Star 0

Talks

Title Humans
Practical Intelligence Sharing: ISACs and ISAOs
Cloud Security Alliance Summit 2017: Securing the Converged Cloud
ISACA CISM 2-Day Cram to the Max Course Business Automation Consultants
SANS Core NetWars Experience-2
How Android and iOS Security Enhancements Complicate Threat Detection NowSecure
Are Zero-days the biggest threat to ERP systems? (Onapsis)
Can I Get a Witness? Technical Witness Bootcamp
Security Policy Development: Tips and Direction
Developing Super Women in Security BT , BT Americas
Building a Strategic Plan for Your Security Awareness Program (Overflow) SANS Institute
Applied Machine Learning: Defeating Modern Malicious Documents CSIRT
Women in Information Security EDUCAUSE
Mentoring New Cybersecurity Talent: Challenges and Tips
If You Want to See Your Data Again—Responding Intelligently to Ransomware Thomas Keenan , University of Calgary
(ISC)² CCSP Two-day Crash Course
How-to Series: Year One Innovators and Entrepreneurs The Wall Street Journal
Defending the Nation in Cyberspace: Can Gov’t and Industry Work Together? Jamil Jaffer , IronNet Cybersecurity
Security Investigative Journalists Speak Out
Purple Teaming: How to Approach It in 2017
Modern Cyber-Defense with Automated Real-Time Response: A Standards Update Symantec
Pitching Infosec in the Boardroom When Your Customers Don’t Care
Wilderness of Shlemiels Treadstone
IoT Evidence Analysis and Preservation in Investigations and Litigation Duff & Phelps LLC
Integrated Solutions for Trusted Clouds and SDI Red Hat
When and How to Influence the Board and Management?
Cybersecurity Challenges and Innovative Hardware Solutions from Intel Alex Nayshtut , Intel Corporation
Side-Channel Analysis Yu Yu , Shanghai Jiao Tong University
Public Key Algorithms
Look, C-Suite, No Hands! Communicating the Top 10 Privacy and Security Topics Intel Corporation
Symmetric Key Cryptanalysis The Netherlands
Changing Face/Fate of Identity
Threats and Opportunities—States Confront the Cyber-Challenge Virginia
(ISC)² CISSP Two-day Crash Course Instructor
The War in Cyberspace: Why We Are Losing—and How to Fight Back House Homeland Security Committee
Planning for Chaos RSA
New Certification Methods Keeping IT Pros on the Leading Edge of Cyber
Real Cops, Real Collaboration, Real Results Federal Bureau of Investigation
Tracking Darknet: A Window into Attackers’ Motives, Methods and Targets (Overflow) Andrew Lewman , Farsight Security, Inc.
Website Shadow IT: Where the Risks Lurk The Media Trust
Recent DDoS attacks aimed at taking down Internet - Protect your business (Citrix)
Doin’ the Regulatory Rumba Oracle
Who's Watching the Kids? Data Collection on Minors ISECOM
Developing Useful Metrics
The NIST Cybersecurity Framework: Who, What, Where? Tony Sager
What CISOs Wish They Could Say Out Loud Wendy Nather , Duo Security
What We Learned from the (ISC)2 Global Workforce Study Lynn Terwoerds , Executive Women's Forum
Supply Chain Security Challenges for Buyers and Suppliers EastWest Institute
Hot Topics in Cyber-Law 2017
What Teens Really Do Online
Taking the Offensive—Disrupting Cybercrime (BT)
Securing Diversity: Women in Cybersecurity Twistlock
Multifactor Authentication Redefined Wendy Nather , Duo Security
The Politics of Attribution Kenneth Geers , Comodo Group
A Worldwide Journey to Build a Secure Development Environment
Securing What You Don’t Own or Control: The Current State of Wi-Fi Security Pwnie Express
Securing the Internet of Everything: How Webroot Keeps a Smart City Safe (Webroot)
EU GDPR Best Practices
Opening RSA
Updating Surveillance Law on Government Access to Your Online Data Jamil Jaffer , IronNet Cybersecurity
Advancing Information Risk Practices
Establishing a Quality Vulnerability Management Program Major Automotive Company
Life and Death: Security Considerations for Safety-Critical Industries
Security Foundations Twistlock
Women in IT Security and Their Advocates Palo Alto Networks
Rise of the Identity Professional Engage Identity
DevSecOps—Building Continuous Security into IT and App Infrastructures Qualys
Managing Enterprise Risk through Legacy System Testing Philip Young , ZedSec390
Mobile Containers—The Good, the Bad and the Ugly Adi Sharabani , Skycure
Cyber/Physical Security and the IoT: National Security Considerations
Penetration Testing and Mainframes Philip Young , ZedSec390
DevOps Connect: DevSecOps Edition Carnegie Mellon University
How Can CISO’s Obtain Pertinent Information in the Real World?
