Star 0

Talks

Title Humans
Beware the Cloudpocolypse: A Panel on Cloud Security from Cloud Providers
Evolution of Hackers and Reverse Incident Response
Phishing Dark Waters – Defending against Malicious Emails
Be like Water: Applying Analytical Adaptability to Cyber Intelligence
Post-Snowden Cryptography Part I Paul Kocher
SANS: ICS Cybersecurity Overview with Hands-on Lab
Epidigitalogy: Surveying for Digital Diseases like an Epidemiologist Symantec
U.S. vs EU Privacy Cage Match: Adapting to Changing Data Protection Laws Internal Revenue Service
Threat Intelligence Is Dead. Long Live Threat Intelligence!
RSA Conference Codebreaker Bash
Assume Breach: An Inside Look at Cloud Service Provider Security
Privileged Account Exploitation – the Point of No Return (CyberArk Software, Inc.)
The Promise and the Perils of Wearables Dartmouth College
South Expo Pub Crawl
CSI Digital Crime Lab: A Virtual Whodunnit
TCG: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions
Information Technology Insights from the DoD CIO
SSLammed, SSLayed and SSLapped Around - Why Hackers Love SSL Blue Coat Systems
Cultivating a New Generation of Cyber-Workforce Talent
Cyber Security for Start-ups: An Affordable 10-Step Plan
Are You Burning Money By Not Classifying Your Data? (Identity Finder, LLC)
Using Team Structure as Defense in Depth
Victims DON'T Have Their Heads in the Cloud - An Insider Threat Case Study
Security – Rewritten by the Application Economy
Threat Intelligence is Like Three-Day Potty Training
The Kelvin Mantra: Implementing Data-Driven Security Practices
Updating Surveillance Law on Government Access to Your Online Data Google Inc.
How to Enable Micro-Segmentation to Create a More Secure Data Center Network (VMware)
There’s an App for That: How the Future of Privacy Will Be Consumer-Driven
How We Discovered Thousands of Vulnerable Android Apps in One Day Will Dormann , CERT
The Evolution of the Cybersecurity Executive Trifecta: The CSO/CIO/CISO Palo Alto Networks
Trimming the Waste from Your Security Portfolio Wendy Nather , Duo Security
Continuous Security: 5 Ways DevOps Improves Security
Dan Geer on the Future of Security Dan Geer
Riding the Wave of the Digital Bank: A Security Perspective
The Insider Threat in the Cloud: The Harsh Reality in Today's World
Containers vs. VMs for Secure Cloud Applications Docker
Behind Enemy Lines: Security in a Hostile Environment
DevOps Connect: SecOps Edition
Managing Expectations: The S.E.C. & F.T.C. Target InfoSEC Compliance
Hacking Smart Cities Cesar Cerrudo , IOActive, Inc.
How to Spread Information Security Best Practices Virally Across Your Organization
Demystifying Cloud Security: Lessons Learned for the Public Sector
FBI Cyber: Leading Globally
Whats Next? Teaching Machines How to Speak Security.
Secure Agile Development: Why Can’t We All Get Along?
A Privacy Primer for Security Officers
Shining Light on the Shadows: Integrating Security into the Lines of Business
From Cowboys to Sales Engineers: Building Mature Security Services
Misconceptions of Risk in the Payments World
CANCELLED: Zero Knowledge Security Akamai Technologies
On the Care and Feeding of Human and Device Relationships
Countering Development Environment Attacks
Data + Security + iOT (JIRANSOFT)
(ISC)2 Foundation Safe & Secure Online Program Volunteer Orientation (Members Only)
Evasive Malware Exposed and Deconstructed Christopher Kruegel , Lastline, Inc.
