State of Cloud Security 2016
|
|
Threat Intelligence: Is It Any Good?
|
|
Advanced Malware and the Cloud: The New Concept of 'Attack Fan-out'
|
|
From Strategy to Tactics: Targeting and Protecting Privileged Accounts
|
|
I Am Divergent: EMDIVI's All Kinds of Attacks
|
Trend Micro, Inc.
|
IoT Security and Risk Management
|
Fortinet, Inc.
|
OS X Malware: Growth and Maturity
|
Cylance
|
Quantifying and Communicating Cyber-Risk Exposure to the Board
|
|
The Path to Active Defense by Combining Deception Technologies with Analytics
|
BT
|
Data and Surveillance
|
Bruce Schneier
,
IBM Security
|
Beyond Traditional Security: The Latest Internet Security Practices of Alibaba
|
|
The NIST Cybersecurity Framework -- Measuring Compliance
|
|
Fighting 'Sophisticated' Attacks with Advanced Persistent Security
|
|
The Transformation Equation: Defining a New Security Roadmap
|
Layered Insight
|
Eyes Everywhere: Monitoring Today's Borderless Landscape
|
|
Data Science for Cybersecurity: How Can We Make It Work?
|
RSA
|
Operationalizing the Three Principles of Advanced Threat Detection
|
RSA
|
Dark Web Globetrotters: Differences in Seven Underground Markets
|
Trend Micro, Inc.
|
Eastern European Black Market Economy Trends
|
|
Secure at the Software Source
|
|
Extending Your Security beyond Traditional Safe Borders with OpenDNS
|
Cisco Systems
|
A New Security Paradigm for IoT (Internet of Threats)
|
|
Opening Address by Mr K Shanmugam
|
|
Maximize the Value of Your Threat Intelligence
|
Intel Security
|
Is the Tokenisation Framework Really Secure?
|
Trustwave
|
The Questions You Should Be Asking Your Privacy Pro
|
|
Export Controls and Cybersecurity Tools: Renegotiating Wassenaar
|
Microsoft Corporation
|
Security Awareness Is Not Enough: Build Security Culture Using Science of Habits
|
|
Web Defacements and Data Leakages--Twin Towers Website Threats
|
|
Modelling Advanced Persistent Threats
|
|
Business-Driven Perspectives
|
|
The Journey: From Right Objectives to a Measurable GRC System
|
|
How to Build a World-Class Network Defence Organization
|
|
Govern Every Identity. Inspect Every Packet - Become the Department of Yes
|
|
The Need for Speed: Application Security in a DevOps World
|
|
Security in the Age of Ransom
|
|
Exploit Zoo: The Evolution of Exploit Kits
|
|
Hiding in Plain Sight: The Growth of Cybercrime in Social Media
|
RSA
|
Encryption, Apple and Global Implications
|
|
SANS Incident Response and Indicators of Compromise
|
Salesforce.com
|
Are You Ready for a Breach?
|
|
A Global Enterprise Confronts Targeted Attacks--Case Study
|
|
What Can We Do to Mitigate the Risk of Falling Victim to Ransomware?
|
Trend Micro, Inc.
|
Managing Security in Internet of Things Using API Management Platforms
|
|
The Effects of the Digital Age
|
|
Behavioural Analytics--A Closer Look
|
RSA
|
The Shifting Botnet Landscape: Threats and Discovery Techniques, a Case Study
|
|
Security Implications of Using Blockchain Technology for More than Money
|
Thomas Keenan
,
University of Calgary
|
Remarks by Christopher K. Stangl
|
|
Achieving e-Commerce Success through Effective Internet Security: A Primer for SMEs
|
|
The Pyramid of Protection: Rethinking Layered Security
|
Carbon Black
|
IOCs Are Dead -- Long Live IOCs!
|
Ryan Kazanciyan
,
Tanium
|
Undeclared Cyberwars: Cyberthreat Actors Targeting Asia
|
|
Building and Sustaining an Effective Incident Response Center
|
|
Thingbots: The Future of Botnets in the Internet of Things
|
Paul Sabanal
|
Cybercrime Collaboration--The Changing APAC Threat Landscape
|
|
Threat Intelligence Landscape in China
|
|
Ransomware: Your Worst Nightmare
|
LogRhythm
|
SANS Intense Hands-On Pen Testing Skill Development
|
|
Identify, Contain and Prevent Threats in Smart Cities, Smart Grids and HEMS
|
|
A New World, New IT, New Security
|
|
Web Attacks of Past, Present and Future
|
Michael Smith
|
The Future State of Security Starts with Virtualization
|
|
Hide and Seek: How Threat Actors Respond in the Face of Public Exposure
|
FireEye, Inc.
|
Data Breaches--Trends and Real Stories from the Trenches
|
Verizon
|
Cybersecurity Insurance: New Risks and New Challenges--Be Smart
|
|
Business Defence -- Managing the Insider Threat with Security Analytics
|
BAE Systems
|
Cloud Servers, Honeypots and ELK--The Path to Attaining Cyber-Hunting Nirvana
|
|
Android Serialization Vulnerabilities: Is Your Device or App Still Vuln?
|
Roee Hay
|
Cyber-Wargame Exercise: Operation Cyber-Monkey 2016
|
|
G2B: Cyber-Business in Myanmar, Indonesia and Thailand
|
|
Security in the World-Sized Web
|
Bruce Schneier
,
IBM Security
|