Ending Risk Management Groundhog Day
|
|
Babel Revisited: Lessons from an IPv6 Transition
|
Internal Revenue Service
|
DHS Cybersecurity Future Technology : Where We Go From Here
|
Department of Homeland Security
|
What Does Truly Interactive Transaction Authentication Look Like? (Entersekt)
|
|
Network Security Smackdown: Which Technologies Will Survive?
|
BT
|
Not Playing Nice in the Sandbox; The Latest in Malware Evasion Techniques
|
Websense, Inc.
|
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
|
|
Targeted Security Analytics: You Know Where They are Going. Be Waiting
|
Ark Software
|
Achieving and Exceeding Compliance Through Open Source Solutions
|
Zack Fasel
,
Urbane Security
|
Hero to Zero: Can Government Catch-up in Mobility?
|
DHS S&T Cyber Security Division
|
The Boy Who Played with Fusion
|
|
Buyer Beware: How to Be a Better Consumer of Security Maturity Models
|
Carnegie Mellon University
|
Using Big Data to Uncover Sophisticated Attacks, and Secure Your Organization (Tenable Network Security)
|
|
Is Your Browser a User Agent, or a Double Agent?
|
|
Facts vs. Fear: Foreign Technology Risks in Critical Industry Sectors
|
|
How to Quickly Achieve the HIPAA Compliance Now Required for Most Companies
|
8x8, Inc.
|
Data + Cloud + Security = DirectBox! (Jiransoft)
|
|
Identify Uninvited Applications on Your Network (Narus)
|
|
Call in the Cavalry - WHY The Cavalry: Why We Need The Cavalry and Why It Falls To Us
|
|
The Relevance of Government Cybersecurity Intelligence
|
CrowdStrike, Inc.
|
Call in the Cavalry - HOW The Cavalry: How We Must Engage With The Outside World
|
|
Handling Zero Day Disclosures: You're Doing it Wrong
|
HP Security Research
|
Anatomy of a Data Breach: What You Say (or Don’t Say) Can Hurt You
|
|
Buy Candy, Lose Your Credit Card - Investigating PoS RAM Scraping Malware
|
Trend Micro, Inc.
|
Security of Large Complex Technical Systems
|
|
Running Secure Server Software on Insecure Hardware without a Parachute
|
CloudFlare Inc.
|
(ISC)2 Member Reception (Members Only)
|
|
SDN & Security: Why Take Over the Hosts When You Can Take Over the Network
|
|
DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry
|
FireEye, Inc.
|
Data Encryption for Virtualized Enterprise
|
AFORE
|
The Information Security Specialist or Generalist, Who Will Be in Demand?
|
|
Oh the PaaSabilities, Security in a Platform as a Service World
|
David Mortman
|
Software Liability?: The Worst Possible Idea (Except for all Others)
|
|
Utilities and Cybersecurity - Myth and Reality
|
|
How We Implemented Security in Agile for 20 SCRUMs- and Lived to Tell
|
LivePerson
|
Updating the Law on Government Access to Your Online Data
|
Google Inc.
|
Cybersecurity in a World of Borders
|
|
Using Data Breadcrumbs to ID Targeted Attacks
|
Dan Hubbard
|
Rogue Mobile Apps: Nuisance or Legit Threat?
|
PhishLabs
|
A Human Factor Interface for SIEM
|
|
The Network Alone Can’t Protect Your Data
|
Dell
|
Hot Topics in Information Security Law 2014
|
|
Anti-Stealth Techniques: Heuristically Detecting x64 Bootkits
|
Lars Haukli
,
Blue Coat Systems
|
Using Automated Cyber Threat Exchange to Turn the Tide against DDOS
|
Federal Bureau of Investigation
|
Advancing Information Risk Practices Seminar
|
|
Workshop on the Proposed NIST Cybersecurity Framework
|
|
Side-Channel Attacks
|
|
Get Proactive with Security – A Session on Using Trusted Computing to Free Security Resources for the Day-to-Day Fires
|
|
Social Gaming: Emerging Regulation (aka"Make Money and Avoid Jail")
|
|
Is the Liberty Reserve Money Laundering Case the New Face of Cyber Crime?
|
|
Let Go of the Status Quo: Build an Effective Information Protection Program
|
Insider Threat Operations, Raytheon
|
The Security Staff and Skills Shortage is Worse Than You Think
|
|
Embracing “Identity as the New Perimeter” – Strategic Guide for the CIO (CA Technologies)
|
|
Privacy Reboot
|
|
Eight Conflicts Which Changed Cyberspace
|
Jason Healey
|
Right Skills, Right Time, Right Industry: Women in Security
|
Booz Allen Hamilton
|
Education and Engaging the C-Suite on Cybersecurity
|
|
Gumshoes – Security Investigative Journalists Speak Out
|
The New York Times
|
Continue The Conversation: 20 in 2014: The Top Privacy Issues to Watch
|
|
Mobile Analysis Kung Fu, Santoku Style
|
viaForensics
|
Computer Forensics and Incident Response in the Cloud
|
Alert Logic
|
Delinquent - Thief - Spy - Hero: The Evolution of Movie Hackers
|
|
Cyber Vigilante or Self Defense?
