Practical Intelligence Sharing: ISACs and ISAOs
|
|
Cloud Security Alliance Summit 2017: Securing the Converged Cloud
|
|
ISACA CISM 2-Day Cram to the Max Course
|
Business Automation Consultants
|
SANS Core NetWars Experience-2
|
|
How Android and iOS Security Enhancements Complicate Threat Detection
|
NowSecure
|
Are Zero-days the biggest threat to ERP systems? (Onapsis)
|
|
Can I Get a Witness? Technical Witness Bootcamp
|
|
Security Policy Development: Tips and Direction
|
|
Developing Super Women in Security
|
BT
,
BT Americas
|
Building a Strategic Plan for Your Security Awareness Program (Overflow)
|
SANS Institute
|
Applied Machine Learning: Defeating Modern Malicious Documents
|
CSIRT
|
Women in Information Security
|
EDUCAUSE
|
Mentoring New Cybersecurity Talent: Challenges and Tips
|
|
If You Want to See Your Data Again—Responding Intelligently to Ransomware
|
Thomas Keenan
,
University of Calgary
|
(ISC)² CCSP Two-day Crash Course
|
|
How-to Series: Year One Innovators and Entrepreneurs
|
The Wall Street Journal
|
Defending the Nation in Cyberspace: Can Gov’t and Industry Work Together?
|
Jamil Jaffer
,
IronNet Cybersecurity
|
Security Investigative Journalists Speak Out
|
|
Purple Teaming: How to Approach It in 2017
|
|
Modern Cyber-Defense with Automated Real-Time Response: A Standards Update
|
Symantec
|
Pitching Infosec in the Boardroom When Your Customers Don’t Care
|
|
Wilderness of Shlemiels
|
Treadstone
|
IoT Evidence Analysis and Preservation in Investigations and Litigation
|
Duff & Phelps LLC
|
Integrated Solutions for Trusted Clouds and SDI
|
Red Hat
|
When and How to Influence the Board and Management?
|
|
Cybersecurity Challenges and Innovative Hardware Solutions from Intel
|
Alex Nayshtut
,
Intel Corporation
|
Side-Channel Analysis
|
Yu Yu
,
Shanghai Jiao Tong University
|
Public Key Algorithms
|
|
Look, C-Suite, No Hands! Communicating the Top 10 Privacy and Security Topics
|
Intel Corporation
|
Symmetric Key Cryptanalysis
|
The Netherlands
|
Changing Face/Fate of Identity
|
|
Threats and Opportunities—States Confront the Cyber-Challenge
|
Virginia
|
(ISC)² CISSP Two-day Crash Course
|
Instructor
|
The War in Cyberspace: Why We Are Losing—and How to Fight Back
|
House Homeland Security Committee
|
Planning for Chaos
|
RSA
|
New Certification Methods Keeping IT Pros on the Leading Edge of Cyber
|
|
Real Cops, Real Collaboration, Real Results
|
Federal Bureau of Investigation
|
Tracking Darknet: A Window into Attackers’ Motives, Methods and Targets (Overflow)
|
Andrew Lewman
,
Farsight Security, Inc.
|
Website Shadow IT: Where the Risks Lurk
|
The Media Trust
|
Recent DDoS attacks aimed at taking down Internet - Protect your business (Citrix)
|
|
Doin’ the Regulatory Rumba
|
Oracle
|
Who's Watching the Kids? Data Collection on Minors
|
ISECOM
|
Developing Useful Metrics
|
|
The NIST Cybersecurity Framework: Who, What, Where?
