Star 0

Talks

Title Humans
End Island Hopping Hackers’ Vacation in Your Information Supply Chain (Focus-On) Trend Micro, Inc.
Excellence in Information Security & Excellence in the Field of Public Policy
Bro, Do You Even Cybercrime? Key 2016 Trends SANS Institute
Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil Alexander Polyakov , ERPScan
Bridging Cybercrime and Cybersecurity—How Law Enforcement Battles Cyberthreats
Disrupting Adversarial Success—Giving the Bad Guys No Sleep McAfee
The Newest Element of Risk Metrics: Social Media Ian Amit , ZeroFOX
Identity Standards at Work in Google’s Mobile-Focused Future Microsoft Corporation
Threat Intelligence: From an Unknown Discipline to Cyber-Buzzword (WEBROOT)
How to Operationalize Cyber Risk Intelligence (RiskVision (Formerly Agiliance))
Dissecting Derusbi
Applying Auto-Data Classification Techniques for Large Data Sets
The Great Questions of Tomorrow
Dissecting Bitcoin Security
Effectively Measuring Cybersecurity Improvement: A CSF Use Case
Global Assurance Report Card Survey: Raising Your Security Confidence Score (Tenable Network Security)
Five Ways to Drive Revenue by Protecting Customer Privacy
Protect Your King: The Key to Maintaining Control of Your Business (Cyberark Software, Inc.)
Codifying the Brain: Automation, Alerts and a Human Resource Answer FireEye, Inc.
CyberSmart Parents Education Workshop
Hacking Inward—Implementing Effective Cyber “War Games” SafeBreach
DON'T Use Two-Factor Authentication...Unless You Need It!
Embracing and Extending Kids’ Curiosity to Inspire Future Professionals ISECOM
Introducing a Security Program to Large Scale Legacy Products
Pressure Is Building around Cyber-Related Liability: NYSE Board-Level Research (Veracode)
The Future of Bitcoin and Cryptocurrencies Stanford University
The Art of Hacking a Human
The Rise of the Purple Team William Bengtson
What has Your Threat Intelligence Done for you Lately? (Rapid7)
How to Verify Procedures
The Aftermath of a Breach: Best Practices for Working with Law Enforcement
Compliance as a Hammer: Aligning with FedRAMP Akamai Technologies
Dave Isay on the History of StoryCorps and the Power of Storytelling
They’re People—Not Data! The Human Side of Insider Cyberthreats
Transforming Your Security Culture: From Awareness to Practice to Maturity SANS Institute
Live Cyber-Exercise: Responding to National Crisis Jason Healey
Safeguarding the Digital Frontier: Balancing “Security” and “Security” House Homeland Security Committee
People Make the Best Exploits (Proofpoint)
Sensitive Data Management Maturity - The DLP Missing Link (Identity Finder )
Bridging the Gap between Threat Intelligence and Risk Management
Product Security at Internet Scale Lookout
The Impact of Security Megatrends on Your Infosec Program Booz Allen Hamilton
A New, Radically Innovative US-CCU Cybersecurity Checklist (Focus-On)
When Attackers Want Your IP: Valuing and Guarding Prized Business Assets Deloitte
Cyberwar Games: Enhancing Board of Directors Cybersecurity Oversight
Doing Something Smart with All the Smart Things RSA Labs
Customer Centric Security and Architecture—a CISO/CTO Study
Data Science Transforming Security Operations
Financial Sector and the Evolving Threat Landscape: Live Cyber-Exercise Sarah Brown , Fox-IT
One Team, One Fight Federal Bureau of Investigation
Real-World Examples of Positive Security ROI SANS Institute
Dreaming of IoCs: Adding Time Context to Threat Intelligence Travis Smith , Tripwire
From SOC to Cybersecurity Center
Side-Channel Attacks on Elliptic Curve Cryptography
Not So Fast…Myths and Misunderstanding Surrounding Reactive Strikes CrowdStrike, Inc.
