End Island Hopping Hackers’ Vacation in Your Information Supply Chain (Focus-On)
|
Trend Micro, Inc.
|
Excellence in Information Security & Excellence in the Field of Public Policy
|
|
Bro, Do You Even Cybercrime? Key 2016 Trends
|
SANS Institute
|
Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil
|
Alexander Polyakov
,
ERPScan
|
Bridging Cybercrime and Cybersecurity—How Law Enforcement Battles Cyberthreats
|
|
Disrupting Adversarial Success—Giving the Bad Guys No Sleep
|
McAfee
|
The Newest Element of Risk Metrics: Social Media
|
Ian Amit
,
ZeroFOX
|
Identity Standards at Work in Google’s Mobile-Focused Future
|
Microsoft Corporation
|
Threat Intelligence: From an Unknown Discipline to Cyber-Buzzword (WEBROOT)
|
|
How to Operationalize Cyber Risk Intelligence (RiskVision (Formerly Agiliance))
|
|
Dissecting Derusbi
|
|
Applying Auto-Data Classification Techniques for Large Data Sets
|
|
The Great Questions of Tomorrow
|
|
Dissecting Bitcoin Security
|
|
Effectively Measuring Cybersecurity Improvement: A CSF Use Case
|
|
Global Assurance Report Card Survey: Raising Your Security Confidence Score (Tenable Network Security)
|
|
Five Ways to Drive Revenue by Protecting Customer Privacy
|
|
Protect Your King: The Key to Maintaining Control of Your Business (Cyberark Software, Inc.)
|
|
Codifying the Brain: Automation, Alerts and a Human Resource Answer
|
FireEye, Inc.
|
CyberSmart Parents Education Workshop
|
|
Hacking Inward—Implementing Effective Cyber “War Games”
|
SafeBreach
|
DON'T Use Two-Factor Authentication...Unless You Need It!
|
|
Embracing and Extending Kids’ Curiosity to Inspire Future Professionals
|
ISECOM
|
Introducing a Security Program to Large Scale Legacy Products
|
|
Pressure Is Building around Cyber-Related Liability: NYSE Board-Level Research (Veracode)
|
|
The Future of Bitcoin and Cryptocurrencies
|
Stanford University
|
The Art of Hacking a Human
|
|
The Rise of the Purple Team
|
William Bengtson
|
What has Your Threat Intelligence Done for you Lately? (Rapid7)
|
|
How to Verify Procedures
|
|
The Aftermath of a Breach: Best Practices for Working with Law Enforcement
|
|
Compliance as a Hammer: Aligning with FedRAMP
|
Akamai Technologies
|
Dave Isay on the History of StoryCorps and the Power of Storytelling
|
|
They’re People—Not Data! The Human Side of Insider Cyberthreats
|
|
Transforming Your Security Culture: From Awareness to Practice to Maturity
|
SANS Institute
|
Live Cyber-Exercise: Responding to National Crisis
|
Jason Healey
|
Safeguarding the Digital Frontier: Balancing “Security” and “Security”
|
House Homeland Security Committee
|
People Make the Best Exploits (Proofpoint)
|
|
Sensitive Data Management Maturity - The DLP Missing Link (Identity Finder )
|
|
Bridging the Gap between Threat Intelligence and Risk Management
|
|
Product Security at Internet Scale
|
Lookout
|
The Impact of Security Megatrends on Your Infosec Program
|
Booz Allen Hamilton
|
A New, Radically Innovative US-CCU Cybersecurity Checklist (Focus-On)
|
|
When Attackers Want Your IP: Valuing and Guarding Prized Business Assets
|
Deloitte
|
Cyberwar Games: Enhancing Board of Directors Cybersecurity Oversight
|
|
Doing Something Smart with All the Smart Things
|
RSA Labs
|
Customer Centric Security and Architecture—a CISO/CTO Study
|
|
Data Science Transforming Security Operations
|
|
Financial Sector and the Evolving Threat Landscape: Live Cyber-Exercise
|
Sarah Brown
,
Fox-IT
|
One Team, One Fight
|
Federal Bureau of Investigation
|
Real-World Examples of Positive Security ROI
|
SANS Institute
|
Dreaming of IoCs: Adding Time Context to Threat Intelligence
|
Travis Smith
,
Tripwire
|
From SOC to Cybersecurity Center
|
|
Side-Channel Attacks on Elliptic Curve Cryptography
|
|
Not So Fast…Myths and Misunderstanding Surrounding Reactive Strikes
|
CrowdStrike, Inc.