Incident Response: A Test Pilot’s Perspective Cisco Systems
Enhancing Cloud Trust Microsoft Corporation
Practical Advice for Embracing RASP - A New Kind of Defense
Know your Adversary: Gathering Intelligence on Targeted Attacks (Verisign)
(ISC)² CISSP CBK Training Battelle Memorial Institute
Detecting Unknown Malware: Security Analytics & Memory Forensics
The Terrorist’s Son – A Story of Choice
Staying Secure As Users and Resources Disperse (Barracuda Networks)
Dinner for 6
Rapid Hybrid Pentest – Validating Control Effectiveness, One Exploit at a Time… (SynerComm)
Insider Threat and the Dark Web: Cyber Response Mini-Wargame Booz Allen Hamilton
Powering Your Threat Intel Team with Off-the-Shelf Tools Palo Alto Networks
Don’t Get Left in the Dust: How to Evolve from CISO to CIRO
Endpoints in the New Age: Apps, Mobility and the Internet of Things
Security in the App Economy: How to Ride the Wave Without Wiping Out
When IT Threats Meet OT Innocence
Hacking Exposed: Next Generation Attacks Cylance
Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
Avoiding the 'Creepy Factor' in Biometric and Other Technologies Thomas Keenan , University of Calgary
The Mother of All Pen Tests
Making Threat Intelligence Actionable: Recommending Responses with STIX Cisco Systems
Building an Appsec Program with Sun Tzu, the Dalai Lama and Honey Badger
Modern Threat Defense: Hiding in Plain Sight (Unisys)
Who’s Invited to Your Party? Minimizing Risk from Outsourced Partners Morrison Consulting
Six Degrees of Kevin Bacon: Securing the Data Security Supply Chain
Getting a Jump on Hackers Qualys
Constructions of Hash Functions and Message Authentication Codes
RSA Conference Orientation
Membership
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 Akamai Technologies
Security Basics Seminar Rapid7
From the Battlefield: Managing Customer Perceptions in a Security Crisis Cybersecurity
Inside the World of Java Applets FireEye, Inc.
STIX in Practice for Incident Response
Leadership Lessons of History: American Presidents
Fail-safe the Human Pysche to Advance Security and Privacy
Securing the Grid: Opportunities and Risks in Operational Technology
The Wolves of Vuln Street: The 1st Dynamic Systems Model of the 0day Market Massachusetts Institute of Technology
Cyber Battlefield: The Future of Conflict
TLS/SSL and Certificate Crossfire Data Protection Engineering, Fidelity Technology Group
The Six Most Dangerous New Attack Techniques and What's Coming Next SANS Institute
Status of the Industry: 2015 Global Information Security Workforce Study
Open Garages – Learn How Technology Drives Your Car
Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project
WestJet’s Security Architecture Made Simple—We Finally Got It Right!
Supply Chain as an Attack Chain: Key Lessons to Secure Your Business
The Internet of Things: Revolutionary, Evolutionary or Fad?
How Much Does Your Ox Weigh?: Crowdsource Your Way to Data Protection
Wait! Wait! Don't Pwn Me!
CForum: A Community Driven Solution to Cybersecurity Challenges
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices Andrew Blaich , Lookout
Identity Proofing - Blinding the Eye of Sauron
The Long Road to a Secure Web Akamai Technologies
Before and Beyond the Breach: New Research in the 2015 DBIR
Dissecting Office Malware for Fun and Espionage
Effective Management of Key Storage Files Including Java Keystores and Oracle Wallets
The Second Machine Age
Across the Desk: Opposing Perspectives on InfoSec Hiring and Interviewing Instructor
Let's Talk Security and Adoption of IPv6. Is Your Organization Ready?
Addressing The Global Supply Chain Threat Challenge: Huawei, A Case Study
Is Your Third-Party Service Provider Vendor Management Program Good Enough?
Next Generation Healthcare Security Instructor , SANS Institute
Automating Security Workflows: The SDDC Approach VMware
Stuxnet: The Real Story Behind the Digital Whodunit Kim Zetter
Inside the Boardroom: How Boards Manage Cybersecurity and Risk Accuvant
Cloud Based Security and Identities: Brilliance or Madness?
Hot Topics in Privacy: A Conversation with Facebook, Google and Microsoft Google Inc.