Lifetime Achievement Award
Bring Your Own Internet of Things (BYO-IoT) Jake Kouns , Risk Based Security
Witness the Russian Attack: Live Demos of Their Steps, Tools, Techniques Wayne Huang
Saying Goodbye: Managing Security for Departing Personnel Morrison Consulting
How Anomaly Detection via the Cloud Can Close Your Security Gap (iboss Cybersecurity)
Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards
Detecting Stealthy Web Application Vulnerabilities Automatically (Acunetix)
Docker: Containing the Security Excitement David Mortman
Using Cybersecurity Career Lifecycle to Get In and Stay in the Profession
Data Breach Litigation: How to Avoid It and Be Better Prepared for Defense
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
What Is Next-Generation Endpoint Security and Why Do You Need It?
Ghosts in the Network: SS7 and RF Vulnerabilities in Cellular Networks Project Overwatch
Catching APT X with Expertise and Intelligence-Based Technologies (Kaspersky Lab)
The Secrets of Malware Success on Google Play Store Sophos
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Offense & Defense: Defense in Depth, Social Engineering and Historical Lessons Layered Insight
The Art of Avoiding Authentication: How Criminals Are Hacking Apple Pay Vijay Balasubramaniyan , Pindrop
Ascending the Path to Better Security
Data Breach Digest – Scenarios from the Field (Verizon)
Cloud Security Essentials 2.0 DevSecOps, Intuit
Hacking a Professional Drone Nils Rodday
Applying Top Secret and Military Network Grade Security in the Real World Dor Knafo
Detection, Prevention and Response Strategy: The Return of the Endpoint
Thinking Digital Enablement, Think Protection, Think Process Re-engineering
Power Broker’s lesson for security professionals (Arbor Networks)
Hacking Critical Infrastructure Like You’re Not a N00b Jason Larsen , IOActive, Inc.
Automation and Virtualization Simplify Life: Can They Simplify Security?
Turning the Tide: Driving Software Security in the Enterprise
The Ultimate Reason Why Hackers Are Winning the Mobile Malware Battle Yair Amit , Modern OS, Symantec
The Cybersecurity Risk Information Sharing Program: Bi-Directional Trust Michael Smith
AppSec Awareness: A Blueprint for Security Culture Change
Leveraging Analytics for Data Protection Decisions David Mortman
IoT Breaks All the Rules: How Should Developers and Organizations React? Booz Allen Hamilton
Data Classification—Reclaiming Infosec’s Redheaded Stepchild
Demystifying Security Analytics: Data, Methods, Use Cases
(ISC)² CISSP Two-day Crash Course Battelle Memorial Institute
Separating Fact From Fiction: The Real Risks Within Medical Device
Super CISO 2020
Intro to Car Hacking Chris Valasek , Uber ATC
Opportunities and Challenges to Securing the Internet of Things
Assessing Risk: CSOs and Cyber-Insurance Raytheon Foreground Security
Security Investigative Journalists Speak Out—More Breaches, More Problems The New York Times
TLS Certificates on the Web—The Good, the Bad and the Ugly
Autonomous Hacking: The New Frontiers of Attack and Defense Giovanni Vigna , Lastline, Inc.
Domain Knowledge: How to Factor DNS into Your Privacy and Security Strategy
Building an Effective Supply Chain Security Program SANS Institute
The Measure of Success: Security Metrics to Tell Your Story PwC
Open-Source Poisoning: Can We Trust the Diverse Open-Source Ecosystem (Trustwave)
Unveiling Security Gaps in ICS Networks: A Myth-Busting Session
Makers vs. Breakers: On Exploit Development and Software Engineering Robert Graham
A Fitness Test for Fostering Women Leaders in IT Security The Executive Women's Forum
Active Defense: Defining the Policy, Technology and Legal Landscape Steptoe & Johnson LLP
Data-Driven App Sec
Criminals don’t wear orange jumpsuits in public (Zscaler)
Proactive Measures to Mitigate Insider Threat
It’s Personal: Attacks on the Individual Independent Security Evaluators
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Information Security Leadership Development: Surviving as a Security Leader Cylance
2016: The Changing Face of Cyber in the Federal Space
Xtreme RFP: Help Design a Live Vendor Review Session for RSAC 2017!
The 90-Day Information Security Strategy
Should I Stay or Should I Go? How to Attract/Retain Women in the Industry Optiv
Wake Up Call: Do Industry Analysts Actually Stifle Security Innovation?
