Control Quotient: Adaptive Strategies For Gracefully Losing Control
|
|
Defending Against Low-Bandwidth, Asymmetric Denial of Service Attacks
|
|
Raising Awareness of Information Security Through Human Analogies
|
The Analogies Project
|
The Era of Destructive Cyber Attacks - are you prepared?
|
Fox-IT
|
Information Stewardship: Avoiding Data Breaches and Managing Big Data
|
|
Zscaler – Secure Deployment of Cloud Applications (Zscaler)
|
|
Crafting An Adaptive Mobile Security Posture
|
DheapInsights
|
Why Does Database Patching Require A PhD?
|
Michael Cherny
|
Managing Daily Security Operations with Lean and Kanban
|
|
Dissecting Banking Trojan Carberp
|
Avast Software
|
How Hackers are Outsmarting Smart TVs and Why it Matters to You
|
Trend Micro, Inc.
|
How Secure Are You? What Do You Do Next? Proving Controls Effectiveness (Rapid 7)
|
|
Did You Read The News? Http Request Hijacking
|
Yair Amit
,
Modern OS, Symantec
|
Relax Everybody: HTML5 Is Securer Than You Think
|
Martin Johns
,
SAP AG
|
Ideas to Make Security & Risk a Team Sport, Engaging the Business & IT
|
EMC
|
Overhauling Compliance Frameworks for Software-Defined Data Centers
|
|
Getting Ahead of the Assault on the Increasingly Mobile End-User (Versafe)
|
|
Why Can’t You Get What I’m Saying? Penetrating the Mental Firewall
|
|
Changing Employee Behavior to Combat Advanced Threats & Spear Phishing (PhishMe)
|
|
Breaking The Kill Chain - An Early Warning System For Advanced Threat
|
RSA
|
Leveraging Big Data for Security Operations
|
Your Cyber Analyst LLC
|
Security Debt and the Rule of 72
|
Akamai Technologies
|
Security vs. Privacy – The BIG Fight
|
|
Cyber Intelligence Collaboration
|
Palo Alto Networks
|
Is a Secure Agile SDLC Programme a Possibility?
|
|
Crypto Hypervisor – High Assurance, Elastic, on Demand Crypto Services (SafeNet)
|
|
Intelligence Driven Security – A New Approach (RSA)
|
|
Rogue Apps & Desktop Malware: A Dangerous Combination For Online Security
|
Fox-IT
|
Enterprise Mobility: Ensure the Board & Senior Leadership Teams are Secure? (BoardVantage)
|
|
My Personality - Your Security Problem!
|
|
Automating the 20 Critical Security Controls
|
Qualys
|
Big Data Transforms Security
|
RSA
|
iOS App Analysis
|
|
Security & Compliance in the “New” World: Cloud, Mobile & Cross-Border Flow (Seclore)
|
|
Overcoming the Challenges; Reflections on the London Games
|
the London Organising Committee
|
Scalable Authentication
|
Nok Nok Labs, Inc.
|
Supply Chain Assurance Framework: The Supply Chain Standards Translator
|
|
Hacking Back as a Law Enforcement Role
|
|
Evolving from Breach Prevention to Breach Acceptance to Securing the Breach
|
|
Cyber Insecurity: The Case for Effective Cybersecurity Norms (Microsoft)
|
|
How Large Should Your IR Team Be And Should They Be Dedicated Resources?
|
Target
|
How FireEye Technology can Protect Against New, Zero-Day Spearphishing Attacks (FireEye)
|
|
Turning The Table Through Federated Information Sharing
|
|
A New Era of Operational Security in Online Services
|
Microsoft Corporation
|
Who Can Ensure Talent for the Future?
|
|
Comparative Study: Iran, Russia & PRC Cyber War
|
|
Using Big Data Analytics to Improve Security and Compliance (Splunk)
|
|
Automated Dynamic Malware Analysis with Malware Analyzer G2 (Norman Shark)
|
|
Cloudy With A Chance of Breaches (SafeNet)
|
|
Entropy, Random Numbers And Keys: What's Good Enough?
|
QuintessenceLabs
|
Preventing Attackers From Using Verifiers: A-Pake With Pk-Ids
|
RSA
|
Network and Information Security Legislation in the EU
|
|
Android Malware Exposed - An In-depth Look at its Evolution
|
|
Breach-Aholic Anonymous – What Can We Learn From Data Breaches?
|
|
10 IT Trends Influencing the Information Security Profession
|
|
Hands on With Next-Generation Security (Palo Alto Networks)
|
|
Nailing Cloud Security With Pre-Cloud Security Thinking?