Security: Meet Your New Roommate, The Dynamic Provisioning Environment
The CISO Reporting Project Trey Ford
Building an Effective Incident Response Program (Rapid7)
Live Industrial Control Systems (ICS) Demo
Side-Channels in the 21st Century: Information Leakage from Smartphones Yan Michalevsky , Stanford University
Advanced Strategies for Defending Against a New Breed of Attacks
How One Smart Phone Picture Can Take Down Your Company
You Are What You Click: Using Decoys to Identify Mobile Device Attackers Columbia University
ISSA Member Reception (Members Only)
Identity is the Center of Everything (ForgeRock)
Incident Response Agility: Leverage the Past and Present into the Future
But...It’s an App/Play Store Download: Research Exposes Mobile App Flaws NowSecure
Managing the Unmanageable: A Risk Model for the Internet of Things Accenture
The Black Blob of Death Threatens Your Data Center: How to Find It and How to Stop It (SSH Communications Security)
Structural Entropy Analysis for Automated Malware Classification Matt Wolff , Cylance
The Coming Revolution: Industry Groups Defining Vendor Assessment Standards
Owning SAP ASE: Chained Database Attack Trustwave
Vulnerability Management Nirvana: A Study in Predicting Exploitability Kenna Security
Bridging the Divide between Security and Operations Teams Microsoft Corporation
Protecting Critical Infrastructure Is Critical
How Security Can Be the Next Force Multiplier in DevOps
Taking a Business Risk Portfolio (BRP) Approach to Information Security
The Sound of Metrics David Scott
States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent
Lie. Cheat. Deceive. How to Practice the Art of Deception at Machine Speed
How to Develop a Security Operations Center (SOC)
Be Heard: Developing Effective Board-Level Communications for the CISO Accuvant
JTAGulator with Joe Grand Joe Grand , Grand Idea Studio, Inc.
Applied Information Sharing: Lessons Learned from the Gameover/Zeus Takedown
Continuous Breach Response Posture (Splunk)
Cyber Ranges – A Strategic Outlook
A Tale of Two Mocks—a Deep Dive into the Issues Raised
Are Digital Anonymity and a "Right to Forget" the New Snake Oil?
CSOC for Critical Infrastructure Protection
Watt, Me Worry? Analyzing AC Power to Find Malware
Misinforming Management
To Trust or Not To Trust: Behavioral Analytics Has the Answer (Guardian Analytics)
Limiting the Spread of Threats: A Data Center for Every User VMware
Pragmatic Metrics for Building Security Dashboards Enclave Security
Managing the Unmanageable (Citrix)
Identithication: Convergence of Identity and Authentication - A Rock Opera
How to Motivate Security and Compliance Performance & Get People to Love It 8x8, Inc.
How Can We Use Classified Information to Make Our Companies More Secure, Without Going to Prison?
Cyber-Shock 2015: Corporate Breach Role Play
Curbing Email Threats & Spearphishing– The Promise & Results with DMARC
Active Defense & Offensive Security: Where Are We Now and How Did We Get Here? Neil Wyler , RSA
How To Play the Cybersecurity Game (Verizon)
How APIs Turned Cloud Security on Its Head
True Cost of Fraud and Cybercrime Against Your Mobile Channel RSA
Security Metrics That Your Board Actually Cares About!
The Sophisticated Attack Myth: Hiding Unsophisticated Security Programs
What Trusted Computing History Teaches Us about Today's Challenges
Common IAM Flaws Plaguing Systems after Years of Assessment
How to Design Data Centric Security and What to Watch For?
Big Tech's Burden to Develop Predictive Indicators to Combat Cyber-Attacks
Never, Ever, Give Up
Challenges in Network Forensics
Mobile Vulnerabilities: From Data Breach to Complete Shutdown Yair Amit , Modern OS, Symantec
Security on Offense McAfee
Network Security and Operations When the Network Is Already Compromised
What a Relief - It Works! How to Build an Insider Threat Program in One Year
Can DNSSEC and DANE Add a Layer Of Trust to TLS and DNS?