|
|
SANS: Lethal Network Forensics
|
SANS Institute
|
Cyber Battlefield: The Future of Conflict
|
|
How to Secure the Next Phase of Mobility in the Internet of Things
|
Erich Stuntebeck
,
AirWatch
|
Welcome & Non-Integral Asymmetric Functions
|
|
Building a Bunker for Business Assets and Processes
|
Booz Allen Hamilton
|
(ISC)² CSSLP CBK Training Preview
|
|
Continue The Conversation: The Seven Most Dangerous New Attack Techniques and What's Coming Next
|
|
RESTing on Your Laurels Will Get You Pwned
|
Alvaro Muñoz
|
An Overview of the EO Cybersecurity Framework
|
|
Closing the Cybersecurity Skills Gap – It’s Past Time.
|
SANS Institute
|
Little Bets: How Breakthrough Ideas Emerge from Small Discoveries by Peter Sims
|
|
Operation Olympic Games Is the Tom Clancy Spy Story that Changed Everything
|
Palo Alto Networks
|
SecOps Alchemy - Turning Pb to Au
|
Global Security Organization, ADP
|
Deciphering the Legal Framework that Governs Online Identity Systems
|
|
Finding a Path Forward in an Increasingly Conflicted Digital World
|
RSA
|
Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy
|
|
Malware Defense Integration and Automation
|
Eng, Jask
|
Big Data is Old School – Endpoint Intelligence is the New Information Security (Unisys)
|
|
Malware Under the Hood – Keeping your Intellectual Property Safe
|
Shoshn Partners
|
From Data to Wisdom: Big Lessons in Small Data
|
|
Public-Key Encryption
|
|
Unmasking the Social Engineer and Social Engineering by Chris Hadnagy
|
|
The Story of charity: water
|
|
Hot Topics in Privacy
|
Cisco Systems
|
The Privacy Engineer's Manifesto: Getting From Policy to Code to QA Value by Michelle Dennedy & Jonathan Fox
|
|
Hacking Exposed: The Art of Deterrence
|
Cylance
|
Information Security Policy for Users (Not Auditors)
|
D+H
|
Identity and Access Management: Business Performance Through Connected Intelligence by Ertem Osmanoglu
|
|
Android in the Enterprise and the Future of Mobile Threats
|
Cloudmark
|
Continue The Conversation: Keeping Up With The Joneses: How Does Your Insider Threat Program Stack Up?
|
|
ISSA Member Reception
|
|
Security Education for the New Generation
|
|
Walking the Security & Privacy Talk; Moving from Compliance to Stewardship
|
|
(ISC)² CCFP CBK Training Preview
|
|
Why Cyber Incident Response Teams Get No Respect
|
Lancope
|
Implementing PCI DSS 3.0 for Success: Challenges and Best Practices
|
|
BYOD: An Interpretive Dance
|
Ashcroft Law Firm
|
Applying Cryptography as a Service to Mobile Applications
|
RSA
|
Now That You’re In, How Do You Get Out? Terminating Cloud Services
|
Nettitude
|
Helping People Walk the Narrow Path
|
Markus Jakobsson
,
ZapFraud
|
How Was Your Migration to RSA 2048-Bit?
|
Data Protection Engineering, Fidelity Technology Group
|
To Regulate or Not to Regulate Cyber Security: That Is the Question
|
|
10 Dimensions of Security Performance for Agility & Rapid Learning
|
|
Cultivating the Global Workforce Landscape
|
|
Security Career Pro Tips
|
|
Combating Advanced Targeted Attacks through Managed Security Analytics and Intelligence (Verizon)
|
|
Evaluating the Security of Purchased Software: Can We Find Common Ground?
|
SAFECode
|
Mobile Payments: Winning the Fraud Battle
|
Signifyd
|
SANS: The Critical Security Controls: Planning, Implementing and Auditing
|
Enclave Security
|
Response Plan Fitness: Exercise, Exercise, Exercise!
|
|
The Seven Most Dangerous New Attack Techniques and What's Coming Next
|
SANS Institute
|
Hackback? Claptrap! - An Active Defense Continuum for the Private Sector
|
Steptoe & Johnson LLP
|
Building and Extending Solutions with Hardware Trust
|
Intel Corporation
|
Threat Modeling: How Do You Define It? How Do You Use It?