|
|
AirWatch, Empowering the Mobile Enterprise (AirWatch)
|
|
Citizen Centric E-Identity Ecosystems and The Internet of Things
|
GroovyFuture.com
|
Securing BYOD: Mitigating Risk, Not Forcing Control!
|
Rapid7
|
ASR Case Study : Securing Customer Data and Web Applications in the Cloud (Qualys)
|
|
Battle Scars And Friendly Fire: War Stories from a Threat Research Team
|
|
Is Identity The New Money?
|
|
If I Want a Perfect Cyberweapon, I'll Target ERP
|
Alexander Polyakov
,
ERPScan
|
Good Guys vs. Bad Guys. Using Big Data to Counteract Advanced Threats
|
Splunk
|
Real World Success and Failure with Cloud Projects
|
Quantitative Risk Management
|
Alternatives and Enhancements to CAs for a Secure Web
|
Google Inc.
|
Security Culture: Figuring Out How Bad Your Company Really Is
|
|
Data-Driven Security - Where's the Data?
|
Qualys
|
Microsoft Security Intelligence Report
|
WW Cybersecurity & Data Protection, Microsoft
|
OWASP: Approaching Secure Code – Where do I Start?
|
|
When Worlds Collide - Harmonising Governance Between Security And Privacy
|
|
Concurrent Behaviour Analysis: Resilient Indicators of Emergent Exploits
|
VMware
|
Security Implications of NFC in Authentication and Identity Management
|
|
Cryptography as a Service
|
RSA
|
Future Gazing: What Will 'Security' Be Like In The Year 2020?
|
Trend Micro, Inc.
|
Thousands Of Apps Can't Be Wrong: Mobile Application Analysis At Scale
|
Veracode
|
Before, During & After: Being Early in Cyber Mitigation Puts You in Control (Fox-IT)
|
|
Bug Parades, Zombies, and the BSIMM: A Decade of Software Security
|
|
Cyber Security Information Exchange
|
NATO Communications and Information Agency
|
Playing the Game of Thrones: ensuring the CISO role at the King’s Table
|
|
Best Practice Approach to Secure an Industry 4.0 Environment (Symantec)
|
|
Social Media Deception
|
|
Looking Through the Macroscope: Examining Data Sources (Akamai)
|
|
See How to Use Splunk and Big Data as a SIEM Plus More (Splunk)
|
|
You’re Not Your iPhone – or Are You?
|
|
‘Big Data’ for Security Purposes – How Can I Put Big Data to Work for Me?
|
Splunk
|
SAML meets OAuth in the Cloud: A Marriage Made in Heaven
|
RSA
|
Trending Now: Privacy and Cyber Security Policy in the U.S. and E.U.
|
King & Spalding
|
Cut Through the Hype to Expose the Truth About Advanced Persistent Threats
|
|
Drozer Pro: Security Assessment for Android (MWR InfoSecurity)
|
|
Lessons Learned from a Rigorous Analysis of Two Years of Zero-Day Attacks
|
|
Old Vulnerabilities In New Protocols? Headaches About IPv6 Fragments
|
Cisco Systems
|
Elevator Pitches
|
|
Understanding and Fighting Evasive Malware
|
Christopher Kruegel
,
Lastline, Inc.
|
A New Paradigm for Defending Against Targeted Attacks
|
Security Intelligence and Technology, Symantec Corp.
|
Can There be Acceptable Compromise?
|
Palo Alto Networks
|
Security Awareness Fails. What Now For The Human Firewall?
|
Vocalink
|
Top Ten Proactive Software Controls
|
WhiteHat Security
|
Survival Isn’t Mandatory: Challenges and Opportunities of DevOps
|
|
Using Big Intelligence to Defend against Modern Attacks
|
Microsoft Corporation
|
How do you Find the Unknown Threat in your Organisation? (FireEye)
|
Palo Alto Networks
|
Mine Is Bigger: When Cybercriminals Compare Tools
|
|
Secure Mobility with BlackBerry Enterprise Service 10 (BlackBerry)
|
|
To Share or Not to Share, Or Is It An Obligation?
|
FS-ISAC
|
Security at the Greatest Show on Earth
|
|
Improving Security Posture by Leveraging and Exploiting Existing Investments (BAE Systems Detica)
|
|
Considering Cloud? Learn About Current Trends In Cloud Computing
|
Microsoft Corporation
|
Degrees of Freedom: Rethinking Security
|
|