Star 0

Talks

Title Humans
State of Cloud Security 2016
Threat Intelligence: Is It Any Good?
Advanced Malware and the Cloud: The New Concept of 'Attack Fan-out'
From Strategy to Tactics: Targeting and Protecting Privileged Accounts
I Am Divergent: EMDIVI's All Kinds of Attacks Trend Micro, Inc.
IoT Security and Risk Management Fortinet, Inc.
OS X Malware: Growth and Maturity Cylance
Quantifying and Communicating Cyber-Risk Exposure to the Board
The Path to Active Defense by Combining Deception Technologies with Analytics BT
Data and Surveillance Bruce Schneier , IBM Security
Beyond Traditional Security: The Latest Internet Security Practices of Alibaba
The NIST Cybersecurity Framework -- Measuring Compliance
Fighting 'Sophisticated' Attacks with Advanced Persistent Security
The Transformation Equation: Defining a New Security Roadmap Layered Insight
Eyes Everywhere: Monitoring Today's Borderless Landscape
Data Science for Cybersecurity: How Can We Make It Work? RSA
Operationalizing the Three Principles of Advanced Threat Detection RSA
Dark Web Globetrotters: Differences in Seven Underground Markets Trend Micro, Inc.
Eastern European Black Market Economy Trends
Secure at the Software Source
Extending Your Security beyond Traditional Safe Borders with OpenDNS Cisco Systems
A New Security Paradigm for IoT (Internet of Threats)
Opening Address by Mr K Shanmugam
Maximize the Value of Your Threat Intelligence Intel Security
Is the Tokenisation Framework Really Secure? Trustwave
The Questions You Should Be Asking Your Privacy Pro
Export Controls and Cybersecurity Tools: Renegotiating Wassenaar Microsoft Corporation
Security Awareness Is Not Enough: Build Security Culture Using Science of Habits
Web Defacements and Data Leakages--Twin Towers Website Threats
Modelling Advanced Persistent Threats
Business-Driven Perspectives
The Journey: From Right Objectives to a Measurable GRC System
How to Build a World-Class Network Defence Organization
Govern Every Identity. Inspect Every Packet - Become the Department of Yes
The Need for Speed: Application Security in a DevOps World
Security in the Age of Ransom
Exploit Zoo: The Evolution of Exploit Kits
Hiding in Plain Sight: The Growth of Cybercrime in Social Media RSA
Encryption, Apple and Global Implications
SANS Incident Response and Indicators of Compromise Salesforce.com
Are You Ready for a Breach?
A Global Enterprise Confronts Targeted Attacks--Case Study
What Can We Do to Mitigate the Risk of Falling Victim to Ransomware? Trend Micro, Inc.
Managing Security in Internet of Things Using API Management Platforms
The Effects of the Digital Age
Behavioural Analytics--A Closer Look RSA
The Shifting Botnet Landscape: Threats and Discovery Techniques, a Case Study
Security Implications of Using Blockchain Technology for More than Money Thomas Keenan , University of Calgary
Remarks by Christopher K. Stangl
Achieving e-Commerce Success through Effective Internet Security: A Primer for SMEs
The Pyramid of Protection: Rethinking Layered Security Carbon Black
IOCs Are Dead -- Long Live IOCs! Ryan Kazanciyan , Tanium
Undeclared Cyberwars: Cyberthreat Actors Targeting Asia
Building and Sustaining an Effective Incident Response Center
Thingbots: The Future of Botnets in the Internet of Things Paul Sabanal
Cybercrime Collaboration--The Changing APAC Threat Landscape
Threat Intelligence Landscape in China
Ransomware: Your Worst Nightmare LogRhythm
SANS Intense Hands-On Pen Testing Skill Development
Identify, Contain and Prevent Threats in Smart Cities, Smart Grids and HEMS
A New World, New IT, New Security
Web Attacks of Past, Present and Future Michael Smith
The Future State of Security Starts with Virtualization
Hide and Seek: How Threat Actors Respond in the Face of Public Exposure FireEye, Inc.
Data Breaches--Trends and Real Stories from the Trenches Verizon
Cybersecurity Insurance: New Risks and New Challenges--Be Smart
Business Defence -- Managing the Insider Threat with Security Analytics BAE Systems
Cloud Servers, Honeypots and ELK--The Path to Attaining Cyber-Hunting Nirvana
Android Serialization Vulnerabilities: Is Your Device or App Still Vuln? Roee Hay
Cyber-Wargame Exercise: Operation Cyber-Monkey 2016
G2B: Cyber-Business in Myanmar, Indonesia and Thailand
Security in the World-Sized Web Bruce Schneier , IBM Security