SANS Active Defense, Offensive Countermeasures and Cyber Deception BHIS
Securing What You Don’t Own or Control: The Current State of Wi-Fi Security (Overflow) Pwnie Express
Fortune 100 Global Energy Company’s Privileged Account Management (Thycotic)
A Clear View: Cybersecurity by the Numbers
SANS Securing the Human: How to Build, Maintain and Measure a High-Impact Awareness Program SANS Institute
Rules for Vendors When Dealing with CISOs
Side-Channel Resistant Implementations Riscure
The Quest to Measure Strength of Function for Authenticators: SOFA, So Good Deloitte & Touche LLP
ISACA CSX Cybersecurity Fundamentals
Building Information Security into Your Third-Party Vendor Management Program Cybersecurity
Unexpected IoT—Solar Panels Compromise Fred Bret-Mounet
Project Overwatch: Multinational Effort to Combat IMSI Catchers Project Overwatch
Security Automation and Orchestration Best Practices Microsoft Corporation
Beyond Stuxnet: State of the Art in Cyberwarfare and Weapons enSilo Inc
Evolution of Deliberate Threats to Satellite Navigation Systems
Sweating the Small Stuff on a Global Scale Intel Security
SANS Core NetWars Experience
Who Will Oversee the Private Sector Cybersecurity under Trump?
IoT End of Days
Protecting and Defending against Cyberthreats in Uncertain Times Microsoft Corporation
Impact of Data Discovery and Data Classification in Info (Spirion)
Open Security Controller: Security Orchestration for OpenStack Intel Corporation
Solving Cybersecurity in the Next Five Years: Systematizing Progress for the Short Term Major Financial Institution
SANS Critical Security Controls: Planning, Implementing and Auditing Enclave Security
Auditors in the Cloud: Audit Risk and SaaS Applications
Meet and Greet with the macOS Malware Class of 2016 Patrick Wardle , Synack
Welcome Reception
Is Privacy Extinct? BT , BT Americas
The Future of Privacy
Creating an Ecosystem of Trust in a Transforming Digital World (Entrust Datacard)
Serverless Security: Are You Ready for the Future? Signal Sciences Corp.
Deconstructing Identity Analytics for Higher Risk Awareness
Advanced Cybersecurity: AI and Machine Learning
Hardening the Cloud: Assuring Agile Security in High-Growth Environments
Owning Security in a Container Environment Aqua Security
Cryptographic Protocols
Delivering Secure, Client-Side Technology to Billions of Users Adrian Ludwig , Google Inc. , Android Security
One-Hour Privacy Primer for Security Officers Northern Trust
Wireless Sensors’ Power Consumption and IoT Security
User Error: The Economics of Privacy and Proprietary Data Salesforce
Insights and Lessons from Threat Intelligence Security Operations LookingGlass Cyber Solutions
Keeping your organization safe by empowering your network (Juniper Networks)
Navigating Cybersecurity in the Connected-Car Revolution
Beyond Logs: Wire Data Analytics
Internet of Insecurity: Can Industry Solve It or Is Regulation Required? Bruce Schneier , IBM Security
Foreign Espionage, Social Media, and the Unwitting Insider Threat
Security at Slack: The First Three Years Slack
So You Want to Start Your Own Security Company? University of Chicago Medical Center
Lessons from a Billion Breached Records (Overflow)
Measuring Authentication: NIST 800-63 and Vectors of Trust Engage Identity
NSX Micro-segmentation Benchmark (VMware)
Lessons from a Billion Breached Records
The Future of Cyberthreats: 2017 and Beyond BPC Plus
Tidal Forces: The Changes Ripping Apart Security as We Know It Rich Mogull
IAPP: The New Technological Approach to Privacy
Global Traffic Analysis 101 Kenneth Geers , Comodo Group
Threat Modeling the Trenches to the Clouds Intel Security
SANS Lethal Threat Hunting and Incident Response Techniques Rendition Infosec
Help Wanted: Security Heroes and Heroines Only Need Apply Cylance
Security Bulletins on Trial: Are Vendors Guilty of Information Obscurity? Tripwire
The Human Exploitation Kill Chain
Tracking Darknet: A Window into Attackers’ Motives, Methods and Targets Andrew Lewman , Farsight Security, Inc.