How to Build or Buy an Integrated Security Stack
TCG: Securing the IoT with Trusted Computing Tony Sager
How to Explain Cybersecurity to the Board Using a Simple Metaphor: FIRE
Nothing Lasts Forever—Trust Has an Expiration Date Matthew Bryant
Vendor Security Practices: Turn the Rocks Over Early and Often
Introduction and a Look at Security Trends
Securing Automobility: Cyborgs and the Social Network of Things
Integrating Cybersecurity into Supply Chain Risk Management
CyBEER Ops
Industrial Cyberthreats: The Kaspersky Lab View Kaspersky Lab
Got Coverage? Cyber-Insurance Realities Revealed
Alerts for Digital Identity System Operation and Fraud Detection
The State of End-User Security—Global Data from 30,000+ Websites
Demystifying a Malware Attack
The (Inevitable?) Decline of the Digital Age… Palo Alto Networks
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
Hot Topics in Technology Law
Cancelled - Aligning and Prioritizing Risk Efforts across the Enterprise
Cryptoparty: tuTORial—Learn How to Use TOR to Be Anonymous Online
How to Steer Cybersecurity with Only One KPI: The Cyberrisk Resilience
Evolving Security Operations: The Future of Orchestration Fortinet, Inc.
Protecting Organizations: Emerging Threats and Software Supply Chain Analysis
Cryptanalysis of Symmetric Key Encryption Institute for Infocomm Research
Preventing Cyber-Exposure: You Say Criminal, I Say Intractable
The Data Behind How We Work with Data
Not Lost in Translation: Building an Architecture to Reshape Cybersecurity VMware
A United Front: the Benefits and Challenges of Sharing Threat Intelligence Cloudmark
Attacks on Critical Infrastructure: Insights from the “Big Board” RSA
Cloud Attacks Illustrated: Insights from the Cloud Provider Tomer Teller
How Broken Is Our Crypto Really?
Identity as a Critical Next Step in Security (Entrust Datacard)
One Approach to Rule Them All—Global Privacy and Security
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Advancing Information Security Strategies in Higher Education EDUCAUSE
Threat Modeling the Minecraft Way
My Life as Chief Security Officer at Google Google Inc.
Privacy, Security, IT and the New European General Protection Regulation Cisco Systems
Identity Intelligence and Insights into Insider Threat (Capgemini)
Security Issues in Transportation: Need for Collaboration for Solutions
Bank the Unbanked—With One of the Largest PKIs Ever Built
Threats of Greatest Consequence Heading into 2016
Government in the Crossfire: Data Privacy in an Era of Growing Cyberthreats Electronic Frontier Foundation
Cyber-Alarm 2016: Major Cyber-Breach Exercise
Open-Source Security Management and Vulnerability Impact Assessment
Understanding HTTP/2 Trustwave SpiderLabs
Effectively Measuring Cybersecurity Improvement: A CSF Use Case (Focus-On)
Who Are You? From Meat to Electrons and Back Again
Security Maturity Models: A Dime a Dozen or Priceless?
Understanding the Security Vendor Landscape Using the Cyber Defense Matrix Bank of America
SANS: A Practical Introduction to Cyber Security Risk Management
Rise of the Hacking Machines Konstantinos Karagiannis , BT Americas
Searchable Symmetric Encryption
The Evolution and Impact of the Democratization of Malware & Hacking Tools (Easy Solutions)
Managing Increasing Compliance Obligations across Multiple Industries
Safety Issues in Advanced AI
Hide and Seek: How Threat Actors Respond in the Face of Public Exposure FireEye, Inc.
