterprise Mobile Security Strategy V-Key Inc
DdoS Attacks: Motives, Mechanisms, and Mitigation
BYOD and Next-Generation Mobile Security V-Key Inc
Removing the Mystery of Security Engines & Their Effect On Your Network
Securing the Post PC World Dimension Data