The Hazards of Online Ads: What Is Being Done and What You and Your Employees Can Do
Hunted to the Hunter
Following the Sun: A Worldwide View of Cybersecurity Laws and Regulations
Wanted: Innovation in Security Research
New Trends In Cryptographic Algorithm Suites Used for TLS Communications Intel Corporation
Website Counterintelligence: Leveraging Web Logs to Gather Intelligence
The Insider Threat: Protecting Your Network from the Inside Out (Lancope)
Penetration Testing with Live Malware Gunter Ollmann , NCC Group
Secretary Jeh Johnson, Department of Homeland Security U.S. Department of Homeland Security
Hack the Planet: Some Men Just Want to Watch the World Burn
You Can’t Stop What You Can’t See Carbon Black
Major Cyberfraud Innovations of the Last Twelve Months IBM Security
Healthcare Case Study: Beating Cybercrime, Nation-states & Insider Threats
PCI DSS and SSL: What You Need to Know in 2015
Secure Apache Web Server with HMTL5 and HTTP 2.0
UMA in Health Care: Providing Patient Control or Creating Chaos?
Accountability: How to Make Professional Risk a Growth Opportunity and Love It
A Comprehensive Approach to Advanced Threat Defense (Fidelis Cybersecurity)
Information Security Leadership Development: Surviving as a Security Leader Trey Ford
Cookin Up Metrics with Alex and David: A Recipe for Success David Mortman
Home Sweet Owned? – A Look at the Security of IoT Devices in our Homes Billy Rios
The 50-Minute MBA for Information Security Professionals
The Little JPEG That Could (Hack Your Organization)
General Alexander: Life After the NSA
How DHS Does Cybersecurity with Content Filtering
Inconvenient Security: When Attorneys Drive Security Decisions FS-ISAC
Quantitative Security: Using Moneyball Techniques to Defend Corporate Networks Symantec
Implementing an Automated Incident Response Architecture Mayo Clinic
Data Science Transforming Security Operations
Attackers Can Pivot through Your Infrastructure, What if You Could Pivot through Theirs? (OpenDNS)
Design and Analysis of Block Ciphers
Hacking Exposed: Beyond the Malware George Kurtz , CrowdStrike, Inc.
If Your Company Were to Have a Breach Today, Would They Know What to Say and Who Will Say It? Diversified Global Graphics Group
Patching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps SANS Institute
Building a Secure Cloud Without Reinventing the Wheel (Lynx Software Technologies)
The Hunter’s Dilemma: Taking the Kill Shot with Threat Intel, Analytics and Managed Security Services (Trustwave)
Effective Security Governance in Critical Infrastructure Cisco Systems
Renewing the Patriot Act Google Inc.
Restoring Order: The Inevitable Evolution of IT Security Regulation
Secure Graphical Passwords RSA
Risk-Ops at Scale: Framework Operationalization to Address Business Risk
Security’s Evolving Role as an Enabler to the Business SolarWinds
Please Do Focus on the Man Behind the Curtain (Websense)
How Vulnerable Are Our Homes? - The Story of How My Home Got Hacked Kaspersky Lab
Designing your Cloud Security Reference Architecture
RSA Conference Welcome Reception
Bricks and Mortar to Bits and Bytes: A History and Future of Insider Threat
Cybersecurity Framework: Adoption Experiences and Opportunities RSA
Alert Logic (Alert Logic)
The Big Hacks, Malware and Exploits of 2014 and What is to Come SANS Institute
Embedded Exploitation Party Trick Ang Cui , Red Balloon Security
Hunting the Undefined Threat: Advanced Analytics & Visualization
Understanding Threats Using Big Data and Contextual Analytics
Phishing for the Phoolish: Why Hackers Love Gilligans and Their Best Lures Blue Coat Systems
Finally We've Got Game: Real Government Info Sharing after 15 Years of Talk
Doing Security Response with Your Cloud Service Provider Microsoft Corporation
Secure Multi-party Computation École Polytechnique Fédérale de Lausanne
Use Context to Improve Your User Identification Odds
The Data Security Challenge that Every Cloud Provider Faces – Who Owns the Keys? (Vormetric, Inc.)
