Cyber Threat Intelligence Sharing Standards
|
Saudi Aramco
|
Machine Learning—The New Face of BYOD
|
|
Using Security Analytics to Transform Smart Grid Security
|
|
Proactive Counterespionage as a Part of Business Continuity and Resiliency
|
|
Security Transformation: From Defense in Depth to Security Assurance
|
Layered Insight
|
Infecting You in 2015: How Hackers Do It
|
SANS Institute
|
From "Fences" To "Bodyguards"—How Data-Centric Security Works
|
|
Securing Smart City Platforms: IoT, M2M, Cloud and Big Data
|
|
The Time Is Now—A New Era for Cybersecurity
|
|
Becoming the Adversary—A Hacker's Perspective on Attacking an Organization
|
MWR InfoSecurity
|
Understanding Cyber Attacks That Leverage the Telephony Channel
|
Payas Gupta
,
New York University Abu Dhabi
|
Why the Global Cyber Security Landscape Paints a Concerning Picture
|
|
Cybersecurity in the IoE Era
|
|
The Cyberwars in the Middle East: What Corporations and Governments Need to Do About It
|
|
Cloud Security—Myths and Reality
|
DarkMatter
|
Obtaining Enterprise Cyber-situational Awareness
|
DarkMatter
|
False Data Injection Attacks on Industrial Control Systems
|
|
Modern Cryptography and Implementation Flaws
|
Najwa Aaraj
,
DarkMatter
|
The Real Security Issues that Deserve a Logo
|
|
Strength in Unity
|
|
How I Learned to Stop Worrying and Love the Internet of Things
|
|
How to Prepare for the Worst: Don't Let Your First Crisis Be a Real One
|
|
Cyber Security Awareness for Executives
|
|
A Cloud of Trust: Building Security, Resilience and the Role of Governments
|
Microsoft Corporation
|
Let’s Go Hunting
|
|
Smart Grid Security: A Look to the Future
|
Accenture
|
Adaptive & Unified Approach to Risk Management and Compliance via CCF
|
|
Overcome by Cyber Risks? Economic Costs and Benefits of Being Connected
|
Jason Healey
|
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
|
|
Global & Regional Trends in Cybercrime & the Divergence of Cybercriminals
|
Trend Micro, Inc.
|
IoT, the Next BYOD—Will We Make the Same Mistakes?
|
Palo Alto Networks
|
Using Visibility to Turn the Tables on Cybercriminals
|
|
Combating Cyber Risk in the Supply Chain
|
|
Evolving Threats: Dissection of a Cyber Espionage Attack
|
|
Journey into the Darknet
|
|
Lie, Cheat and Deceive: Change the Rules of Cyber Defense
|
|
Maximum Overdrive: Death by Your Microwave
|
|
Rethinking Cybersecurity
|
|
Logically Securing a Public Cloud Service
|
|
GRC Implementation...Behind the Scenes
|
|
A New Way of Looking at Smart City Security: Securing the Fabric
|
Salesforce.com
|
State of the Art in Strategic Decision-Making Exercises in Cyber Security
|
|
The ZeroTrust Initiative—There Is No Security without Transparency
|
|
ARM: A Security Opportunity against Advanced Persistent Threats
|
|
Cloud Without Borders: High Confidence Computing Anywhere Anytime
|
Qualys
|
Security Basics Seminar
|
RSA
|
How Next Generation Trusted Identities Can Help Transform Your Business
|
|
The Ticking Time Bomb of Insider Threat
|
RSA
|
The Components of National and International Governance of Cyberspace
|
|
A Use Case Framework for Intelligence Driven Security Operations Centers
|
RSA
|
Windows 10: Disrupting Cyber Threats
|
Microsoft Corporation
|
Anatomy of an Attack
|
Qualys
|
Protecting the Energy Industrial Infrastructures from Advancing Threats
|
Booz Allen Hamilton
|
SSL Threats Are Here—Is Your Architecture Ready?
|
|
Security Intelligence: The Truth Is Out There
|
|
Securing Automobility: Cyborgs and the Social Network of Things
|
|
The New Security Mindset
|
|
Security Posture for Critical Information Infrastructure Protection (CIIP).
|
|
Introducing a New CISO—Dos and Don’ts of the First Six Months
|
|
Seven Years, Seven Lessons
|
|
Escalating Middle Eastern Cyber Tension: An Open Source (OSINT) Analysis
|
Christopher Ahlberg
,
Recorded Future
|
IoT: Securing the Smart City
|
Akamai Technologies
|
BADMIN: (Ab)using Legitimate Sysadmin Tools for Offense
|
|