|
Carnegie Mellon University
|
How Joshua DoSed Jericho: Cybersecrets of the Bible
|
Oracle Corporation
|
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
|
Intel Corporation
|
BlackHat PsyOps -- Why Everyone Clicks (Proofpoint)
|
|
End-to-End Analysis of a Domain Generating Algorithm Malware Family
|
Jason Geffner
,
CrowdStrike, Inc.
|
The FBI and the Private Sector: Closing the Gap in Cyber Security
|
Federal Bureau of Investigation
|
Twilight of Legacy AV Models - A Different Long Tail Story
|
FireEye Research Labs
|
Not Go Quietly: Surprising Strategies and Teammates to Adapt and Overcome
|
|
Data Breach Resolution for Insurance Carriers
|
|
Cyber Legislation: National Security & Corporate Responsibility Collide
|
Palo Alto Networks
|
Social Media Single Sign-On: Could You Be Sharing More than Your Password
|
Gemalto
|
The Art of Attribution: Identifying and Pursuing your Cyber Adversaries
|
CrowdStrike, Inc.
|
The Cloud – Security Nightmare or Our Next Great Hope?
|
Qualys, Inc.
|
Protecting the Crown Jewels: Sensitive Data Management (Identity Finder)
|
|
Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval by David Matthews
|
|
Identity Security Automation to Stay Ahead of Nation State Attacks (Lieberman Software)
|
|
Harnessing Big Data for Application Security Intelligence
|
|
A Comfy Couch for Critical Assets
|
Booz Allen Hamilton
|
Seven Habits of Highly Effective Security Products
|
|
It’s Time to Offer Facebook Logon to Your Customers
|
Oracle
|
The Future of Exploits, Developing Hidden C&C and Kittens
|
SANS Institute
|
Mutiny on the Bounty: The Epic Tale of How Data Defeated Dogma
|
Katie Moussouris
,
Luta Security, Inc.
|
Risky Business: Managing Risk across Industries in Today’s Global Economy
|
Drexel University
|
Information Security Governance Simplified: From the Boardroom to the Keyboard and CISO Leadership: Essential Principles For Success by Todd Fitzgerald
|
|
Meet and Greet McGraw Hill Authors
|
|
Predatory Hacking of Mobile: Real Demos
|
Jeff Forristal
,
Bluebox Security
|
Bitcoin Is Here: How to Become a Successful Bitcoin Thief!!!
|
|
Smartphone Privacy
|
|
Social Engineering: When the Phone is More Dangerous than Malware
|
|
A CISO's Perspective: Protecting with Enhanced Visibility and Response
|
|
Intelligence Driven Security
|
CrowdStrike, Inc.
|
Is the Cloud Really More Secure Than On-Premise?
|
|
The Current State of Automotive Security
|
Chris Valasek
,
Uber ATC
|
The PRNG Debate
|
Paul Kocher
|
Security Metrics: Can They Be Effectively Measured Across the Enterprise?
|
|
Denial of Service and Outsourcing Murder by Mary Ann Davidson
|
|
What Does Security Really Mean in the Age of NSA, Cyber Spying and Espionage? Do You Know Who Is on Your Network?!? (Caspida)
|
|
Security Business Intelligence– Big Data for Faster Detection/Response
|
Intel Corporation
|
Baseline Security: A Risk-Based ISMS Implementation
|
|
A Fierce Domain: Cyber Conflict, 1986 to 2012 by Jason Healey
|
|
Securing Boomers, Gen Xers and Gen Yers: Omg We Are So Different!
|
|
viaForensics' Study Tracks Mobile App Data Security (viaForensics)
|
|
50 Shades of Security: Whipping Your Users Into Submission
|
|
Hacking Exposed Mobile by Joel Scambray
|
|
Words Matter: Eschew Obfuscation, Espouse Elucidation
|
Sage Data Security, LLC
|
Smart Grid Security: A Look to the Future
|
Accenture
|
Keeping Up with the Joneses: How Does Your Insider Threat Program Stack Up?
|
|
Bad Romance: 3 Reasons Hackers Love Your Web Apps & How to Break Them Up
|
|
How to Catch an Insider Data Thief
|
|
Applications of Cryptographic Primitives
|
|
When Worlds Collide – the Fusion of Cloud and Embedded
|
|
Phish or Not?