Top 10 Web Hacking Techniques of 2014
Are You Giving Firmware Attackers a Free Pass? Xeno Kovah , LegbaCore
Best Practice or Bust? Test Your Approach to Third-Party Risk
Mobile Security Shootout - Which Smartphones Are Up to the task? Chester Wisniewski , Sophos
The Internet of TR-069 Things: One Exploit to Rule Them All Shahar Tal , Check Point Software Technologies
Protecting Enterprise Data and Critical Applications Using Context-Based Authentication (ThreatMetrix)
Incident Response Tabletop Meet 'n Swap SANS Institute
The Economics of Online Identity: 6 Buzzwords to Impress your Boss
More Books You Should Have Read by Now: The Cybersecurity Canon Project Palo Alto Networks
Security Data Science: From Theory to Reality
Qigong for Health and Vitality
U.S. Government Initiatives for Securing the Global Supply Chain
Drones: All Abuzz with Privacy & Security Issues
Managing Risk in a Mobile First World
Smarter Intelligence: Real Time, Contextual, and Predictive (WEBROOT)
How to Avoid the Top Ten Software Security Flaws
LTE Security - How Good Is It?
The Legal Pitfalls of Failing to Develop Secure Cloud Services
Internet of Threats: What’s Really Connected to the Net and Why You Care Trey Ford
Talking ’bout My Next Generation Juniper Networks
Please DON'T Share My Data: Imparting Sensitivity Markings on Shared Data
The Social Network Panel at RSA Conference Paul Moreno
Wargaming for the Boardroom: How to Have a Successful Tabletop Exercise
Become the Leader the Industry Needs Cisco Systems
Alert Logic
Cyber Insurance: The Next Big Thing or the Next Requirement?
Sun Tzu Meets the Cloud: Everything Is Different, Nothing Has Changed
Can We Satisfy the ACLU and Still Share Suspicious Activity Reports (SARs)?
SANS: Critical Security Controls: Planning, Implementing and Auditing Enclave Security
Combating Cyber Risk in the Supply Chain Raytheon Foreground Security
SANS: Lethal Network Forensics
“Your VISA has been DEACTlVATED” – How Cybercriminals Cash In Via SMS Attacks
Balancing Compliance and Operational Security Demands Cybersecurity
Automate or Die! How to Scale and Evolve to Fix Our Broken Industry
Hot Topics in Information Security Law 2015 The MITRE Corp
Surviving SOC2 – The Why and How for Cloud Service Providers
A CISO's Perspective on Talking to the Board about Cybersecurity (Veracode)
The “New Paradigm” of Business-Driven Cyber Defense: An Update from the FCC Chairman Federal Communications Commission
How To Become a World-Class CISO
Technologies That Will Shape the Future Privacy Debate
We Have Met the Future of Security and It Is Us Trey Ford
Killing the Kill Chain: Disrupting the Cyber Attack Progression Tripwire
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
A Case Study in Building an AppSec Program: 0–60 in 12 months
(ISC)2® CSSLP® CBK® Training Preview Seminar
Another Bug Bites the Dust Booz Allen Hamilton
Pragmatic SecDevOps Rich Mogull
The Long and Winding Road: Building an InfoSec Career from Techie to CISO Zurich Insurance Group
From Nonexistent to Gartner's #1 Security Technology in Three Years: What's a CASB? Cisco Systems
Don't Touch That Dial: How Smart Thermostats Have Made Us Vulnerable Yier Jin , University of Central Florida
Is DevOps Breaking Your Company? CyberArk
The (anti)Social Network: Key Facts About Social Media Threat Vectors, Security and Compliance (Emerging Threats)
Tracking Ghosts through the Fog Waylon Grange , Blue Coat Systems
Building the Bridge across the Great Minority Cyber Divide
No More Snake Oil: Why InfoSec Needs Security Guarantees Jeremiah Grossman , SentinelOne
Can Cyber Insurance Be Linked to Assurance?
Analysis of SSL and Crypto Vulnerabilities in Android Applications Yulong Zhang , FireEye, Inc.
70% of US Business Will Be Impacted by the CSF: Are You Ready?
Secure Application Development with Go Signal Sciences
Rapid Threat Modeling Techniques
PORTAL: Open Source Secure Travel Router for International Adventure Ryan Lackey , CloudFlare, Inc.
Data Collection for Litigation: Avoiding Privacy and Security Pitfalls
A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk
One Mobile, Two Factors of Authentication (ENTERSEKT)
Stop Selling and Start Marketing Your Information Security Program
Cyber Security and Aviation
FBI and Trend Micro: Combating Cybercrime within your Organization Trend Micro, Inc.