|
Tony Sager
|
What CISOs Wish They Could Say Out Loud
|
Wendy Nather
,
Duo Security
|
What We Learned from the (ISC)2 Global Workforce Study
|
Lynn Terwoerds
,
Executive Women's Forum
|
Supply Chain Security Challenges for Buyers and Suppliers
|
EastWest Institute
|
Hot Topics in Cyber-Law 2017
|
|
What Teens Really Do Online
|
|
Taking the Offensive—Disrupting Cybercrime (BT)
|
|
Securing Diversity: Women in Cybersecurity
|
Twistlock
|
Multifactor Authentication Redefined
|
Wendy Nather
,
Duo Security
|
The Politics of Attribution
|
Kenneth Geers
,
Comodo Group
|
A Worldwide Journey to Build a Secure Development Environment
|
|
Securing What You Don’t Own or Control: The Current State of Wi-Fi Security
|
Pwnie Express
|
Securing the Internet of Everything: How Webroot Keeps a Smart City Safe (Webroot)
|
|
EU GDPR Best Practices
|
|
Opening
|
RSA
|
Updating Surveillance Law on Government Access to Your Online Data
|
Jamil Jaffer
,
IronNet Cybersecurity
|
Advancing Information Risk Practices
|
|
Establishing a Quality Vulnerability Management Program
|
Major Automotive Company
|
Life and Death: Security Considerations for Safety-Critical Industries
|
|
Security Foundations
|
Twistlock
|
Women in IT Security and Their Advocates
|
Palo Alto Networks
|
Rise of the Identity Professional
|
Engage Identity
|
DevSecOps—Building Continuous Security into IT and App Infrastructures
|
Qualys
|
Managing Enterprise Risk through Legacy System Testing
|
Philip Young
,
ZedSec390
|
Mobile Containers—The Good, the Bad and the Ugly
|
Adi Sharabani
,
Skycure
|
Cyber/Physical Security and the IoT: National Security Considerations
|
|
Penetration Testing and Mainframes
|
Philip Young
,
ZedSec390
|
DevOps Connect: DevSecOps Edition
|
Carnegie Mellon University
|
How Can CISO’s Obtain Pertinent Information in the Real World?
|
|
SANS Active Defense, Offensive Countermeasures and Cyber Deception
|
BHIS
|
Securing What You Don’t Own or Control: The Current State of Wi-Fi Security (Overflow)
|
Pwnie Express
|
Fortune 100 Global Energy Company’s Privileged Account Management (Thycotic)
|
|
A Clear View: Cybersecurity by the Numbers
|
|
SANS Securing the Human: How to Build, Maintain and Measure a High-Impact Awareness Program
|
SANS Institute
|
Rules for Vendors When Dealing with CISOs
|
|
Side-Channel Resistant Implementations
|
Riscure
|
The Quest to Measure Strength of Function for Authenticators: SOFA, So Good
|
Deloitte & Touche LLP
|
ISACA CSX Cybersecurity Fundamentals
|
|
Building Information Security into Your Third-Party Vendor Management Program
|
Cybersecurity
|
Unexpected IoT—Solar Panels Compromise
|
Fred Bret-Mounet
|
Project Overwatch: Multinational Effort to Combat IMSI Catchers
|
Project Overwatch
|
Security Automation and Orchestration Best Practices
|
Microsoft Corporation
|
Beyond Stuxnet: State of the Art in Cyberwarfare and Weapons
|
enSilo Inc
|
Evolution of Deliberate Threats to Satellite Navigation Systems
|
|
Sweating the Small Stuff on a Global Scale
|
Intel Security
|
SANS Core NetWars Experience
|
|
Who Will Oversee the Private Sector Cybersecurity under Trump?
|
|
IoT End of Days
|
|
Protecting and Defending against Cyberthreats in Uncertain Times
|
Microsoft Corporation
|
Impact of Data Discovery and Data Classification in Info (Spirion)
|
|
Open Security Controller: Security Orchestration for OpenStack
|
Intel Corporation
|
Solving Cybersecurity in the Next Five Years: Systematizing Progress for the Short Term
|
Major Financial Institution
|
SANS Critical Security Controls: Planning, Implementing and Auditing
|
Enclave Security
|
Auditors in the Cloud: Audit Risk and SaaS Applications
|
|
Meet and Greet with the macOS Malware Class of 2016
|
Patrick Wardle
,
Synack
|
Welcome Reception
|
|
Is Privacy Extinct?