|
Lifetime Achievement Award
|
|
Bring Your Own Internet of Things (BYO-IoT)
|
Jake Kouns
,
Risk Based Security
|
Witness the Russian Attack: Live Demos of Their Steps, Tools, Techniques
|
Wayne Huang
|
Saying Goodbye: Managing Security for Departing Personnel
|
Morrison Consulting
|
How Anomaly Detection via the Cloud Can Close Your Security Gap (iboss Cybersecurity)
|
|
Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards
|
|
Detecting Stealthy Web Application Vulnerabilities Automatically (Acunetix)
|
|
Docker: Containing the Security Excitement
|
David Mortman
|
Using Cybersecurity Career Lifecycle to Get In and Stay in the Profession
|
|
Data Breach Litigation: How to Avoid It and Be Better Prepared for Defense
|
|
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
|
|
What Is Next-Generation Endpoint Security and Why Do You Need It?
|
|
Ghosts in the Network: SS7 and RF Vulnerabilities in Cellular Networks
|
Project Overwatch
|
Catching APT X with Expertise and Intelligence-Based Technologies (Kaspersky Lab)
|
|
The Secrets of Malware Success on Google Play Store
|
Sophos
|
From Cave Man to Business Man, the Evolution of the CISO to CIRO
|
|
Offense & Defense: Defense in Depth, Social Engineering and Historical Lessons
|
Layered Insight
|
The Art of Avoiding Authentication: How Criminals Are Hacking Apple Pay
|
Vijay Balasubramaniyan
,
Pindrop
|
Ascending the Path to Better Security
|
|
Data Breach Digest – Scenarios from the Field (Verizon)
|
|
Cloud Security Essentials 2.0
|
DevSecOps, Intuit
|
Hacking a Professional Drone
|
Nils Rodday
|
Applying Top Secret and Military Network Grade Security in the Real World
|
Dor Knafo
|
Detection, Prevention and Response Strategy: The Return of the Endpoint
|
|
Thinking Digital Enablement, Think Protection, Think Process Re-engineering
|
|
Power Broker’s lesson for security professionals (Arbor Networks)
|
|
Hacking Critical Infrastructure Like You’re Not a N00b
|
Jason Larsen
,
IOActive, Inc.
|
Automation and Virtualization Simplify Life: Can They Simplify Security?
|
|
Turning the Tide: Driving Software Security in the Enterprise
|
|
The Ultimate Reason Why Hackers Are Winning the Mobile Malware Battle
|
Yair Amit
,
Modern OS, Symantec
|
The Cybersecurity Risk Information Sharing Program: Bi-Directional Trust
|
Michael Smith
|
AppSec Awareness: A Blueprint for Security Culture Change
|
|
Leveraging Analytics for Data Protection Decisions
|
David Mortman
|
IoT Breaks All the Rules: How Should Developers and Organizations React?
|
Booz Allen Hamilton
|
Data Classification—Reclaiming Infosec’s Redheaded Stepchild
|
|
Demystifying Security Analytics: Data, Methods, Use Cases
|
|
(ISC)² CISSP Two-day Crash Course
|
Battelle Memorial Institute
|
Separating Fact From Fiction: The Real Risks Within Medical Device
|
|
Super CISO 2020
|
|
Intro to Car Hacking
|
Chris Valasek
,
Uber ATC
|
Opportunities and Challenges to Securing the Internet of Things
|
|
Assessing Risk: CSOs and Cyber-Insurance
|
Raytheon Foreground Security
|
Security Investigative Journalists Speak Out—More Breaches, More Problems
|
The New York Times
|
TLS Certificates on the Web—The Good, the Bad and the Ugly
|
|
Autonomous Hacking: The New Frontiers of Attack and Defense
|
Giovanni Vigna
,
Lastline, Inc.
|
Domain Knowledge: How to Factor DNS into Your Privacy and Security Strategy
|
|
Building an Effective Supply Chain Security Program
|
SANS Institute
|
The Measure of Success: Security Metrics to Tell Your Story
|
PwC
|
Open-Source Poisoning: Can We Trust the Diverse Open-Source Ecosystem (Trustwave)
|
|
Unveiling Security Gaps in ICS Networks: A Myth-Busting Session
|
|
Makers vs. Breakers: On Exploit Development and Software Engineering
|
Robert Graham
|
A Fitness Test for Fostering Women Leaders in IT Security
|
The Executive Women's Forum
|
Active Defense: Defining the Policy, Technology and Legal Landscape
|
Steptoe & Johnson LLP
|
Data-Driven App Sec
|
|
Criminals don’t wear orange jumpsuits in public (Zscaler)
|
|
Proactive Measures to Mitigate Insider Threat
|
|
It’s Personal: Attacks on the Individual
|
Independent Security Evaluators
|
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
|
|
Information Security Leadership Development: Surviving as a Security Leader
|
Cylance
|
2016: The Changing Face of Cyber in the Federal Space
|
|
Xtreme RFP: Help Design a Live Vendor Review Session for RSAC 2017!
|
|
The 90-Day Information Security Strategy
|
|
Should I Stay or Should I Go? How to Attract/Retain Women in the Industry
|
Optiv
|
Wake Up Call: Do Industry Analysts Actually Stifle Security Innovation?