A View from the Outside: A New Perspective on Security
A Cybersecurity Revolution: Software Provence and Information Sharing
Best Practices: Securing Industrial Networks
How to Best Measure the Cost of Security Red Hat, Inc.
Keeping Young Hackers Out of Orange Jumpsuits (Even if it's the New Black) Bellevue University
Talking to Teens & Tweens About CyberSafety-Getting Through When They Know-It-All Bellevue University
One-Hit Wonders: Dealing with Millions of Anomalies (Focus-On) Symantec
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts Microsoft Corporation
Lessons from a Recovering Runtime Application Self-Protection Addict NetSuite
Meet the Leaders of the Startup Nation
The Shell Game of Electronically Stored Information (ESI)?
Fixing the Fixing Mitja Kolsek , ACROS Security
High-Performance Computing Will Make or Break Cybersecurity
Why Cyber-Training Is Key, and How to Do It Right VDA Labs
No More Security Empires: The CISO as an Individual Contributor AvidXchange
Finding Solutions for Your Static Analysis Problems
A Worldwide Journey to Build a Secure Development Environment (Focus-On)
Hot Topics in Privacy: A Conversation with Google, Microsoft and Cisco Google Inc.
Public Key Implementations Security Innovation
Opening Up the Digital Dialogue
CISO as Change Agent: Getting to Yes SANS Institute
Opening the Door to DoD Perspectives on Cyberthreat Intelligence
Congressional Oversight in the Wake of Russian Hacking Homeland Security
Terrorism in Cyberspace IronNet Cybersecurity
Regulating the Internet of Things Bruce Schneier , IBM Security
Fighting Cybercrime Using the Blockchain Jonathan Levin
Ransomware, Drones, Smart TVs, Bots: Protecting Consumers in the Age of IoT Terrell McSweeny , Federal Trade Commission
Why Johnny STILL Can’t Encrypt Thales e-Security
Secrets Management
Expanding Your Blue Team by Creating Security Culture Elevate Security
Final Boarding for DevOps! You Don’t Have to Go Home, but... Atlantic Council , I am The Cavalry
Changing Behaviors at Enterprise-Scale
How to Transform Developers into Security People
Ransomware Symantec
New Cyberwarfare
IoT and SCADA: Lessons Learned and Case Studies
STRONG: Leading Security into the Future
Making the Business Case for Managing Cyber-Risk
Cutting Through the Security Analytics Hype (SAS)
Building a Strategic Plan for Your Security Awareness Program SANS Institute
Cyber-Development Ecosystem Tel Aviv University
Taming the Wild West: Trends in the Development of Nation-State Cyber-Norms
Securing the North American Electric Grid
Find Map, Get Treasure, Avoid Pirates—Data Security and Privacy Best Practice
Workplace Violence and IT Sabotage: Two Sides of the Same Coin? Carnegie Mellon University
Charting the Course to GDPR: Setting Sail
The Need for Multi-Cloud Security (CipherCloud)
Innovation Sandbox - "Most Innovative Startup" Live
Securing Serverless Applications in the Cloud Cloud Research, Trend Micro, Inc.
Cyber-Insurance: Fraud, Waste or Abuse David Nathans , SOCSoter, Inc.
The State of Digital Supplier Risk Management: In Partners We Trust
One-Hit Wonders: Dealing with Millions of Anomalies Symantec
Network Pixies: Abusing PXE Andy Wortman , Cylance
Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time? Tripwire
Incident Response in the Public Cloud Netflix
The Cryptographers’ Panel Adi Shamir
Continuous Authentication and Distributed Session Management
Analytics vs. Bacon: which would you choose? (CA Technologies)
Top Five Secrets to Successfully Jumpstarting Your Cyber-Risk Program Autodesk
RSAC CyberSmart Parents Education Workshop: “The Always-On Generation and the Evolving Digital Landscape”
Critical Hygiene for Preventing Major Breaches Microsoft Corporation
Cybersecurity Roadmap: Global Healthcare Security Architecture Global Healthcare IT
Cyber Strategy & Business Innovation: Integrating InfoSec Into Real Business Booz Allen Hamilton