Exploring the Foundations of Mobile Trust Josh Thomas , Atredis Partners
Guiding Principles to Defending Organizations Palo Alto Networks
Build It In—A Proactive Approach to Securing Applications, Users and Data Hewlett Packard Enterprise
Securing the Industrial Internet of Things: A Deep Dive into the Future
CSI: Cyber Panel: Security Dramas Arrive on the Small Screen
Mapping the landscape of file sharing strategies (Jiransoft)
Point-of-Sale (POS) Malware: The Good, Bad, Ugly and Worse
Hackers Hiring Hackers—How to Do Things Better
CISO Impact: Lighting the Path to Leadership
Cyberrisk Diligence in M&A and Investing: Negotiating a Better Deal
Confronting Cybercrime: Exploring the Legal and Investigative Challenges U.S. Department of Justice
This Doesn’t End Well: The TLD Explosion Blue Coat
Intelligence-Led Security: Confronting the Ever-Evolving Threat Landscape Atlantic Council
When Worlds Collide: IoT Meets ICS Larry Pesce , InGuardians
The State of Modern Password Cracking NTT Com Security
Global Cybersecurity Laws, Regulations and Liability
Bringing Cybersecurity to the Boardroom Microsoft Corporation
How Not to Be Hacked—Take the Advantage Honeywell
Law and Ethics in the Cyborg Age
Security Thunderdome Debate! Tough Topics Edition Robert Graham
Quantum Technologies and Real-World Information Security Challenges
2016 is Calling; Your Digital Identity Has Some Growing Up to Do (VASCO Data Security)
The Air Up There: Wireless Beyond Wi-Fi, IoT from DC to 10GHz Balint Seeber , Bastille
Collision Investigator: Aftermath of the Auto Hacks
Is Rome Burning While Nero Fiddles? Booz Allen Hamilton
Message Authentication Code and PRF-Security
SHA-1 Anyone? Let's Hash It Out... Data Protection Engineering, Fidelity Technology Group
National Cybersecurity for Transport Networks (NCTNs) Department of Homeland Security
Digital Signatures with New Functionality
Threat Modeling for Risk-based Application Security Design The World Bank Group
Securing Today’s Online Kids (Focus-On) SANS Institute
Privacy Risk and Control Design: NIST’s Framework for Managing Privacy Risk
How Poorly Managed Keys and Certificates Impact the Trust Model
Privacy Regulatory Landscape Past, Present and Future
Roles of Industry and Government in Cyber-Incident Responses Federal Bureau of Investigation
VMware: The Future State of Security Starts with Virtualization Security Products, VMware
Cyber-Situational Awareness in ICS/SCADA Networks
Breach Fixation. How Breaches Distort Reality and How Should We Respond?
SaaS Attacks Happen: How Cloud Scale Changes the Security Game Microsoft Corporation
Get a Seat at the Table: Effectively Communicate Risks to the Board
SANS: Social Engineering for Pen Testers SANS Institute
Laboratories of Democracy: States Developing Innovative Cyber-Policies
Effective (or Ineffective...) Methods of Managing Third-Party Risk
Successful Managed Security Services Relationships: From Dating to Divorce
Lessons Learned from Real-World CISOs
The Gamification of Data Loss Prevention
Battling Daily Cyberattacks—A Day in the Life of Orange Israel’s CISO
End Island Hopping Hackers’ Vacation in Your Information Supply Chain Trend Micro, Inc.
From Pigtails, to Prom, to a Cyber-Career: What about Your Daughter? Brainbabe
Board Room Rodeo: How to Align the C-Suite and Make Better Security Decisions Microsoft Corporation
How to Prepare for Cybersecurity in 2020: A Panel Discussion Center for Strategic and International Studies
Learning from Unicorns While Living with Legacy Slack
Next Generation Security – Software Defined Secure Networks (Juniper Networks)
Realities of Data Security
Place Your Bets on Tokenization to Improve Cybersecurity
Top 10 Things to Be Fixed at ICS Installations
Turning the Tables: Radical New Approaches to Security Analytics Hewlett Packard Enterprise
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
They’re People—Not Data! The Human Side of Insider Cyberthreats (Focus-On)
Measuring What Matters
From Ukraine to Pacemakers! The Real-World Consequences of Logical Attacks
RSAC Security Scholar Poster Board Session
The Mobile Identity Revolution (TeleSign Corporation)
On the Ground with Bullets Flying By—Tales from the First Security Hire
10 Easy Steps to Building a Successful Extended Security Team Cisco Systems
Malware as a Service: Kill the Supply Chain
Excellence in the Field of Mathematics
Understanding the Attack Surface and Attack Resilience of EdgeHTML Mark Vincent Yason
Can Government Encryption Backdoors and Privacy Co-Exist? Is It an Oxymoron?