|
|
How to Build or Buy an Integrated Security Stack
|
|
TCG: Securing the IoT with Trusted Computing
|
Tony Sager
|
How to Explain Cybersecurity to the Board Using a Simple Metaphor: FIRE
|
|
Nothing Lasts Forever—Trust Has an Expiration Date
|
Matthew Bryant
|
Vendor Security Practices: Turn the Rocks Over Early and Often
|
|
Introduction and a Look at Security Trends
|
|
Securing Automobility: Cyborgs and the Social Network of Things
|
|
Integrating Cybersecurity into Supply Chain Risk Management
|
|
CyBEER Ops
|
|
Industrial Cyberthreats: The Kaspersky Lab View
|
Kaspersky Lab
|
Got Coverage? Cyber-Insurance Realities Revealed
|
|
Alerts for Digital Identity System Operation and Fraud Detection
|
|
The State of End-User Security—Global Data from 30,000+ Websites
|
|
Demystifying a Malware Attack
|
|
The (Inevitable?) Decline of the Digital Age…
|
Palo Alto Networks
|
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
|
|
Hot Topics in Technology Law
|
|
Cancelled - Aligning and Prioritizing Risk Efforts across the Enterprise
|
|
Cryptoparty: tuTORial—Learn How to Use TOR to Be Anonymous Online
|
|
How to Steer Cybersecurity with Only One KPI: The Cyberrisk Resilience
|
|
Evolving Security Operations: The Future of Orchestration
|
Fortinet, Inc.
|
Protecting Organizations: Emerging Threats and Software Supply Chain Analysis
|
|
Cryptanalysis of Symmetric Key Encryption
|
Institute for Infocomm Research
|
Preventing Cyber-Exposure: You Say Criminal, I Say Intractable
|
|
The Data Behind How We Work with Data
|
|
Not Lost in Translation: Building an Architecture to Reshape Cybersecurity
|
VMware
|
A United Front: the Benefits and Challenges of Sharing Threat Intelligence
|
Cloudmark
|
Attacks on Critical Infrastructure: Insights from the “Big Board”
|
RSA
|
Cloud Attacks Illustrated: Insights from the Cloud Provider
|
Tomer Teller
|
How Broken Is Our Crypto Really?
|
|
Identity as a Critical Next Step in Security (Entrust Datacard)
|
|
One Approach to Rule Them All—Global Privacy and Security
|
|
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
|
|
Advancing Information Security Strategies in Higher Education
|
EDUCAUSE
|
Threat Modeling the Minecraft Way
|
|
My Life as Chief Security Officer at Google
|
Google Inc.
|
Privacy, Security, IT and the New European General Protection Regulation
|
Cisco Systems
|
Identity Intelligence and Insights into Insider Threat (Capgemini)
|
|
Security Issues in Transportation: Need for Collaboration for Solutions
|
|
Bank the Unbanked—With One of the Largest PKIs Ever Built
|
|
Threats of Greatest Consequence Heading into 2016
|
|
Government in the Crossfire: Data Privacy in an Era of Growing Cyberthreats
|
Electronic Frontier Foundation
|
Cyber-Alarm 2016: Major Cyber-Breach Exercise
|
|
Open-Source Security Management and Vulnerability Impact Assessment
|
|
Understanding HTTP/2
|
Trustwave SpiderLabs
|
Effectively Measuring Cybersecurity Improvement: A CSF Use Case (Focus-On)
|
|
Who Are You? From Meat to Electrons and Back Again
|
|
Security Maturity Models: A Dime a Dozen or Priceless?
|
|
Understanding the Security Vendor Landscape Using the Cyber Defense Matrix
|
Bank of America
|
SANS: A Practical Introduction to Cyber Security Risk Management
|
|
Rise of the Hacking Machines
|
Konstantinos Karagiannis
,
BT Americas
|
Searchable Symmetric Encryption
|
|
The Evolution and Impact of the Democratization of Malware & Hacking Tools (Easy Solutions)
|
|
Managing Increasing Compliance Obligations across Multiple Industries
|
|
Safety Issues in Advanced AI
|
|
Hide and Seek: How Threat Actors Respond in the Face of Public Exposure
|
FireEye, Inc.