The Truth about Cyber Risk Metrics: Connecting Vulnerabilities to Economics
Analogue Network Security
The Weakest Link: Mobile Apps and Data Insecurity (NowSecure)
Seven Grades of Perfect Forward Secrecy
The Emperor’s New Password Manager: Security Analysis of Password Managers Zhiwei Li , Shape Security
Closing the Gap: Steps to Satisfy the Demand for Security Talent NetSuite
The Physics of Security
Chosen Ciphertext Attacks in Theory and Practice ANSSI
Using the Cybersecurity Framework: Lessons Learned and Opportunities Intel Corporation
National Cyber Crisis – Live Exercise Scenario
Post-Snowden Cryptography Part II Paul Kocher
Game of Hacks: The Mother of All Honeypots Maty Siman , Checkmarx
Beyond the Behavioral Analysis Against APTs (AhnLab)
Mindfulness: Leadership from Within
The Cryptographers' Panel
Innovation Sandbox - "Most Innovative Company at RSA Conference" Live
More Apt Than You Think: Data Protection at Massive Scale Davi Ottenheimer
Securing Boomers, Gen Xers And Gen Yers: OMG We Are So Different!
That Point of Sale Is a PoS
Game Consoles & Mobile Device Security: A Model for the Internet of Things
CyberLegislation is Upon Us... But Are We Ready?
Cybersecurity as a Boardroom Investment: Business Speaks Resilience
Breach 360: How Top Attacks Impact Tomorrow’s Laws, Litigation, Security
CSA Summit 2015: Enterprise Cloud Adoption and Security Lessons Learned
Lock Your Front Door: Protecting Patient Portals
Lead Like a Woman The Executive Women's Forum
Hacking the CEO: Ninja Mind Tricks and Other Ruses to Get Security $$$’s
The Evolution of Threats Targeting Industrial Control Systems
Standards for Exchange of Identification Context between Federated Parties Microsoft Corporation
Authenticated Encryption
Deconstructing Incident Response
Emergent Privacy Models in Healthcare
Notice of Eviction Dell SecureWorks
Who’s Protecting What Things? Managing Cyber Risk in the Internet of Things Era Deloitte & Touche LLP
The Encryption Games: Going from Encryption to Crypto Management (SafeNet, Inc.)
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
Mobility and the Law: Protecting Your M-Info
Cyber Bullying, Revenge Porn and the Work Place
Third Party Supplier Governance – Secure the Supply Chain
Cybersecurity Legislation; Congressional & Administrative Action
Security in an Age of Catastrophic Risk Bruce Schneier , IBM Security
How Secure are Contact-less Payment Systems? RSA
Security: Changing the Game Facebook
Executive Women's Forum Reception
Breaking the Glass Firewall: The Changing Role of Women in IT Security
Android Security: Data from the Front Lines Adrian Ludwig , Google Inc. , Android Security
Secure and Efficient Implementation of AES Based Cryptosystems
Cybersecurity: You’re Doing IT Wrong
To Sign and Protect - COPS in OS X and iOS Jonathan Levin
Combining Firewalls and Security Intelligence is a Hacker’s Worst Nightmare Juniper Networks
CSI Digital Crime Lab: Virtual WhoDunnit
Can Peer Collaboration Be Our Next Best Practice for Risk Management?
IANS Research - The 7 Factors of CISO Impact
Building a Next Generation Security Architecture
Holistic IAM & PAM: Integrated Identity Governance with Privilege Access Management (Lieberman Software)
Minimizing the PCI Footprint: Reduce Risk and Simplify Compliance
Characterizing Malicious Traffic on Cellular Networks: A Retrospective
Amazing True Crimes and the Lessons They Can Teach Us
Cisco’s Security Dojo: Raising the Technical Security Awareness of 20,000+
Pass-the-Hash II: The Wrath of Hardware Microsoft Corporation
Evolving Security Operations and Sharing at Net Speed Fortinet, Inc.