Tactical Survival Tips Building and Leveraging IoT Technologies
How Do You Protect Data and Staff during High-Risk Business Travel? Booz Allen Hamilton
Exploring the Security of IoT: Trust Comes First (Gemalto)
Flaming Toasters to Crashing Cars—The Internet of Things and Mass Liability Twitter
Mobile CA State of the Union Jeff Forristal , Bluebox Security
Discussion with Sean Penn
Finding Triggered Malice in Android Apps Christopher Kruegel , Lastline, Inc.
Five Infosec Lessons from the Great Generals of the Ancient World ZeroFOX
A Roundtable with Three Cyber-Wisemen
DevOps Connect: Rugged DevOps Kim Zetter
How the USG’s Rule for Intrusion Software Will Kill Global Cybersecurity
Critical Infrastructure Fails: Are We Doomed? Synack
Uploading Fear: Terrorists’ Use of Social Media and the Internet
Are You Worthy? The Laws of Privileged Account Management
Providing First-Rate Security Services with Analytics-Driven Security
Architecting for Security in the Age of Agile Development Hewlett Packard Enterprise
Understanding the Security Vendor Landscape Using the Cyber Defense Matrix (Focus-On) Bank of America
The Incident Response Playbook for Android and iOS NowSecure
Privacy, Selfie Sticks and Umpires: Things That Shouldn't Exist, But Do Salesforce
IAPP: Privacy and Security: Working Better Together
Your SecOps Don’t Catch Bad Guys and Waste Your Money. We Know Why!
Enterprise Security Concerns for Consumer IoT Devices Andrew Hay
Security of Public Key Encryption
Structure-Preserving Signatures
Our Brave New Connected World: Is It Already Too Late? Synack
Securing Today’s Online Kids SANS Institute
How Infosec Maturity Models Are Missing the Point (Focus-On)
Secrets of Building the Ultimate Security RFP
How to Measure Anything in Cybersecurity Risk
How to Get into ICS Security Chris Sistrunk , FireEye, Inc.
Performing Advanced Incident Response—Interactive Exercise iSIGHT Partners
Counterterrorism—The People Factor
Habits of an Effective CISO
(ISC)² CCSP Two-day Crash Course
Encryption and Information Sovereignty: Destroying the Internet to Save It?
Application and Threat Intelligence: Driving Security Offense and Defense
Data Science Transforming Security Operations (Focus-On)
Barbie vs. the ATM Lock: Which Is the High-Security IoT Device? Somerset Recon
Understanding the “Why” in Enterprise Application Security Strategy
Teaching Our Kids the Real Hacking Sklllz
Got Cyber? Keep Calm and Carry On at Network Speed
Building an Android Scale Incident Response Process Adrian Ludwig , Google Inc. , Android Security
Transforming Security: Containers, Virtualization and Softwarization VMware
Top 10 Security Hardening Settings for Windows Servers and Active Directory
Cloud Security Accountability Tour Rich Mogull
How Do You Build Your Human Firewall? Accountability or Awareness?
Hacking Exposed: The Mac Attack George Kurtz , CrowdStrike, Inc.
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Preserving the Privilege during Breach Response
Rock the CASB-ah— Advanced Use Cases from Pioneers of Cloud Security General Electric
Secure Key Exchange Schemes
Enabling your progression through the Security Maturity Model (VSS Monitoring)
2016 State of Vulnerability Exploits
The Dark Web and Cyberespionage: Fact, Fiction and Future
Innovation in Network Security
Ghosts in the Shadows
Partnerships with a CFO: On the Front Line of Cybersecurity
How to Prepare for Cybersecurity in 2020: A Panel Discussion (Focus-On) Center for Strategic and International Studies
The Evolution of Our Industry: 25 Years of RSA Conference Session Titles Wendy Nather , Duo Security
Louder Than Words McAfee
Hacking IoT: Why Security in IoT is Failing (and how to fix it!) Independent Security Evaluators
Application, Network and Infrastructure Vulnerability Management
Adjusting Your Security Controls: It’s the New Normal
Trends in Social Engineering: How to Detect and Quantify Persuasion Markus Jakobsson , ZapFraud
Dyre Times: Into the Mind of a RAT Operator
Sophisticated Attacks vs. Advanced Persistent Security
Security Program Development for the Hipster Company
Here, There and Everywhere: How to Harness Your Value Chain Security Beast!