|
Exploring the Foundations of Mobile Trust
|
Josh Thomas
,
Atredis Partners
|
Guiding Principles to Defending Organizations
|
Palo Alto Networks
|
Build It In—A Proactive Approach to Securing Applications, Users and Data
|
Hewlett Packard Enterprise
|
Securing the Industrial Internet of Things: A Deep Dive into the Future
|
|
CSI: Cyber Panel: Security Dramas Arrive on the Small Screen
|
|
Mapping the landscape of file sharing strategies (Jiransoft)
|
|
Point-of-Sale (POS) Malware: The Good, Bad, Ugly and Worse
|
|
Hackers Hiring Hackers—How to Do Things Better
|
|
CISO Impact: Lighting the Path to Leadership
|
|
Cyberrisk Diligence in M&A and Investing: Negotiating a Better Deal
|
|
Confronting Cybercrime: Exploring the Legal and Investigative Challenges
|
U.S. Department of Justice
|
This Doesn’t End Well: The TLD Explosion
|
Blue Coat
|
Intelligence-Led Security: Confronting the Ever-Evolving Threat Landscape
|
Atlantic Council
|
When Worlds Collide: IoT Meets ICS
|
Larry Pesce
,
InGuardians
|
The State of Modern Password Cracking
|
NTT Com Security
|
Global Cybersecurity Laws, Regulations and Liability
|
|
Bringing Cybersecurity to the Boardroom
|
Microsoft Corporation
|
How Not to Be Hacked—Take the Advantage
|
Honeywell
|
Law and Ethics in the Cyborg Age
|
|
Security Thunderdome Debate! Tough Topics Edition
|
Robert Graham
|
Quantum Technologies and Real-World Information Security Challenges
|
|
2016 is Calling; Your Digital Identity Has Some Growing Up to Do (VASCO Data Security)
|
|
The Air Up There: Wireless Beyond Wi-Fi, IoT from DC to 10GHz
|
Balint Seeber
,
Bastille
|
Collision Investigator: Aftermath of the Auto Hacks
|
|
Is Rome Burning While Nero Fiddles?
|
Booz Allen Hamilton
|
Message Authentication Code and PRF-Security
|
|
SHA-1 Anyone? Let's Hash It Out...
|
Data Protection Engineering, Fidelity Technology Group
|
National Cybersecurity for Transport Networks (NCTNs)
|
Department of Homeland Security
|
Digital Signatures with New Functionality
|
|
Threat Modeling for Risk-based Application Security Design
|
The World Bank Group
|
Securing Today’s Online Kids (Focus-On)
|
SANS Institute
|
Privacy Risk and Control Design: NIST’s Framework for Managing Privacy Risk
|
|
How Poorly Managed Keys and Certificates Impact the Trust Model
|
|
Privacy Regulatory Landscape Past, Present and Future
|
|
Roles of Industry and Government in Cyber-Incident Responses
|
Federal Bureau of Investigation
|
VMware: The Future State of Security Starts with Virtualization
|
Security Products, VMware
|
Cyber-Situational Awareness in ICS/SCADA Networks
|
|
Breach Fixation. How Breaches Distort Reality and How Should We Respond?
|
|
SaaS Attacks Happen: How Cloud Scale Changes the Security Game
|
Microsoft Corporation
|
Get a Seat at the Table: Effectively Communicate Risks to the Board
|
|
SANS: Social Engineering for Pen Testers
|
SANS Institute
|
Laboratories of Democracy: States Developing Innovative Cyber-Policies
|
|
Effective (or Ineffective...) Methods of Managing Third-Party Risk
|
|
Successful Managed Security Services Relationships: From Dating to Divorce
|
|
Lessons Learned from Real-World CISOs
|
|
The Gamification of Data Loss Prevention
|
|
Battling Daily Cyberattacks—A Day in the Life of Orange Israel’s CISO
|
|
End Island Hopping Hackers’ Vacation in Your Information Supply Chain
|
Trend Micro, Inc.
|
From Pigtails, to Prom, to a Cyber-Career: What about Your Daughter?
|
Brainbabe
|
Board Room Rodeo: How to Align the C-Suite and Make Better Security Decisions
|
Microsoft Corporation
|
How to Prepare for Cybersecurity in 2020: A Panel Discussion
|
Center for Strategic and International Studies
|
Learning from Unicorns While Living with Legacy
|
Slack
|
Next Generation Security – Software Defined Secure Networks (Juniper Networks)
|
|
Realities of Data Security
|
|
Place Your Bets on Tokenization to Improve Cybersecurity
|
|
Top 10 Things to Be Fixed at ICS Installations
|
|
Turning the Tables: Radical New Approaches to Security Analytics
|
Hewlett Packard Enterprise
|
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
|
|
They’re People—Not Data! The Human Side of Insider Cyberthreats (Focus-On)
|
|
Measuring What Matters
|
|
From Ukraine to Pacemakers! The Real-World Consequences of Logical Attacks
|
|
RSAC Security Scholar Poster Board Session
|
|
The Mobile Identity Revolution (TeleSign Corporation)
|
|
On the Ground with Bullets Flying By—Tales from the First Security Hire
|
|
10 Easy Steps to Building a Successful Extended Security Team
|
Cisco Systems
|
Malware as a Service: Kill the Supply Chain
|
|
Excellence in the Field of Mathematics
|
|
Understanding the Attack Surface and Attack Resilience of EdgeHTML
|
Mark Vincent Yason
|
Can Government Encryption Backdoors and Privacy Co-Exist? Is It an Oxymoron?
