Star 0

Talks

Title Humans
Control Quotient: Adaptive Strategies For Gracefully Losing Control
Defending Against Low-Bandwidth, Asymmetric Denial of Service Attacks
Raising Awareness of Information Security Through Human Analogies The Analogies Project
The Era of Destructive Cyber Attacks - are you prepared? Fox-IT
Information Stewardship: Avoiding Data Breaches and Managing Big Data
Zscaler – Secure Deployment of Cloud Applications (Zscaler)
Crafting An Adaptive Mobile Security Posture DheapInsights
Why Does Database Patching Require A PhD? Michael Cherny
Managing Daily Security Operations with Lean and Kanban
Dissecting Banking Trojan Carberp Avast Software
How Hackers are Outsmarting Smart TVs and Why it Matters to You Trend Micro, Inc.
How Secure Are You? What Do You Do Next? Proving Controls Effectiveness (Rapid 7)
Did You Read The News? Http Request Hijacking Yair Amit , Modern OS, Symantec
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns , SAP AG
Ideas to Make Security & Risk a Team Sport, Engaging the Business & IT EMC
Overhauling Compliance Frameworks for Software-Defined Data Centers
Getting Ahead of the Assault on the Increasingly Mobile End-User (Versafe)
Why Can’t You Get What I’m Saying? Penetrating the Mental Firewall
Changing Employee Behavior to Combat Advanced Threats & Spear Phishing (PhishMe)
Breaking The Kill Chain - An Early Warning System For Advanced Threat RSA
Leveraging Big Data for Security Operations Your Cyber Analyst LLC
Security Debt and the Rule of 72 Akamai Technologies
Security vs. Privacy – The BIG Fight
Cyber Intelligence Collaboration Palo Alto Networks
Is a Secure Agile SDLC Programme a Possibility?
Crypto Hypervisor – High Assurance, Elastic, on Demand Crypto Services (SafeNet)
Intelligence Driven Security – A New Approach (RSA)
Rogue Apps & Desktop Malware: A Dangerous Combination For Online Security Fox-IT
Enterprise Mobility: Ensure the Board & Senior Leadership Teams are Secure? (BoardVantage)
My Personality - Your Security Problem!
Automating the 20 Critical Security Controls Qualys
Big Data Transforms Security RSA
iOS App Analysis
Security & Compliance in the “New” World: Cloud, Mobile & Cross-Border Flow (Seclore)
Overcoming the Challenges; Reflections on the London Games the London Organising Committee
Scalable Authentication Nok Nok Labs, Inc.
Supply Chain Assurance Framework: The Supply Chain Standards Translator
Hacking Back as a Law Enforcement Role
Evolving from Breach Prevention to Breach Acceptance to Securing the Breach
Cyber Insecurity: The Case for Effective Cybersecurity Norms (Microsoft)
How Large Should Your IR Team Be And Should They Be Dedicated Resources? Target
How FireEye Technology can Protect Against New, Zero-Day Spearphishing Attacks (FireEye)
Turning The Table Through Federated Information Sharing
A New Era of Operational Security in Online Services Microsoft Corporation
Who Can Ensure Talent for the Future?
Comparative Study: Iran, Russia & PRC Cyber War
Using Big Data Analytics to Improve Security and Compliance (Splunk)
Automated Dynamic Malware Analysis with Malware Analyzer G2 (Norman Shark)
Cloudy With A Chance of Breaches (SafeNet)
Entropy, Random Numbers And Keys: What's Good Enough? QuintessenceLabs
Preventing Attackers From Using Verifiers: A-Pake With Pk-Ids RSA
Network and Information Security Legislation in the EU
Android Malware Exposed - An In-depth Look at its Evolution
Breach-Aholic Anonymous – What Can We Learn From Data Breaches?
10 IT Trends Influencing the Information Security Profession
Hands on With Next-Generation Security (Palo Alto Networks)
Nailing Cloud Security With Pre-Cloud Security Thinking?