|
|
Raising the Security Bar with Windows 8.1
|
Microsoft Corporation
|
The Anatomy and Detection of a Latent Rootkit Attack (LynuxWorks)
|
|
Innovation Sandbox
|
|
RAPID HYBRID PENTEST(TM) - a Systematic Approach to Validate if Your End–User Security Controls Are Working, Need Tuning or Are Missing (SynerComm)
|
|
RSA Conference Codebreakers Bash
|
|
Storm Advancing: Security Weathermen Forecast the Advanced Threat Landscape
|
|
Making the Security Super Human: How to Effectively Train Anyone/Anything
|
|
Assume a Hostile Environment: Securing Mobile Data in the App
|
viaForensics
|
The Next World War Will be Fought in Silicon Valley
|
Juniper Networks
|
Why SSL Is Better Than IPsec for Fully Transparent Mobile Network Access
|
|
Let Your Users Go Rogue
|
|
The Future of Security Education
|
Lookout
|
The Future of Authentication: Different Approaches to the Same Goal
|
The FIDO Alliance
|
CSA Summit 2014: In Global Clouds We Trust?
|
|
Secure Development Lifecycle (SDLC) - First Steps that Lead to Meaningful Protection (Attachmate)
|
|
Adventures in Insurance Land – Weaknesses in Risk Pricing and Alternatives
|
Accuvant Inc.
|
VMware: The Goldilocks Zone: Security in the Era of the Software Defined Datacenter
|
|
Cybersecurity Framework: A Practical Guide to Manage Cybersecurity Risk
|
|
SCADA Success Stories
|
|
Changing User Behavior: The Science of Awareness
|
SANS Institute
|
Leading Cybersecurity: Technically Sexy, Programmatically Dowdy
|
|
The NIST Randomness Beacon
|
|
'2nd-Wave' Advanced Threats: Preparing for Tomorrow's Sophisticated Attacks
|
RSA
|
Trust Us: How to Sleep Soundly with Your Data in the Cloud.
|
|
Syrian Electronic Army: Their Methods and Your Responses
|
|
Oh the Humanity! Building Reliable Cultural Firewalls
|
|
Security Principles Versus the Real World
|
|
Digital Signatures
|
|
Threat Modelling by Adam Shostack
|
|
Your Pad or Mine? - Embracing and Securing BYOD
|
Juniper Networks
|
SANS: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
|
SANS Institute
|
State of the Hack: One Year after the APT1 Report
|
FireEye, Inc.
|
How to Overcome Security Challenges of Doing Business in China
|
Associates, Inc.
|
The New Model of Security
|
Cisco Systems
|
Where Do We Go from Here, Now That Our Internet Is Gone?
|
Rafal Los
,
Optiv
|
Turning Medical Device Hacks into Tools for Defenders
|
Accuvant Inc.
|
iOS Security: The Neverending Story of Application-Security
|
Yair Amit
,
Modern OS, Symantec
|
Identity & Access Management (IAM) Maturity: A Comparison Across Companies
|
Identity Management Technology
|
Dueling Perspectives: “Rules of the Road” or “Rule of Law” for Cyberspace
|
CrowdStrike, Inc.
|
Protected in Part Means Fully Exposed—A Mock Trial
|
|
Encrypted Access: A Double Edged Sword (SSH Communications Security)
|
|
The Game of Hide and Seek, Hidden Risks in Modern Software Development
|
Alert Logic
|
Cyber Security Canon: You Should Have Read These Books by Now
|
Palo Alto Networks
|
The Cryptographers' Panel
|
|
Security Cinema
|
|
Big Data and Hadoop: New Security Challenge
|
Zettaset
|
Remarks by Stephen Colbert
|
|
Succeeding with Enterprise Software Security Key Performance Indicators
|
Rafal Los
,
Optiv
|
Executive Women’s Forum Reception
|
|
Data Hiding by Mike Raggo
|
|
Honeywords: A New Tool for Protection from Password Database Breach
|
|
Neuro-Hacking 101: Taming Your Inner Curmudgeon
|
|
Project 2020: Preparing Your Organization for Future Threats … Today
|
Trend Micro, Inc.
|
Hash Function Cryptanalysis
|
|
The Dichotomy of the System Administrator
|
Professional Services, MAD Security
|
TweetUp: Security & Privacy
|
Mark Stanislav
,
Duo Security
|
Too Critical to Fail: Cyber-Attacks on ERP, CRM, SCM and HR Systems
|
Onapsis
|
Security Risk Assessments of Third-Party Service Providers
|
Diversified Global Graphics Group
|
Internet of Things... Promising but Let's Not Forget Security Please!
|
Cisco Systems
|
Eyes on IZON: Surveilling IP Camera Security
|
Mark Stanislav
,
Duo Security
|
Applied Cryptography, Secrets & Lies, Schneier on Security, Liars and Outliers and Carry On by Bruce Schneier
|
|
Virtualization and Cloud: Orchestration, Automation and Security Gaps
|
SANS Institute
|
Third-Party Cyber Security & Data Loss Prevention
|
|
Why Mobile Should Stop Worrying and Learn to Love the Root
|
NowSecure
|
Hacking Exposed: Day of Destruction
|
George Kurtz
,
CrowdStrike, Inc.