|
|
Tactical Survival Tips Building and Leveraging IoT Technologies
|
|
How Do You Protect Data and Staff during High-Risk Business Travel?
|
Booz Allen Hamilton
|
Exploring the Security of IoT: Trust Comes First (Gemalto)
|
|
Flaming Toasters to Crashing Cars—The Internet of Things and Mass Liability
|
Twitter
|
Mobile CA State of the Union
|
Jeff Forristal
,
Bluebox Security
|
Discussion with Sean Penn
|
|
Finding Triggered Malice in Android Apps
|
Christopher Kruegel
,
Lastline, Inc.
|
Five Infosec Lessons from the Great Generals of the Ancient World
|
ZeroFOX
|
A Roundtable with Three Cyber-Wisemen
|
|
DevOps Connect: Rugged DevOps
|
Kim Zetter
|
How the USG’s Rule for Intrusion Software Will Kill Global Cybersecurity
|
|
Critical Infrastructure Fails: Are We Doomed?
|
Synack
|
Uploading Fear: Terrorists’ Use of Social Media and the Internet
|
|
Are You Worthy? The Laws of Privileged Account Management
|
|
Providing First-Rate Security Services with Analytics-Driven Security
|
|
Architecting for Security in the Age of Agile Development
|
Hewlett Packard Enterprise
|
Understanding the Security Vendor Landscape Using the Cyber Defense Matrix (Focus-On)
|
Bank of America
|
The Incident Response Playbook for Android and iOS
|
NowSecure
|
Privacy, Selfie Sticks and Umpires: Things That Shouldn't Exist, But Do
|
Salesforce
|
IAPP: Privacy and Security: Working Better Together
|
|
Your SecOps Don’t Catch Bad Guys and Waste Your Money. We Know Why!
|
|
Enterprise Security Concerns for Consumer IoT Devices
|
Andrew Hay
|
Security of Public Key Encryption
|
|
Structure-Preserving Signatures
|
|
Our Brave New Connected World: Is It Already Too Late?
|
Synack
|
Securing Today’s Online Kids
|
SANS Institute
|
How Infosec Maturity Models Are Missing the Point (Focus-On)
|
|
Secrets of Building the Ultimate Security RFP
|
|
How to Measure Anything in Cybersecurity Risk
|
|
How to Get into ICS Security
|
Chris Sistrunk
,
FireEye, Inc.
|
Performing Advanced Incident Response—Interactive Exercise
|
iSIGHT Partners
|
Counterterrorism—The People Factor
|
|
Habits of an Effective CISO
|
|
(ISC)² CCSP Two-day Crash Course
|
|
Encryption and Information Sovereignty: Destroying the Internet to Save It?
|
|
Application and Threat Intelligence: Driving Security Offense and Defense
|
|
Data Science Transforming Security Operations (Focus-On)
|
|
Barbie vs. the ATM Lock: Which Is the High-Security IoT Device?
|
Somerset Recon
|
Understanding the “Why” in Enterprise Application Security Strategy
|
|
Teaching Our Kids the Real Hacking Sklllz
|
|
Got Cyber? Keep Calm and Carry On at Network Speed
|
|
Building an Android Scale Incident Response Process
|
Adrian Ludwig
,
Google Inc.
,
Android Security
|
Transforming Security: Containers, Virtualization and Softwarization
|
VMware
|
Top 10 Security Hardening Settings for Windows Servers and Active Directory
|
|
Cloud Security Accountability Tour
|
Rich Mogull
|
How Do You Build Your Human Firewall? Accountability or Awareness?
|
|
Hacking Exposed: The Mac Attack
|
George Kurtz
,
CrowdStrike, Inc.
|
Braking the Connected Car: The Future of Vehicle Vulnerabilities
|
|
Preserving the Privilege during Breach Response
|
|
Rock the CASB-ah— Advanced Use Cases from Pioneers of Cloud Security
|
General Electric
|
Secure Key Exchange Schemes
|
|
Enabling your progression through the Security Maturity Model (VSS Monitoring)
|
|
2016 State of Vulnerability Exploits
|
|
The Dark Web and Cyberespionage: Fact, Fiction and Future
|
|
Innovation in Network Security
|
|
Ghosts in the Shadows
|
|
Partnerships with a CFO: On the Front Line of Cybersecurity
|
|
How to Prepare for Cybersecurity in 2020: A Panel Discussion (Focus-On)
|
Center for Strategic and International Studies
|
The Evolution of Our Industry: 25 Years of RSA Conference Session Titles
|
Wendy Nather
,
Duo Security
|
Louder Than Words
|
McAfee
|
Hacking IoT: Why Security in IoT is Failing (and how to fix it!)