Tracking Hackers on Your Network with Sysinternals Sysmon
Let’s Play Doctor: Practical OS X Malware Detection and Analysis Patrick Wardle , Digita Security
CISO Success Strategies: On Becoming a Security Business Leader Instructor , SANS Institute
Web Security Smackdown: Put Your Offensive Skills to the Test Security Innovation
CROWDPATCHING—It’s Time to Take Vulnerability Fixing in Our Own Hands Mitja Kolsek , ACROS Security
SANS: Introduction to Malware Analysis: Hands-on and Technical Instructor
How to Deliver Security in a Cloud Generation World
Giving the Bubble Boy an Immune System so He Can Play Outside Kevin Mahaffey , Lookout
The Shadowy Cyberattack—State Sponsors of Terror and Cyberterrorists Tanium
Threat Actor Pivoting and the Underground Market for Your Data (Dell Security)
Hot Topics in Privacy: A Conversation with Adobe, Google and Microsoft
Do We Need Cyber-Ratings for the Auto Industry? Karl Koscher , UC San Diego
…But Now I See—A Vulnerability Disclosure Maturity Model (Focus-On) Katie Moussouris , Luta Security, Inc.
Don’t Let Docker Containers Set Sail Unprotected (Vormetric, Inc.)
Bridging the Great Minority Cyber-Divide—Social and Cultural Dynamics
Trust in the Cloud in Tumultuous Times Microsoft Corporation
Artificial Intelligence for Infosec: Actively Learning to Mimic an Analyst MIT
Current State of Privilege Escalation on Android NowSecure
Looking through an Attacker’s Eye—Picture to Compromise in 30 Seconds
Cryptoparty: An Introduction to Secure, Usable Encryption Tools for All
Docker: Containing the Security Excitement (Focus-On) David Mortman
Make IR Effective with Risk Evaluation and Reporting
(ISC)² Foundation Safe & Secure Online Program Volunteer Orientation
Network protection for mobile users (Citrix)
Linguistic Passphrase Cracking
What’s a Trusted Technology Provider and How Do I Know One When I See One? MITRE Corporation
Machine Learning and the Cloud: Disrupting Threat Detection and Prevention
Techniques for Security Scalability Peleus Uhley
State of Cybersecurity: 2016 Findings and Implications
The CISO Imperative – Taking Control of Cyberattacks on SAP (Onapsis)
Local Malware for Local People—The Regionalization of Malware Sophos
Android Serialization Vulnerabilities Revisited Roee Hay
Security Recipes for the New Digital Era
The Sleeper Awakes
Opening
ISSA Member Reception
Cybersecurity Education and Workforce Development for the Nation
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware (Focus-On)
Assessing Privacy before Monitoring What Your Employees Do with Your Data
Securing Your Suppliers within NIST Cybersecurity Framework Instructor
Industrial Defence In-Depth Kaspersky Lab
Security Advantages of Software-Defined Networking
DevSecOps in Baby Steps
The $100 Million Question: Were Reasonable Cybersecurity Measures Taken? William Rogers
Cloud Breach – Preparation and Response Splunk
Cloud Attacks Illustrated: Insights from the Cloud Provider (Focus-On) Tomer Teller
Peek into the Future: The Security Operations Center of 2020 Symantec
Security of Public Cloud Services: It Takes a Village Nettitude
Non-Profits on the Loose @ RSA Conference 2016
The Three Principles of Effective Advanced Threat Detection RSA
Responses to State-Sponsored Economic Espionage
Breaking Closed Systems with Code-Signing and Mitigation Techniques
Where You Are Is Who You Are: Legal Trends in Geolocation Privacy & Security
A Conversation on Collaboration Between Silicon Valley and the Department of Defense
Establishing Trust in a Digital World (HID Global)
Remarks by Admiral Michael S. Rogers, U.S. Navy, Commander, U.S. Cyber Command, Director, National Security Agency/Chief, Central Security Service National Security Agency
How to Analyze an Android Bot Nokia
The Virtual Patching of Zero-Day Vulnerabilities Trend Micro, Inc.