AirWatch, Empowering the Mobile Enterprise (AirWatch)
Citizen Centric E-Identity Ecosystems and The Internet of Things GroovyFuture.com
Securing BYOD: Mitigating Risk, Not Forcing Control! Rapid7
ASR Case Study : Securing Customer Data and Web Applications in the Cloud (Qualys)
Battle Scars And Friendly Fire: War Stories from a Threat Research Team
Is Identity The New Money?
If I Want a Perfect Cyberweapon, I'll Target ERP Alexander Polyakov , ERPScan
Good Guys vs. Bad Guys. Using Big Data to Counteract Advanced Threats Splunk
Real World Success and Failure with Cloud Projects Quantitative Risk Management
Alternatives and Enhancements to CAs for a Secure Web Google Inc.
Security Culture: Figuring Out How Bad Your Company Really Is
Data-Driven Security - Where's the Data? Qualys
Microsoft Security Intelligence Report WW Cybersecurity & Data Protection, Microsoft
OWASP: Approaching Secure Code – Where do I Start?
When Worlds Collide - Harmonising Governance Between Security And Privacy
Concurrent Behaviour Analysis: Resilient Indicators of Emergent Exploits VMware
Security Implications of NFC in Authentication and Identity Management
Cryptography as a Service RSA
Future Gazing: What Will 'Security' Be Like In The Year 2020? Trend Micro, Inc.
Thousands Of Apps Can't Be Wrong: Mobile Application Analysis At Scale Veracode
Before, During & After: Being Early in Cyber Mitigation Puts You in Control (Fox-IT)
Bug Parades, Zombies, and the BSIMM: A Decade of Software Security
Cyber Security Information Exchange NATO Communications and Information Agency
Playing the Game of Thrones: ensuring the CISO role at the King’s Table
Best Practice Approach to Secure an Industry 4.0 Environment (Symantec)
Social Media Deception
Looking Through the Macroscope: Examining Data Sources (Akamai)
See How to Use Splunk and Big Data as a SIEM Plus More (Splunk)
You’re Not Your iPhone – or Are You?
‘Big Data’ for Security Purposes – How Can I Put Big Data to Work for Me? Splunk
SAML meets OAuth in the Cloud: A Marriage Made in Heaven RSA
Trending Now: Privacy and Cyber Security Policy in the U.S. and E.U. King & Spalding
Cut Through the Hype to Expose the Truth About Advanced Persistent Threats
Drozer Pro: Security Assessment for Android (MWR InfoSecurity)
Lessons Learned from a Rigorous Analysis of Two Years of Zero-Day Attacks
Old Vulnerabilities In New Protocols? Headaches About IPv6 Fragments Cisco Systems
Elevator Pitches
Understanding and Fighting Evasive Malware Christopher Kruegel , Lastline, Inc.
A New Paradigm for Defending Against Targeted Attacks Security Intelligence and Technology, Symantec Corp.
Can There be Acceptable Compromise? Palo Alto Networks
Security Awareness Fails. What Now For The Human Firewall? Vocalink
Top Ten Proactive Software Controls WhiteHat Security
Survival Isn’t Mandatory: Challenges and Opportunities of DevOps
Using Big Intelligence to Defend against Modern Attacks Microsoft Corporation
How do you Find the Unknown Threat in your Organisation? (FireEye) Palo Alto Networks
Mine Is Bigger: When Cybercriminals Compare Tools
Secure Mobility with BlackBerry Enterprise Service 10 (BlackBerry)
To Share or Not to Share, Or Is It An Obligation? FS-ISAC
Security at the Greatest Show on Earth
Improving Security Posture by Leveraging and Exploiting Existing Investments (BAE Systems Detica)
Considering Cloud? Learn About Current Trends In Cloud Computing Microsoft Corporation
Degrees of Freedom: Rethinking Security