|
Independent Security Evaluators
|
Application, Network and Infrastructure Vulnerability Management
|
|
Adjusting Your Security Controls: It’s the New Normal
|
|
Trends in Social Engineering: How to Detect and Quantify Persuasion
|
Markus Jakobsson
,
ZapFraud
|
Dyre Times: Into the Mind of a RAT Operator
|
|
Sophisticated Attacks vs. Advanced Persistent Security
|
|
Security Program Development for the Hipster Company
|
|
Here, There and Everywhere: How to Harness Your Value Chain Security Beast!
|
|
Tracking Hackers on Your Network with Sysinternals Sysmon
|
|
Let’s Play Doctor: Practical OS X Malware Detection and Analysis
|
Patrick Wardle
,
Digita Security
|
CISO Success Strategies: On Becoming a Security Business Leader
|
Instructor
,
SANS Institute
|
Web Security Smackdown: Put Your Offensive Skills to the Test
|
Security Innovation
|
CROWDPATCHING—It’s Time to Take Vulnerability Fixing in Our Own Hands
|
Mitja Kolsek
,
ACROS Security
|
SANS: Introduction to Malware Analysis: Hands-on and Technical
|
Instructor
|
How to Deliver Security in a Cloud Generation World
|
|
Giving the Bubble Boy an Immune System so He Can Play Outside
|
Kevin Mahaffey
,
Lookout
|
The Shadowy Cyberattack—State Sponsors of Terror and Cyberterrorists
|
Tanium
|
Threat Actor Pivoting and the Underground Market for Your Data (Dell Security)
|
|
Hot Topics in Privacy: A Conversation with Adobe, Google and Microsoft
|
|
Do We Need Cyber-Ratings for the Auto Industry?
|
Karl Koscher
,
UC San Diego
|
…But Now I See—A Vulnerability Disclosure Maturity Model (Focus-On)
|
Katie Moussouris
,
Luta Security, Inc.
|
Don’t Let Docker Containers Set Sail Unprotected (Vormetric, Inc.)
|
|
Bridging the Great Minority Cyber-Divide—Social and Cultural Dynamics
|
|
Trust in the Cloud in Tumultuous Times
|
Microsoft Corporation
|
Artificial Intelligence for Infosec: Actively Learning to Mimic an Analyst
|
MIT
|
Current State of Privilege Escalation on Android
|
NowSecure
|
Looking through an Attacker’s Eye—Picture to Compromise in 30 Seconds
|
|
Cryptoparty: An Introduction to Secure, Usable Encryption Tools for All
|
|
Docker: Containing the Security Excitement (Focus-On)
|
David Mortman
|
Make IR Effective with Risk Evaluation and Reporting
|
|
(ISC)² Foundation Safe & Secure Online Program Volunteer Orientation
|
|
Network protection for mobile users (Citrix)
|
|
Linguistic Passphrase Cracking
|
|
What’s a Trusted Technology Provider and How Do I Know One When I See One?
|
MITRE Corporation
|
Machine Learning and the Cloud: Disrupting Threat Detection and Prevention
|
|
Techniques for Security Scalability
|
Peleus Uhley
|
State of Cybersecurity: 2016 Findings and Implications
|
|
The CISO Imperative – Taking Control of Cyberattacks on SAP (Onapsis)
|
|
Local Malware for Local People—The Regionalization of Malware
|
Sophos
|
Android Serialization Vulnerabilities Revisited
|
Roee Hay
|
Security Recipes for the New Digital Era
|
|
The Sleeper Awakes
|
|
Opening
|
|
ISSA Member Reception
|
|
Cybersecurity Education and Workforce Development for the Nation
|
|
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware (Focus-On)
|
|
Assessing Privacy before Monitoring What Your Employees Do with Your Data
|
|
Securing Your Suppliers within NIST Cybersecurity Framework
|
Instructor
|
Industrial Defence In-Depth
|
Kaspersky Lab
|
Security Advantages of Software-Defined Networking
|
|
DevSecOps in Baby Steps
|
|
The $100 Million Question: Were Reasonable Cybersecurity Measures Taken?
|
William Rogers
|
Cloud Breach – Preparation and Response
|
Splunk
|
Cloud Attacks Illustrated: Insights from the Cloud Provider (Focus-On)
|
Tomer Teller
|
Peek into the Future: The Security Operations Center of 2020
|
Symantec
|
Security of Public Cloud Services: It Takes a Village
|
Nettitude
|
Non-Profits on the Loose @ RSA Conference 2016
|
|
The Three Principles of Effective Advanced Threat Detection
|
RSA
|
Responses to State-Sponsored Economic Espionage
|
|
Breaking Closed Systems with Code-Signing and Mitigation Techniques
|
|
Where You Are Is Who You Are: Legal Trends in Geolocation Privacy & Security
|
|
A Conversation on Collaboration Between Silicon Valley and the Department of Defense
|
|
Establishing Trust in a Digital World (HID Global)
|
|
Remarks by Admiral Michael S. Rogers, U.S. Navy, Commander, U.S. Cyber Command, Director, National Security Agency/Chief, Central Security Service
|
National Security Agency
|
How to Analyze an Android Bot
|
Nokia
|
The Virtual Patching of Zero-Day Vulnerabilities
|
Trend Micro, Inc.