|
BT
,
BT Americas
|
The Future of Privacy
|
|
Creating an Ecosystem of Trust in a Transforming Digital World (Entrust Datacard)
|
|
Serverless Security: Are You Ready for the Future?
|
Signal Sciences Corp.
|
Deconstructing Identity Analytics for Higher Risk Awareness
|
|
Advanced Cybersecurity: AI and Machine Learning
|
|
Hardening the Cloud: Assuring Agile Security in High-Growth Environments
|
|
Owning Security in a Container Environment
|
Aqua Security
|
Cryptographic Protocols
|
|
Delivering Secure, Client-Side Technology to Billions of Users
|
Adrian Ludwig
,
Google Inc.
,
Android Security
|
One-Hour Privacy Primer for Security Officers
|
Northern Trust
|
Wireless Sensors’ Power Consumption and IoT Security
|
|
User Error: The Economics of Privacy and Proprietary Data
|
Salesforce
|
Insights and Lessons from Threat Intelligence Security Operations
|
LookingGlass Cyber Solutions
|
Keeping your organization safe by empowering your network (Juniper Networks)
|
|
Navigating Cybersecurity in the Connected-Car Revolution
|
|
Beyond Logs: Wire Data Analytics
|
|
Internet of Insecurity: Can Industry Solve It or Is Regulation Required?
|
Bruce Schneier
,
IBM Security
|
Foreign Espionage, Social Media, and the Unwitting Insider Threat
|
|
Security at Slack: The First Three Years
|
Slack
|
So You Want to Start Your Own Security Company?
|
University of Chicago Medical Center
|
Lessons from a Billion Breached Records (Overflow)
|
|
Measuring Authentication: NIST 800-63 and Vectors of Trust
|
Engage Identity
|
NSX Micro-segmentation Benchmark (VMware)
|
|
Lessons from a Billion Breached Records
|
|
The Future of Cyberthreats: 2017 and Beyond
|
BPC Plus
|
Tidal Forces: The Changes Ripping Apart Security as We Know It
|
Rich Mogull
|
IAPP: The New Technological Approach to Privacy
|
|
Global Traffic Analysis 101
|
Kenneth Geers
,
Comodo Group
|
Threat Modeling the Trenches to the Clouds
|
Intel Security
|
SANS Lethal Threat Hunting and Incident Response Techniques
|
Rendition Infosec
|
Help Wanted: Security Heroes and Heroines Only Need Apply
|
Cylance
|
Security Bulletins on Trial: Are Vendors Guilty of Information Obscurity?
|
Tripwire
|
The Human Exploitation Kill Chain
|
|
Tracking Darknet: A Window into Attackers’ Motives, Methods and Targets
|
Andrew Lewman
,
Farsight Security, Inc.
|
A View from the Outside: A New Perspective on Security
|
|
A Cybersecurity Revolution: Software Provence and Information Sharing
|
|
Best Practices: Securing Industrial Networks
|
|
How to Best Measure the Cost of Security
|
Red Hat, Inc.
|
Keeping Young Hackers Out of Orange Jumpsuits (Even if it's the New Black)
|
Bellevue University
|
Talking to Teens & Tweens About CyberSafety-Getting Through When They Know-It-All
|
Bellevue University
|
One-Hit Wonders: Dealing with Millions of Anomalies (Focus-On)
|
Symantec
|
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
|
Microsoft Corporation
|
Lessons from a Recovering Runtime Application Self-Protection Addict
|
NetSuite
|
Meet the Leaders of the Startup Nation
|
|
The Shell Game of Electronically Stored Information (ESI)?