Eviscerating Cyber Threats through Global Shared Intelligence (ThreatMetrix)
NOC and SOC through a Single Pane of Glass (AccelOps)
ICS Sec for n00bz: an Intro to ICS Defense by Defending the Death Star
A New, Radically Innovative US-CCU Cybersecurity Checklist
Using Behavioral Psychology and Science of Habit to Change User Behavior
What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016
Robot Cars, Risk and Ethics: Lessons for Artificial Intelligence
The Seven Most Dangerous New Attack Techniques, and What's Coming Next SANS Institute
Managing Complex M&A Security Risks - A Detailed Case Study (Focus-On) Microsoft Corporation
Managing Complex M&A Security Risks—A Detailed Case Study Microsoft Corporation
Defending a Cloud Application NetSuite
Let’s Play Doctor: Practical OS X Malware Detection and Analysis (Focus-On) Patrick Wardle , Digita Security
Securing the “Weakest Link” Adam Shostack
Security as a Service in a Financial Institution: Reality or Chimera?
Hardware Attacks and Security Graz University of Technology
Aspirin as a Service: Using the Cloud to Cure Security Headaches Rich Mogull
ENCORE When Good Devices Go Bad: Live Hacking in the IoT Sandbox
Deconstructing Identity in Security Microsoft Corporation
ForeScout: Gain Real-Time Visibility & Control of Unmanaged Endpoints/BYOD (Forescout Technologies)
Is Automation the Answer for Security in the Digital World?
…But Now I See—A Vulnerability Disclosure Maturity Model Katie Moussouris , Luta Security, Inc.
Privacy Primer for Security Officers
Hacker Marketing Strategy: How Cybercriminals Promote for Press and Profit Jennifer Leggio
Security Analytics: Gaining an Information Advantage Over Cyber Adversaries (SAS)
Five mobile security challenges facing the enterprise (NowSecure)
Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities SANS Institute
Investment in Privacy Brings Security Results
The Future of Privacy
NextWar: The Future of Technology and Geopolitics New America Foundation
Security Tenets for Life Critical Embedded Systems
The Disconnect between Builders and Buyers: A VC’s Perspective
Securing Large-Scale Socio-Technical Systems Bruce Schneier , IBM Security
Combating Spoofed GPS in Forensics Core Security
A New Security Paradigm for IoT (Internet of Threats)
Security Startups: The CISO’s Guide to Flying High without Getting Burned
Understanding Malware Provenance: A Federal View
Cybersecurity—The View from Washington with Jim Lewis and Stewart Baker Steptoe & Johnson LLP
Successful Security Practitioners: How We Evolve and Where Is the Workforce
Using Cloud-Scale Intelligence to Address Security Challenges Microsoft Corporation
More Books You Should Have Read By Now: The Cybersecurity Canon Project Palo Alto Networks
Converging IT and OT for Secure, Reliable, Resilient Industrial Networks
Cyber-Insurance as an Integral Part of Your Cyberrisk Management Strategy RSA
The Shift to a 24/7 Security Landscape: Why Cloud Security Is the Answer
Next Generation Networking Hardware Solutions (Lanner Inc.)
Hacks Happen SANS Institute
Using Large Scale Data to Provide Attacker Attribution for Unknown IoCs Dhia Mahjoub , OpenDNS
2016 State of the Phish Results (Wombat Security)
Confronting Cybercrime: Exploring the Legal and Investigative Challenges (Focus-On) U.S. Department of Justice
Designing Virtual Network Security Architectures SANS Institute
Lattice Cryptography
So You Want to Run Your Own Security Business?