|
Eviscerating Cyber Threats through Global Shared Intelligence (ThreatMetrix)
|
|
NOC and SOC through a Single Pane of Glass (AccelOps)
|
|
ICS Sec for n00bz: an Intro to ICS Defense by Defending the Death Star
|
|
A New, Radically Innovative US-CCU Cybersecurity Checklist
|
|
Using Behavioral Psychology and Science of Habit to Change User Behavior
|
|
What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016
|
|
Robot Cars, Risk and Ethics: Lessons for Artificial Intelligence
|
|
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
|
SANS Institute
|
Managing Complex M&A Security Risks - A Detailed Case Study (Focus-On)
|
Microsoft Corporation
|
Managing Complex M&A Security Risks—A Detailed Case Study
|
Microsoft Corporation
|
Defending a Cloud Application
|
NetSuite
|
Let’s Play Doctor: Practical OS X Malware Detection and Analysis (Focus-On)
|
Patrick Wardle
,
Digita Security
|
Securing the “Weakest Link”
|
Adam Shostack
|
Security as a Service in a Financial Institution: Reality or Chimera?
|
|
Hardware Attacks and Security
|
Graz University of Technology
|
Aspirin as a Service: Using the Cloud to Cure Security Headaches
|
Rich Mogull
|
ENCORE When Good Devices Go Bad: Live Hacking in the IoT Sandbox
|
|
Deconstructing Identity in Security
|
Microsoft Corporation
|
ForeScout: Gain Real-Time Visibility & Control of Unmanaged Endpoints/BYOD (Forescout Technologies)
|
|
Is Automation the Answer for Security in the Digital World?
|
|
…But Now I See—A Vulnerability Disclosure Maturity Model
|
Katie Moussouris
,
Luta Security, Inc.
|
Privacy Primer for Security Officers
|
|
Hacker Marketing Strategy: How Cybercriminals Promote for Press and Profit
|
Jennifer Leggio
|
Security Analytics: Gaining an Information Advantage Over Cyber Adversaries (SAS)
|
|
Five mobile security challenges facing the enterprise (NowSecure)
|
|
Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
|
SANS Institute
|
Investment in Privacy Brings Security Results
|
|
The Future of Privacy
|
|
NextWar: The Future of Technology and Geopolitics
|
New America Foundation
|
Security Tenets for Life Critical Embedded Systems
|
|
The Disconnect between Builders and Buyers: A VC’s Perspective
|
|
Securing Large-Scale Socio-Technical Systems
|
Bruce Schneier
,
IBM Security
|
Combating Spoofed GPS in Forensics
|
Core Security
|
A New Security Paradigm for IoT (Internet of Threats)
|
|
Security Startups: The CISO’s Guide to Flying High without Getting Burned
|
|
Understanding Malware Provenance: A Federal View
|
|
Cybersecurity—The View from Washington with Jim Lewis and Stewart Baker
|
Steptoe & Johnson LLP
|
Successful Security Practitioners: How We Evolve and Where Is the Workforce
|
|
Using Cloud-Scale Intelligence to Address Security Challenges
|
Microsoft Corporation
|
More Books You Should Have Read By Now: The Cybersecurity Canon Project
|
Palo Alto Networks
|
Converging IT and OT for Secure, Reliable, Resilient Industrial Networks
|
|
Cyber-Insurance as an Integral Part of Your Cyberrisk Management Strategy
|
RSA
|
The Shift to a 24/7 Security Landscape: Why Cloud Security Is the Answer
|
|
Next Generation Networking Hardware Solutions (Lanner Inc.)
|
|
Hacks Happen
|
SANS Institute
|
Using Large Scale Data to Provide Attacker Attribution for Unknown IoCs
|
Dhia Mahjoub
,
OpenDNS
|
2016 State of the Phish Results (Wombat Security)
|
|
Confronting Cybercrime: Exploring the Legal and Investigative Challenges (Focus-On)
|
U.S. Department of Justice
|
Designing Virtual Network Security Architectures
|
SANS Institute
|
Lattice Cryptography
|
|
So You Want to Run Your Own Security Business?
|
|
Privacy Perspectives: How It’s Lost and the Implications
|
Purdue University
|
Developing a Cyberstrategy: Prepare Your Company before Zero Day Strikes
|
|
Intelligent Application Security
|
Julian Cohen
|
Using Deception and Forensics to Detect Threats from Within
|
|
OpenSSL after HeartBleed
|
|
The Pivot
|
Microsoft Corporation
|
Security Tools: An Attacker’s Dream Come True
|
enSilo Inc
|
People-Centric Security: Transform Culture, Reduce Risk, Drive Success
|
Elevate Security
|
Any Bugs in That Pacemaker? Effective Medical Device Security Testing
|
|
The Little Flashlight App That Could (Exploiting Mobile Banking Apps)
|
|
Does the Risk of Criminal Activity Justify a Ban of Strong Encryption?