|
|
Fixing the Fixing
|
Mitja Kolsek
,
ACROS Security
|
High-Performance Computing Will Make or Break Cybersecurity
|
|
Why Cyber-Training Is Key, and How to Do It Right
|
VDA Labs
|
No More Security Empires: The CISO as an Individual Contributor
|
AvidXchange
|
Finding Solutions for Your Static Analysis Problems
|
|
A Worldwide Journey to Build a Secure Development Environment (Focus-On)
|
|
Hot Topics in Privacy: A Conversation with Google, Microsoft and Cisco
|
Google Inc.
|
Public Key Implementations
|
Security Innovation
|
Opening Up the Digital Dialogue
|
|
CISO as Change Agent: Getting to Yes
|
SANS Institute
|
Opening the Door to DoD Perspectives on Cyberthreat Intelligence
|
|
Congressional Oversight in the Wake of Russian Hacking
|
Homeland Security
|
Terrorism in Cyberspace
|
IronNet Cybersecurity
|
Regulating the Internet of Things
|
Bruce Schneier
,
IBM Security
|
Fighting Cybercrime Using the Blockchain
|
Jonathan Levin
|
Ransomware, Drones, Smart TVs, Bots: Protecting Consumers in the Age of IoT
|
Terrell McSweeny
,
Federal Trade Commission
|
Why Johnny STILL Can’t Encrypt
|
Thales e-Security
|
Secrets Management
|
|
Expanding Your Blue Team by Creating Security Culture
|
Elevate Security
|
Final Boarding for DevOps! You Don’t Have to Go Home, but...
|
Atlantic Council
,
I am The Cavalry
|
Changing Behaviors at Enterprise-Scale
|
|
How to Transform Developers into Security People
|
|
Ransomware
|
Symantec
|
New Cyberwarfare
|
|
IoT and SCADA: Lessons Learned and Case Studies
|
|
STRONG: Leading Security into the Future
|
|
Making the Business Case for Managing Cyber-Risk
|
|
Cutting Through the Security Analytics Hype (SAS)
|
|
Building a Strategic Plan for Your Security Awareness Program
|
SANS Institute
|
Cyber-Development Ecosystem
|
Tel Aviv University
|
Taming the Wild West: Trends in the Development of Nation-State Cyber-Norms
|
|
Securing the North American Electric Grid
|
|
Find Map, Get Treasure, Avoid Pirates—Data Security and Privacy Best Practice
|
|
Workplace Violence and IT Sabotage: Two Sides of the Same Coin?
|
Carnegie Mellon University
|
Charting the Course to GDPR: Setting Sail
|
|
The Need for Multi-Cloud Security (CipherCloud)
|
|
Innovation Sandbox - "Most Innovative Startup" Live
|
|
Securing Serverless Applications in the Cloud
|
Cloud Research, Trend Micro, Inc.
|
Cyber-Insurance: Fraud, Waste or Abuse
|
David Nathans
,
SOCSoter, Inc.
|
The State of Digital Supplier Risk Management: In Partners We Trust
|
|
One-Hit Wonders: Dealing with Millions of Anomalies
|
Symantec
|
Network Pixies: Abusing PXE
|
Andy Wortman
,
Cylance
|
Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?
|
Tripwire
|
Incident Response in the Public Cloud
|
Netflix
|
The Cryptographers’ Panel
|
Adi Shamir
|
Continuous Authentication and Distributed Session Management
|
|
Analytics vs. Bacon: which would you choose? (CA Technologies)
|
|
Top Five Secrets to Successfully Jumpstarting Your Cyber-Risk Program
|
Autodesk
|
RSAC CyberSmart Parents Education Workshop: “The Always-On Generation and the Evolving Digital Landscape”
|
|
Critical Hygiene for Preventing Major Breaches
|
Microsoft Corporation
|
Cybersecurity Roadmap: Global Healthcare Security Architecture
|
Global Healthcare IT
|
Cyber Strategy & Business Innovation: Integrating InfoSec Into Real Business
|
Booz Allen Hamilton
|