Having an “Identity” Crisis? Overcoming the Security Challenges of the Internet of Everything (Covisint)
Enterprise Acquisition of Cloud Computing Services
Privacy and Security, the Ties That Bind
You’ve Been Warned: iBeacons to Bring a Tsunami of Change to Data Security
Attacks on Crown Jewels: SAP Vulnerabilities and Exploits Onapsis
CANCELLED: Mobile Botnets: Fact or Fiction? Arbor Networks
License to Kill: Malware Hunting with the Sysinternals Tools
Modern Department of Homeland Security Cyber: Our Vision Forward
To Swipe or Not to Swipe: A Challenge for Your Fingers Yulong Zhang , FireEye, Inc.
Automating Executive-Level Cybersecurity Monitoring (Tenable Network Security)
Gamification of your Global Information Security Operations Center
Your Security Connected: Options for Simplifying the User Authentication Experience in a Mobile-first, Cloud-first World (HID Global)
Terror Gone Social: The Islamic State and Social Media Kenneth Geers , Comodo Group
The Art of Thinking Security Clearly
Hacktivism in 2015 - It Isn’t Just for the Lulz Anymore iSIGHT Partners
What Does Responsible Vulnerability Disclosure Look Like?
The Library of Sparta: Applying Military Doctrine to Cybersecurity Greg Conti , West Point
Domain Name Abuse: How Cheap New Domain Names Fuel the eCrime Economy Paul Vixie , Farsight Security, Inc.
Should 2015 Be the Year We Ditch Information Security Certifications? Nettitude
Quantum Keys to the Future of Encryption (BT)
Cyber Security: The Brink of Prediction Symantec
Into the Woods: Protecting Our Youth from the Wolves of Cyberspace
The Four Essential Building Blocks of Cyber Security (Agiliance)
Inception: APT Campaign Spanning PCs, Mobile, the Cloud, and Home Routers Waylon Grange , Blue Coat Systems
We're Gonna Need a Bigger Boat Intel Corporation
Live Mobile Hacking Demo and Dissection! RSA
(ISC)2® CISSP-ISSMP® CBK® Training Preview Seminar
Stuck in Patterns - How Your Mind Fools You Every Day
Security and Privacy: Let’s Stay Together, Baby Uber
Hacking High: Teaching Our Kids Vital Cyber Skills
Implementation Attacks on Exponentiation Algorithms
Implementing the U.S. Cybersecurity Framework at Intel—A Case Study Intel Corporation
Should Organizations Share Threat Intel to Avoid the Next Cybergeddon? MITRE Corporation
Active Response: Automated Risk Reduction or Manual Action? Splunk
Enterprise Cloud: Advancing SaaS Security and Trust Microsoft Corporation
I Was Attacked by My Power Supply: A Mock Trial
Advanced Attacks: How One Exploited Endpoint Leads to Total Datacenter Breach Palo Alto Networks
Next Wave of Security Operationalization
IAPP: Engineering Privacy: Why Security isn’t Enough
A Case Study for Building Cybersecurity Policies for Industrial Robots
Bug Hunting on the Dark Side Tillmann Werner , CrowdStrike, Inc.
There Are No Domestic Cyber Issues: US & UK Leaders on Global Partnership
Attribute and Identity Based Encryption
Insider Threat Best Practice, Developing a Solid Program for Success
Security Humanitarianism: Extraordinary Examples of Tech Improving Lives Davi Ottenheimer
Advancing Information Risk Practices Seminar
Security Hopscotch
SANS NetWars Instructor
News Flash: Some Things Actually Do Work in Security!!! SANS Institute
Rapid Threat Modeling - Start Your Own Threat Model Now!
There’s a Cougar in the Car – Quickly Navigating through a Cyber Crisis
Timing Attacks Yuval Yarom
Homomorphic Encryption and Its Applications to DRM University of Connecticut
Securing Active Directory Correctly
VMware: The Software Defined Data Center and Network Virtualization: An Inherently Better Security Model
Malware Persistence on OS X Yosemite Patrick Wardle , Digita Security
Grow Up: A Maturity Model and Roadmap for Vulnerability Management (Core Security)
POSitively under Fire: What Are Retailers Facing?
How Next Generation Trusted Identities Can Give You a Business Edge (Entrust Datacard)
Enterprise Cloud Security via DevSecOps DevSecOps, Intuit
The Future of the ITU, ICANN and the IANA Transition
Security and Privacy in the Cloud: How Far Have We Come? Google Inc.