|
Klaus Schmeh
|
It’s Not Dead Yet—Email Security Matters
|
|
Secure Multiparty Computation
|
University of California, Irvine
|
DevOps Throw Down with Chris, Gary, Caleb and Shannon
|
|
Mobile Threats, the Force Awakens! (Mobile Iron)
|
|
Privacy, Selfie Sticks and Umpires: Things That Shouldn’t Exist, But Do (Focus-On)
|
Salesforce
|
The DDoS Consideration for SDN Deployments
|
|
Executive Women's Forum Meet & Greet
|
|
How Do You Detect Attacks?
|
Accenture
|
IOCs Are Dead—Long Live IOCs!
|
Ryan Kazanciyan
,
Tanium
|
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
|
|
Estimating Development Security Maturity in About an Hour
|
|
The Digital Transformation of Identity (ForgeRock)
|
|
Building a World-Class Proactive Integrated Security and Network Ops Center
|
|
SANS NetWars
|
Instructor
|
SANS: Critical Security Controls: Planning, Implementing and Auditing
|
Enclave Security
|
Breaking In Is Easy—Breaking Bad Habits Is HARD!
|
Pwnie Express
|
Take It to the Cloud: The Evolution of Security Architecture
|
Fastly
|
Integrating Retail Cybersecurity, Loss Prevention, Risk, Fraud and Privacy
|
Cybersecurity
|
Serial Killer: Silently Pwning Your Java Endpoints
|
Christian Schneider
,
Freelancer
|
Security Monitoring in the Real World with Petabytes of Data
|
|
Random Numbers—The Key to Security
|
|
Debunking “SOC Teams vs. Vendor” Myths in Cyber-Firefights
|
|
The Evolving Landscape of Cybersecurity: Threats, Opportunities, and Partnerships in a Changing World
|
|
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
|
|
Privacy and Cyberthreat Sharing: Bridging the Divide
|
|
Identity-Centric Security: Enjoying Digital Business Transformation While Successfully Managing Risk (CA Technologies)
|
|
Getting Scammed: A Security CEO’s Firsthand Encounter
|
Centrify Corporation
|
Cybersecurity Insurance: The Catalyst We’ve Been Waiting For
|
|
How do you spot the insider threat? (Varonis Systems, Inc.)
|
|
Beyond Encryption: Why We Can't Come Together on Security and Privacy—and the Catastrophes That Await If We Don’t
|
|
Automobiles are Getting Hacked: What’s Next for Transportation Security?
|
|
Hacking Exposed LIVE: Attacking in the Shadows
|
Cylance
|
When Good Devices Go Bad: Live Hacking in the IoT Sandbox
|
|
DevSecOps—The Tao of Security Science
|
|
Avoid Epic Fails: Elements of Successful Breach Notification and Response
|
|
Grow Up: A Maturity Model and Roadmap for Vulnerability Management (Core Security)
|
|
Understanding the “Why” in Enterprise Application Security Strategy (Focus-On)
|
|
How Infosec Maturity Models Are Missing the Point
|
|
Why Won't Anyone Listen to Us?
|
|
What Is the Right Approach for Critical Infrastructure Protection?
|
|
Diffusing the IoT Time Bomb—Security and Privacy Trust Code of Conduct
|
|
FCC’s Cybersecurity Risk Reduction Initiatives and Activities
|
|
Embedded Systems Security: Building a More Secure Device
|
|
Risks, Harms and Rewards of Our and Our Kids’ Online Lives
|
|
CForum: A Community Approach for Improving Cybersecurity Programs
|
|
Agile Security—Field of Dreams
|
|
Smart Megalopolises. How Safe and Reliable Is Your Data?
|
Kaspersky Lab
|
Myth Busting the Security Landscape and Development Cycle
|
|
Our Road Ahead: Today’s Tech Developments, Tomorrow’s Security Challenges
|
|
Advancing Information Risk Practices Seminar
|
|
Encryption without Enterprise Key Management—It’s Like Icing without Cake
|
|
The Cryptographers' Panel
|
|
300+ Cities, Millennials and a Mobile Workforce: A Security Gauntlet
|
Snap Inc.
|
Authenticated Encryption
|
|
Innovation Sandbox - "Most Innovative Startup" Live
|
|
Bots—Fast Growing Bane of the Web: Crawlers, Scrapers and Account Checkers
|
Akamai Technologies
|
Building Security Data Science Capability
|
GE Digital
|
CSA Summit 2016: Cloudifying Information Security
|
|