|
We Are All Intelligence Officers Now
|
Dan Geer
|
Practical Legal Aspects of BYOD
|
|
The Art of Evasion: Malware Deconstructed
|
|
Managing Secure Access to Connected ‘Things’ – How Hard Can It Be? (Covisint)
|
|
Mobile Security in the Enterprise
|
|
Data-Driven Security (Brand New Book Launch) by Jay Jacobs & Bob Rudis
|
|
The Robotics Revolution
|
|
Wrapping Mobile Apps for Security (Citrix Systems)
|
|
The Privileged User Discussion: Security Enforcer or Threat?
|
|
Search, Warrants and the Right to Privacy: Are We In Post-Constitutional America?
|
|
The "Fog of More" - A CyberSecurity Community Challenge
|
Tony Sager
|
Is the Security Industry Ready for SSL Decryption?
|
|
Practical Attacks against MDM Solutions (and What Can You Do About It)
|
Michael Shaulov
,
Lacoon Mobile Security
|
Hardware-Level Attacks - Is Detection Possible?
|
Groundworks Technologies
|
Beginners Guide to Reverse Engineering Android Apps
|
viaForensics
|
It’s a Jungle Out There: The Security State of CMS Platforms
|
Maty Siman
,
Checkmarx
|
From Disclosing Existing Vulnerabilities to Discovering New Vulnerabilities
|
Ancestry.com
|
Hacking iOS on the Run: Using Cycript
|
viaForensics
|
Key Trends in Security: The Venture Capitalists' View
|
|
Little Bets: How Breakthrough Ideas Emerge from Small Discoveries
|
Entrepreneur
|
The Disaster Experts: Mastering Risk in Modern America by Scott Knowles
|
|
Make Way for the Internet of Things
|
|
Securing Our Nation's Data Centers Against Advanced Adversaries
|
Department of Defense
|
Good Fences Make Good Neighbors: Rethinking Your Cloud Selection Strategy
|
Nebula
|
A Tale of Two Mocks—A Deep Dive Into the Issues Raised
|
|
Securing the Big Data Ecosystem
|
Davi Ottenheimer
|
The Sixth Man: How Cybersecurity Awareness Programs Strengthen Our Defense
|
RSA
|
How Microsoft IT "Does" Data Protection
|
Microsoft Corporation
|
Implementing a Quantitative Risk-Based Approach to Cyber Security
|
|
Cloud Application Security Assessment, Guerilla Style
|
|
Visualize This! Meaningful Metrics for Managing Risk
|
|
Hunting Mac Malware with Memory Forensics
|
|
They Did What?!? – How Your End Users Are Putting You at Risk
|
|
So Why on Earth Would You WANT to be a CISO?
|
|
Finding Needles in a Needlestack with Graph Analytics and Predictive Models
|
Lookout
|
Smart Grid Security: An End-to-End View of Security in the New Electrical Grid by Gilbert Sorebo
|
|
Technology is Only Part of the Cyber Defense Puzzle (Sypris)
|
|
Cyber Threat Defense Automation: Why Scale Matters (Agiliance)
|
|
One Step Ahead of Advanced Attacks and Malware
|
Advanced Technologies Group, Intel Security
|
View from the Inside: DHS Priorities in Cybersecurity
|
|
Information Security Leadership Development: Surviving as a Security Leader
|
CipherCloud
|
South Expo Pub Crawl
|
|
Roadster Amongst the Tonka Trucks
|
Cisco Systems
|
Security: The Hardest Career
|
Lookout
|
CANCELLED: Why We Need a Cybermilitia (and How to Get One)
|
Takatech
|
The Boundary Between Privacy and Security: The NSA Prism Program
|
|
Cyber Warfare 2E by Jason Andress
|
|
Analyst Quadrants, Third-Party Tests, Vendor Data Sheets and YOU
|
|
How Good Is Your Predictive Coding Poker Face?
|
|
OpenStack Clouds & PCI Compliance
|
|
Security vs. Privacy: Who is Winning?
|
|
The World of Warbiking through the Streets of San Francisco
|
SANS Institute
|
Riding the Tiger – Harnessing the Power of Industry in Cyber Security
|
CESG
|
Think Tank: Los Alamos National Laboratory - PathScan: Finding the Attacker Within
|
|
Cybersecurity Economics: Tips, Tactics and Tradeoffs
|
|
Continuous Monitoring with the 20 Critical Security Controls (CSC)
|
Qualys
|
The 900 Days: Battles with NAC and Access Control
|
|
Mock Trial Using Actual Case on Misrepresentation of Cloud Based Evidence
|
|
Mission Impossible?: Building and Defending Zero-Knowledge Privacy Services
|
|
How Microsoft, FS-ISAC & Agari Took Down the Citadel Cybercrime Ring
|
Microsoft Corporation
|
Mobile Application Assessments by the Numbers: A Whole-istic View
|
|
New Foundations for Threat Modeling
|
Adam Shostack
|
How to Discover if your Company's Files are on a Hacker's Shopping List
|
Prevendra, Inc.
