Star 0

Talks

Title Humans
Cyber Threat Intelligence Sharing Standards Saudi Aramco
Machine Learning—The New Face of BYOD
Using Security Analytics to Transform Smart Grid Security
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Security Transformation: From Defense in Depth to Security Assurance Layered Insight
Infecting You in 2015: How Hackers Do It SANS Institute
From "Fences" To "Bodyguards"—How Data-Centric Security Works
Securing Smart City Platforms: IoT, M2M, Cloud and Big Data
The Time Is Now—A New Era for Cybersecurity
Becoming the Adversary—A Hacker's Perspective on Attacking an Organization MWR InfoSecurity
Understanding Cyber Attacks That Leverage the Telephony Channel Payas Gupta , New York University Abu Dhabi
Why the Global Cyber Security Landscape Paints a Concerning Picture
Cybersecurity in the IoE Era
The Cyberwars in the Middle East: What Corporations and Governments Need to Do About It
Cloud Security—Myths and Reality DarkMatter
Obtaining Enterprise Cyber-situational Awareness DarkMatter
False Data Injection Attacks on Industrial Control Systems
Modern Cryptography and Implementation Flaws Najwa Aaraj , DarkMatter
The Real Security Issues that Deserve a Logo
Strength in Unity
How I Learned to Stop Worrying and Love the Internet of Things
How to Prepare for the Worst: Don't Let Your First Crisis Be a Real One
Cyber Security Awareness for Executives
A Cloud of Trust: Building Security, Resilience and the Role of Governments Microsoft Corporation
Let’s Go Hunting
Smart Grid Security: A Look to the Future Accenture
Adaptive & Unified Approach to Risk Management and Compliance via CCF
Overcome by Cyber Risks? Economic Costs and Benefits of Being Connected Jason Healey
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Global & Regional Trends in Cybercrime & the Divergence of Cybercriminals Trend Micro, Inc.
IoT, the Next BYOD—Will We Make the Same Mistakes? Palo Alto Networks
Using Visibility to Turn the Tables on Cybercriminals
Combating Cyber Risk in the Supply Chain
Evolving Threats: Dissection of a Cyber Espionage Attack
Journey into the Darknet
Lie, Cheat and Deceive: Change the Rules of Cyber Defense
Maximum Overdrive: Death by Your Microwave
Rethinking Cybersecurity
Logically Securing a Public Cloud Service
GRC Implementation...Behind the Scenes
A New Way of Looking at Smart City Security: Securing the Fabric Salesforce.com
State of the Art in Strategic Decision-Making Exercises in Cyber Security
The ZeroTrust Initiative—There Is No Security without Transparency
ARM: A Security Opportunity against Advanced Persistent Threats
Cloud Without Borders: High Confidence Computing Anywhere Anytime Qualys
Security Basics Seminar RSA
How Next Generation Trusted Identities Can Help Transform Your Business
The Ticking Time Bomb of Insider Threat RSA
The Components of National and International Governance of Cyberspace
A Use Case Framework for Intelligence Driven Security Operations Centers RSA
Windows 10: Disrupting Cyber Threats Microsoft Corporation
Anatomy of an Attack Qualys
Protecting the Energy Industrial Infrastructures from Advancing Threats Booz Allen Hamilton
SSL Threats Are Here—Is Your Architecture Ready?
Security Intelligence: The Truth Is Out There
Securing Automobility: Cyborgs and the Social Network of Things
The New Security Mindset
Security Posture for Critical Information Infrastructure Protection (CIIP).
Introducing a New CISO—Dos and Don’ts of the First Six Months
Seven Years, Seven Lessons
Escalating Middle Eastern Cyber Tension: An Open Source (OSINT) Analysis Christopher Ahlberg , Recorded Future
IoT: Securing the Smart City Akamai Technologies
BADMIN: (Ab)using Legitimate Sysadmin Tools for Offense