Ma, I Got Me a Cloud Too! Building and Managing a Secure Private Cloud
|
PayPal Pte Ltd
|
Rethinking Web-Application Architecture for the Cloud
|
StrongKey
|
The Droid Exploitation Saga
|
Subho Halder
,
XY Security
|
Next-Generation Threat Protection To Counter Advanced Attacks
|
FireEye, Inc.
|
Keynote Session from James Pang
|
INTERPOL Digital Crime Centre
|
Big Data Transforms Security
|
RSA
|
Criminal Education: Lessons from the Criminals and their Methods
|
HP Software Enterprise Security Products, HP
|
Know Your Enemy, Know Yourself
|
|
My Experiments with Truth: A Different Route to Bug Hunting
|
|
Extending Network Security: Taking a Threat-Centric Approach to Security
|
|
Arming Security Investigators – Architecting Solutions for Security Investigations and Monitoring
|
Cisco Systems
|
Secure Mobile App Development: Differences from Traditional Approach
|
|
Accelerating The Analyst Workflow: Learning From Investigative Actions
|
Cisco Systems
|
Understanding and Building Threat Models
|
Rapid7
|
New Threats to Cloud Infrastructure and Big Data
|
Davi Ottenheimer
|
Lessons Learned From a Rigorous Analysis of Two Years of Zero-Day Attacks
|
|
Securing REST APIs – Protecting the new world of Mobile and Cloud services, using OAuth and API Keys
|
Vordel
|
Preventing Zero-Day Attacks in Mobile Devices
|
|
BYOD and Mobile Security: Empowering Employees While Securing Corporate Assets
|
AirWatch
|
The State Of SAP Security 2013: Vulnerabilities, Threats and Trends
|
Alexander Polyakov
,
ERPScan
|
2013: Attack Trends For The Year Ahead
|
FireEye, Inc.
|
Taking Down the World’s Largest Botnets
|
FireEye, Inc.
|
Cyber Security Operation with Cyber Intelligence Reporting
|
|
The Future of Digital Forensics
|
ETRI
|
The Three Adversaries – Know Your Enemy
|
RSA
|
Mobile Web Reputation: Tracing Bad Territories on Your Smartphone
|
Trend Micro, Inc.
|
Cloud Security – Are You Forgetting Something
|
|
STAMP: An Automated Unknown Zero-Day Vulnerability Discovery System for Mobile Platforms
|
Institute for Infocomm Research
|
The e-fraud Storm Is Coming: How to Detect It Early and Protect Yourself
|
National Australia Bank
|
Vulnerability Management and Research – Penetration Testing overview
|
Australian Tax Office
|
Guest of Honour: Masagos Zulkifli Bin Masagos Mohamad
|
|
The New Type of Mobile Malware Which Utilizes Stolen Personal Information
|
Ahnlab
|
Welcome Remarks
|
Asia Pacific Japan RSA
|
The Invisible Shield: How Security Powers Our Everyday Commerce – and Lives
|
|
Application Security: From Web to Mobile, Different Vectors and New Attacks
|
Integralis
|
Smile You've Been Profiled: How Intrusion Deception Is Shrinking Hacker Profits
|
Juniper Networks
|
Advanced Threats and Intelligent Defense
|
|
How to Make Security Everyone’s Responsibility In The Modern Enterprise
|
EMC
|
Data and Application Security: A Context Based Approach
|
|
Common IT Security Mistakes Made by Asian Organisations
|
Dimension Data
|
Cyborgs, Zombies & Knights
|
Global Security & Government Services, Akamai Technologies
|
APAC of Possibilities – Tips for Increasing Cloud Security and Adoption
|
Trend Micro, Inc.
|
If Only We Would Look
|
Juniper Networks
|
Sharing Threat Intelligence Analytics for Collaborative Attack Analysis
|
Cisco Systems
|
Securing Software Against Library Attacks
|
National University of Singapore
|
Practical Identity and Access Management for Cloud – A Primer on Three Common Adoption Patterns for Cloud Security
|
IBM
|
Contextual Privacy – Redefining Privacy for the Perpetually Connected World
|
|
Alternatives to Certification Authorities for a Secure Web
|
DarkMatter LLC
|
Architecture of a New DDoS and Web Attack Mitigation System for Data Center
|
NSFOCUS
|
APTs By The Dozen: Dissecting Advanced Attacks
|
FireEye, Inc.
|
Big Data Calls For Big Security!
|
|
The True Cost of Security – The Impact to End Use QoS in a Mobile World
|
Spirent Communications
|
Catch Me If You Can
|
|
Assuming a State of Compromise: Effective Detection of Security Breaches
|
|
An Investigation into the Methods Used for Trafficking of Child Abuse Material
|
Marquard University
|
Cloud Security through COBIT, ISO27001 ISMS Controls, Assurance and Compliance
|
Singapore ISC Pte Ltd
|
Secure Freedom
|
|
Protecting Web Applications
|
Imperva Inc.
|
Cutting Through the Hype: What is True "Next Generation" Security?
|
HP Software Enterprise Security Products
|
Hacking the Virtualized World
|
|
DARPA Active Authentication Program: Behavioral Biometrics
|
|
Developing an Enterprise Mobile Security Strategy
|
V-Key Inc
|
DdoS Attacks: Motives, Mechanisms, and Mitigation
|
|
BYOD and Next-Generation Mobile Security
|
V-Key Inc
|
Removing the Mystery of Security Engines & Their Effect On Your Network
|
|
Securing the Post PC World
|
Dimension Data
|