|
A Deep Dive into the Security Threat Landscape of the Middle East
|
WW Cybersecurity & Data Protection, Microsoft
|
Why AWS CloudHSM can Revolutionize AWS
|
|
How to Make a Security Awareness Program FAIL!
|
|
Privacy as a Growing Risk
|
|
Monitoring and Filtering Your Child's Web Media Use in our Connected World
|
SynerComm Inc.
|
OTT, Virtual Carriers and the New Wave of Spam Threats in the 4G/LTE World
|
AdaptiveMobile Security Ltd
|
The Art of Evasion: Malware Deconstructed (Palo Alto Networks)
|
|
Fun with Proxmark3
|
|
Understanding NSA Surveillance: The Washington View
|
|
Gamifying Security Awareness
|
|
Securing the Virtual Environment by Davi Ottenheimer
|
|
Good Guys vs. Bad Guys. Using Big Data to Counteract Advanced Threats
|
Splunk
|
Symmetric Encryption & Cryptanalysis
|
University of Luxembourg
|
Government x 2: State and Federal Collaboration on Cybersecurity
|
Symantec
|
Getting Ready for the U.S. EMV Migration (NagraID Security)
|
|
What Is the Future of Data Privacy and Security in Mobile?
|
|
Security Awareness Metrics - Measuring Change in Human Behavior
|
SANS Institute
|
The Future of Security
|
Security Intelligence and Technology, Symantec Corp.
|
Break That Code Trivia Game
|
|
Securing Your Transition to the Cloud – How Can You Trust the Man Behind the Curtain? (Thales e-Security, Inc.)
|
|
Malicious Acrobatics on Social Media
|
|
Should a National Cyber Safety Board Be Created to Help Report on Breaches?
|
|
Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security
|
D-Trust GmbH
|
Protocols
|
UC San Diego
|
Stepping P3wns: Adventures in Full Spectrum Embedded Exploitation & Defense
|
Red Balloon Security
|
The Social Networking Battleground: Growth vs. Security
|
|
CANCELLED: Using Big Data to Protect Big Data
|
|
Understanding Geo Cyber Risk
|
Delta Risk LLC
|
U.S. and E.U. Competition to Regulate the Emerging Global Identity Architecture
|
University of Washington
|
The Steps Zurich Took to Build an “Effective” Information Security Program
|
Zurich Insurance Group
|
You Shared WHAT?! Risks and Strategies of Securing Employee File Sharing
|
Axway, Inc.
|
Mobile App Privacy: Gone in 6 seconds
|
Appthority, Inc.
|
Welcome Reception
|
|
A Hacker’s Perspective: How I Took Over Your City’s Power Grid
|
Knowledge Consulting Group
|
20 in 2014: The Top Privacy Issues to Watch
|
|
Risk-based Authentication: The Future of Guarding your Network, Systems and Data
|
Deloitte & Touche LLP
|
Achieving a Seamless User Experience When Securing Doors, Data and the Cloud (HID Global)
|
|
Building a Mystery: Threat Intelligence in Modern Security
|
|
Reboot Your IT Threat Risk Assessment (TRA) Process in 20 Minutes
|
Enbridge Inc.
|
Invited Talk
|
Fondation de l'Université Pierre
|
Identity as a Service (IDaaS): Where are You?
|
|
Attacking Trust – The Next Evolution in Cyber Weaponry
|
Merike Kaeo
,
Farsight Security
|
Peeping Naked Data: How Attackers Expose Databases and How to Cover Your Back End (Trustwave)
|
|
Effects-based Targeting for Critical Infrastructure
|
FireEye, Inc.
|
Enterprise IAM Strategies in Banking
|
TD Bank Group
|
The Role of a Cyber Mercenary
|
Gunter Ollmann
,
NCC Group
|
Hardware Implementations
|
|
Now What? Solving the Mystery of Incident Response (Webroot)
|
|
Android Security - Building a Secure Open Source Platform
|
Adrian Ludwig
,
Google Inc.