Privacy Perspectives: How It’s Lost and the Implications Purdue University
Developing a Cyberstrategy: Prepare Your Company before Zero Day Strikes
Intelligent Application Security Julian Cohen
Using Deception and Forensics to Detect Threats from Within
OpenSSL after HeartBleed
The Pivot Microsoft Corporation
Security Tools: An Attacker’s Dream Come True enSilo Inc
People-Centric Security: Transform Culture, Reduce Risk, Drive Success Elevate Security
Any Bugs in That Pacemaker? Effective Medical Device Security Testing
The Little Flashlight App That Could (Exploiting Mobile Banking Apps)
Does the Risk of Criminal Activity Justify a Ban of Strong Encryption? Klaus Schmeh
It’s Not Dead Yet—Email Security Matters
Secure Multiparty Computation University of California, Irvine
DevOps Throw Down with Chris, Gary, Caleb and Shannon
Mobile Threats, the Force Awakens! (Mobile Iron)
Privacy, Selfie Sticks and Umpires: Things That Shouldn’t Exist, But Do (Focus-On) Salesforce
The DDoS Consideration for SDN Deployments
Executive Women's Forum Meet & Greet
How Do You Detect Attacks? Accenture
IOCs Are Dead—Long Live IOCs! Ryan Kazanciyan , Tanium
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Estimating Development Security Maturity in About an Hour
The Digital Transformation of Identity (ForgeRock)
Building a World-Class Proactive Integrated Security and Network Ops Center
SANS NetWars Instructor
SANS: Critical Security Controls: Planning, Implementing and Auditing Enclave Security
Breaking In Is Easy—Breaking Bad Habits Is HARD! Pwnie Express
Take It to the Cloud: The Evolution of Security Architecture Fastly
Integrating Retail Cybersecurity, Loss Prevention, Risk, Fraud and Privacy Cybersecurity
Serial Killer: Silently Pwning Your Java Endpoints Christian Schneider , Freelancer
Security Monitoring in the Real World with Petabytes of Data
Random Numbers—The Key to Security
Debunking “SOC Teams vs. Vendor” Myths in Cyber-Firefights
The Evolving Landscape of Cybersecurity: Threats, Opportunities, and Partnerships in a Changing World
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
Privacy and Cyberthreat Sharing: Bridging the Divide
Identity-Centric Security: Enjoying Digital Business Transformation While Successfully Managing Risk (CA Technologies)
Getting Scammed: A Security CEO’s Firsthand Encounter Centrify Corporation
Cybersecurity Insurance: The Catalyst We’ve Been Waiting For
How do you spot the insider threat? (Varonis Systems, Inc.)
Beyond Encryption: Why We Can't Come Together on Security and Privacy—and the Catastrophes That Await If We Don’t
Automobiles are Getting Hacked: What’s Next for Transportation Security?
Hacking Exposed LIVE: Attacking in the Shadows Cylance
When Good Devices Go Bad: Live Hacking in the IoT Sandbox
DevSecOps—The Tao of Security Science
Avoid Epic Fails: Elements of Successful Breach Notification and Response
Grow Up: A Maturity Model and Roadmap for Vulnerability Management (Core Security)
Understanding the “Why” in Enterprise Application Security Strategy (Focus-On)
How Infosec Maturity Models Are Missing the Point
Why Won't Anyone Listen to Us?
What Is the Right Approach for Critical Infrastructure Protection?
Diffusing the IoT Time Bomb—Security and Privacy Trust Code of Conduct
FCC’s Cybersecurity Risk Reduction Initiatives and Activities
Embedded Systems Security: Building a More Secure Device
Risks, Harms and Rewards of Our and Our Kids’ Online Lives
CForum: A Community Approach for Improving Cybersecurity Programs
Agile Security—Field of Dreams
Smart Megalopolises. How Safe and Reliable Is Your Data? Kaspersky Lab
Myth Busting the Security Landscape and Development Cycle
Our Road Ahead: Today’s Tech Developments, Tomorrow’s Security Challenges
Advancing Information Risk Practices Seminar
Encryption without Enterprise Key Management—It’s Like Icing without Cake
The Cryptographers' Panel
300+ Cities, Millennials and a Mobile Workforce: A Security Gauntlet Snap Inc.
Authenticated Encryption
Innovation Sandbox - "Most Innovative Startup" Live
Bots—Fast Growing Bane of the Web: Crawlers, Scrapers and Account Checkers Akamai Technologies
Building Security Data Science Capability GE Digital
CSA Summit 2016: Cloudifying Information Security