Operationalizing Threat Intelligence
Mock Trial: International Discovery and Analysis: Miscarriage of Justice?
The Day My Kids Brought Home Malware
Attribution Debate - Is It Worth It?
Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain
SANS: Metasploit Kung Fu for Enterprise Pen Testing SANS Institute
Bug Bounties: Internet Savior, Hype or Somewhere Between?
Leveraging Global Threat Intelligence: Raising the Cost of Cyber-Warfare
A Dialogue on Threat Intelligence KPIs Rafal Los , Optiv
Exploitation Trends: From Potential Risk to Actual Risk WW Cybersecurity & Data Protection, Microsoft
Medical Device Security: Assessing and Managing Product Security Risk
Something Awesome on Cloud and Containers Rich Mogull
Using an Open Source Threat Model for Prioritized Defense Enclave Security
Continue The Conversation: The Cryptographers' Panel
Tools of the Hardware Hacking Trade Joe Grand , Grand Idea Studio, Inc.
Preventing Data Breaches with Behavioral Analytics (Varonis Systems)
Full Disclosure: What Companies Should Tell Investors about Cyber Incidents
Does The New 2015 California Data Breach Law Protect Individual Privacy, Corporate Security, Both or Neither?
Realities of Private Cloud Security
IoT: When Things Crawl into Your Corporate Network
How To: Aggressive Remediation in an APT World
Want to be Secure in the Cloud? Build a Casino
Cybersecurity Awareness is a Big Deal for Small Business
Open Garages: Learn How Technology Drives Your Car
Trusted Servers for a Mistrusted World (UNICOM Engineering)
A Short History of Attacks on Finance Fox-IT
Vulnerability and Risk Scoring: What Ratings Really Mean Tripwire
Escaping Security’s Dark Ages
2014 Hack, Exploit and Malware Retrospective...And the Worry List Ahead SANS Institute
Algorithms for Solving Hard Problems Wei Wei
Effective Incident Response from the Front Lines
Trust in Mobile Enterprise – Have We Lost the Game?
Defending the Cloud from the Full Stack Hack Erik Peterson , Veracode
State of Cybersecurity: 2015 Findings and Implications
Preventing and Disrupting National Security Cyber Threats
The Third Rail: New Stakeholders Tackle Security Threats and Solutions
When Will InfoSec Grow Up?
Do You Know What You Don't Know?
Six Things Wireless Security Professionals Need to Know About Wireless
Welcome to the New School of Cyber Defense
Continuous Network Compliance: Finding Flaws and Betting Futures
Defending against State-Sponsored Cyber Theft of Intellectual Property Steptoe & Johnson LLP
Hugh Thompson and Guests
Detecting and Tracing Malicious Activities
The Newest Piece of Defense-in-Depth: Social Media & DNS
Interoperability: Making the Best of KMIP (QuintessenceLabs)
(ISC)2 Member Reception (Members Only)
Achieving Defendable Architectures via Threat-Driven Methodologies
Gumshoes Part Deux – Security Investigative Journalists Speak Out The New York Times
Defending Critical Infrastructure: Preparing via Real-World Cyber Exercises
I’m in Control Here: Who’s in Charge of Cybersecurity? CrowdStrike, Inc.
10 Tips for Running an Effective SOC - BuzzFeed Style
Risk & Compliance Management for Private & Hybrid Cloud Deployments
Majority Report: Making Security Data Actionable (and Fun!) Thibault Reuille , OpenDNS
Building The Midgardian Citadel: Active Detection and Response FireEye, Inc.
Why the Cyber Fusion Center Concept Works Target
What You Don't See WILL Breach You! "Intelligizing" Detection through Context
Compliance by Design: Using Innovation to Beat the Compliance Rat Race RSA
Defense in Depth to Coordinated Defense: Organizing against Our Common Enemy Sophos
Layered Defenses to Prevent Phishing Attacks
Use of Technology in Preserving and Protecting Humanity Morgan Marquis-Boire , Citizen Lab, University of Toronto
Chipping: The Next Litigation Issue on the Horizon