,
Android Security
|
Disrupting the Progression of a Cyber Attack
|
Tripwire
|
Foreign Spies and Facebook: The Undeniable Truth
|
|
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control (SafeNet)
|
|
Operation Full Circle
|
McAfee
|
Security PR 101
|
Check Point Software Technologies
|
Criticality Analysis & Supply Chain: Providing "Representational Assurance"
|
|
Science Fiction is Here!!
|
|
Hardware Trojans and Malicious Logic
|
Groundworks Technologies
|
Cloud Computing in China: Opportunities, Challenges and Risks
|
Microsoft Corporation
|
OODA Loop as an Advanced Persistent Defense (Lancope)
|
|
Measurement as a Key to Confidence: Providing Assurance
|
|
Touchlogger on iOS and Android
|
Trustwave
|
Getting Your Security Budget Approved Without FUD
|
|
Establishing Trust After A Breach (Tripwire)
|
|
Training CIRTs for the IRL Trenches
|
SANS Institute
|
Economic Impact of PRISM on Cloud Services & Safe Harbor
|
|
Making Penetration Tests Actually Useful
|
|
IAPP: Privacy Intensive for Security Professionals: Are You Prepared?
|
|
C U SRF with Cross USer Request Forgery
|
Amichai Shulman
,
Imperva
|
Security Shelfware: Which Products are Gathering Dust in the Shed and Why?
|
AT&T Business
|
Analyzing the Trends in Software Vulnerabilities in 2013 (Secunia)
|
|
Flash Talks Powered by PechaKucha
|
|
International Data Breach Response
|
Ashcroft Law Firm
|
Can Government Cybersecurity Policies Balance Security, Trade & Innovation?
|
|
Hugh Thompson and Guests
|
|
Implementing Privacy Compliant Hybrid Cloud Solutions
|
|
Cyber Legislation & Policy Developments 2014
|
The MITRE Corp
|
A Picture is Worth a Thousand LoC: Visualizing Your Vulnerabilities (Checkmarx)
|
|
Android Security Cookbook by Scott Alexander-Bown
|
|
Use Anomalies to Detect Advanced Attacks Before Bad Guys Use It Against You
|
Websense, Inc.
|
NCSA Reception: Non-Profits on the Loose @ RSA Conference 2014
|
|
Information Security Supply Chain - You, Your Partners and Nation States
|
Honeywell
|
Cybersecurity the Old Fashioned Way: Pass Known Good Content
|
|
Lean Hacking: How Attackers Are Doing More with Less and How to Stop Them
|
|
Writing Secure Software Is Hard, but at Least Add Mitigations!
|
Simon Roses Femerling
,
VULNEX
|
SANS: Mobile Device Security
|
Larry Pesce
,
InGuardians
|
Public Cloud Security: Surviving in a Hostile Multitenant Environment
|
|
New Frontiers in Security
|
Endgame
|
Practical Reverse Engineering by Elias Bachaalany
|
|
Follow the Money: Security Researchers, Disclosure, Confidence and Profit
|
Jake Kouns
,
Risk Based Security
|
Trojan Horse: A Novel and Zero Day: A Novel by Mark Russinovich
|
|
Dangerous Reading: Malware from Pirated E-book Sites (Blue Coat Systems)
|
|
Technical Metrics Aren’t Enough: 10 Strategic Security Measures
|
|
Orientation
|
|
The Battle for Information Superiority in Cyber Security (Sourcefire)
|
|
Top Attacks in Social Media
|
KRAA Security
|
Shifting Roles for Security in the Virtualized Data Center: Who Owns What?
|
|
Tinker Bell SSL: Avoiding the Neverland Security Infrastructure
|
Data Protection Engineering, Fidelity Technology Group
|
What Is Going on at NSA These Days
|
|
Hardware Assisted Security: Enhancing the Coverage, Efficiency and Strength of Datacenter and Cloud Security (Intel)
|
|
(ISC)2 Foundation Safe & Secure Online Program Volunteer Orientation (Members Only)
|
|
Pass-the-Hash: How Attackers Spread and How to Stop Them
|
Microsoft Corporation
|
Dueling Banjos - Cloud v Enterprise Security: Using Automation & DevOps NOW
|
Rich Mogull
|
Crypto for Constrained Devices – A Talk with Whitfield Diffie
|
|
Whose IP Is It Anyway: Tales of IP Reputation Failures
|
IBM
|
EMM, Delivering Security Without Compromising the User Experience
|
|
Effects of Recent Federal Policies on Security and Resiliency Landscapes
|
Carnegie Mellon University
|
Entropy, Random Numbers and Keys: What's Good Enough?
|
QuintessenceLabs
|
Stop APTs Dead (AhnLab)
|
|
Security Basics Seminar
|
Rapid7
|
“All About the Data”: Security Information and Event Analysis – Move from a Qualitative to Quantitative Approach
|
|
Where in the World is xn--80atbrbl6f.xn--p1ai?
|
Blue Coat Systems
|
Securing Smart Machines: Where We Are, Where We Want to Be, and Challenges
|
Federal Trade Commission
|
Auditing Cloud Computing: A Security and Privacy Guide and The Savvy Cyber Kids At Home (Series) by Ben Halpert
|
|
Integrating Any Smartphone Into Your Mobile ID Strategy
|
GlobalPlatform
|
An Arms Race: Using Banking Trojan and Exploit Kit Tactics for Defense
|
Trustwave
|
Diablo Security: What Can Infosec Learn from Video Games?
|
Tripwire
|
Collaboration across the Threat Intelligence Landscape
|
Merike Kaeo
,
Farsight Security
|
Large Corporation Chief Information Security Officers on Aligning Cyber Technologies, Personnel and Processes
|
|
Business Control & Velocity: Balance Security, Privacy, Ethics & Optimize Risk
|
Cylance
|
Lessons Learned from Physical Tamper-Response Applied to Client Devices
|
Ryan Lackey
,
CloudFlare, Inc.
|
Security by and for the People!
|
|
Privacy Enhancing Technologies: Pipe Dream or Unfulfilled Promise?
|
|
Now You See Me – Attacks with Web Server Binaries and Modules
|
|
Are Mobile Devices the Answer to the Strong Authentication Problem?
|
|
Watching the Watchers: Privacy Officers Inside the U.S. Government
|
Karen Neuman
,
Department of Homeland Security
|
Risk and Responsibility in a Hyper-Connected World
|
McKinsey
|
Survey of the Operating Landscape Investigating Incidents in the Cloud
|
|
Continue The Conversation: The Cryptographers' Panel
|
|
New Ideas on CAA, CT, and Public Key Pinning for a Safer Internet
|
|
Big Data's Potential in Helping to Secure the Internet of Things
|
IBM
|
Utilizing Threat Indicators & Context to Improve Security Response
|
|
Threat Centric Security
|
|
You Are Known by the Company You Keep: Introducing a Secure Software Vendor Exchange Program (Veracode)
|
|
Are Your Privileged Users at Risk or a Risk? (Vormetric)
|
|
The Dark Web and Silk Road
|
|
Information Exchange on Targeted Incidents in Practice
|
|
Castles in the Air: Data Protection in the Consumer Age
|
|
NSA Surveillance: What We Know, and What to Do about It
|
Bruce Schneier
,
IBM Security
|
North Expo Coffee Hour
|
|
The Latest Security Features Available for Server Based Security Appliances (UNICOM Engineering)
|
|
Cloud Ninja: Catch Me If You Can!
|
Rob Ragan
,
Bishop Fox
|
Are your Keys to the Kingdom Safe? - SSH as an Attack Vendor (Venafi)
|
|
Hijacking the Cloud: Systematic Risk in Datacenter Management Networks
|
|
I Survived Rock’n’Roll: Security Incident Escalation
|
|
Privilege Management: Top 5 Tips and Traps (BeyondTrust)
|
|
Secure Cloud Development Resources with DevOps
|
|
Inflection: Security's Next 10 Years
|
Rich Mogull
|
Learning Malware Languages: Fun with Dick and Jane’s Malware
|
|
One Year Later: Lessons and Unintended Consequences of the APT1 Report
|
|
Surviving a Security Firestorm: Tales from Those Who've Lived through It
|
|
Cognitive Injection: Reprogramming the Situation-Oriented Human OS
|
Akamai Technologies
|
An Introduction to Random Number Generators (QuintessenceLabs)
|
|
Security Response in the Age of Mass Customized Attacks
|
Peleus Uhley
|
Applying International Law to Cyber Warfare
|
Atlantic Council
|
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats and Blackhatonomics: An Inside Look at the Economics of Cybercrime by John Pirc
|
|
A Penetration Testing Maturity and Scoring Model
|
SANS Institute
|
Managing Risk and Information Security: Protect to Enable by Malcolm Harkins
|
|
Captializing on Collective Intelligence Twitter Chat
|
|
Be a DREAMR: Obtain Business Partnership, Not Just Buy-in
|
Mayo Clinic
|
Scaling a Software Security Initiative: Lessons from the BSIMM
|
|
Ensuring Your 3rd Party Vendors and Partners are Secure
|
Convergys
|
Hacking Web Apps by Mike Shema
|
|
Dinner for 6
|
|
DevOps/Security Myths Debunked
|
Signal Sciences
|
Core Software Security: Security at the Source by James Ransome and Anmol Misra
|
|
Hunting for OS X Rootkits in Memory
|
Cem Gurkok
,
Verizon Terremark
|
Beyond Information Warfare: The History of the Future of Security
|
|
Your Product is Made WHERE?
|
Intel Corporation
|
Call in the Cavalry - WHAT The Cavalry: What We Must Do as Researchers and Ambassadors
|
|
Think Tank: Pacific Northwest National Laboratory
|
|
How Shared Security Intelligence Can Better Stop Targeted Attacks
|
ServiceNow
|
Meet the PCLOB: An Introduction to the Independent US Privacy and Civil Liberties Oversight Board
|
|
Conundrums in Cyberspace: Exploiting Security in the Name of, well, Security.
|
Microsoft Corporation
|