Does Defining Privacy Matter?
|
National Security Agency
|
The Six Most Dangerous New Attack Techniques and What's Coming Next
|
|
Embedded Insecurity: What Lies Beneath
|
|
Social Media in Marketing and the Workplace: Legal and Regulatory Compliance
|
|
What Happens in Vegas Goes on YouTube: Using Social Networks Securely
|
Nettitude
|
Making a Career Move, Developing Your Approach.
|
|
Stress and Burnout in the Information Security Community
|
|
How to Attack the Supply Chain (the Securing of)
|
|
Applying the NFC Secure Element in Mobile Identity Apps
|
|
Evil Through the Lens of Web Logs
|
Microsoft Corporation
|
Can Data Breaches Be Stopped, Really?
|
|
NSA's Secure Mobility Strategy
|
|
Vetting Mobile Apps for the Warfighter
|
|
CYA in a BYOD World
|
|
Combating Advanced Persistent Threats (APTs): No Enterprise is an Island
|
|
SSL and the Future of Authenticity
|
|
Government Workforce – We’re Moving Mobile
|
|
Software Security Goes Mobile
|
NetSuite
|
Behind Velvet Ropes: Access Government Services While Safeguarding Data
|
|
Zero Trust: Case Studies and Lessons Learned
|
Motorola Solutions
|
A Timeline of Disaster
|
|
Engineering Smart Grid Security
|
IOActive, Inc
|
Exploiting a PCI Compliant Network: A How-To Guide
|
|
Security Enters the Boardroom: How Does Security Articulate Business Value?
|
|
Live Forensics of a Malware Infection
|
F-Secure
|
Cutting the Cord: Enabling Smartphones & Tablets without Risking Security
|
|
Big Data and Security: The Rules Have Changed
|
Rich Mogull
|
Hacks, Flacks And Attacks: Collaborating on Communications During a Breach
|
|
How to Launch a Secure Cloud Initiative: NASA’s Jet Propulsion Laboratory
|
|
Secure Multiparty Computation
|
University of Maryland
|
Critical Infrastructure: The IPv6 Transition Challenge
|
|
Minding the App Store - Protecting Software and Device Features
|
|
Negotiating Privacy and Security Agreements: Potential Obligations Security Professionals Should Know About
|
|
Can We Reconstruct How Identity is Managed on the Internet?
|
|
Hacking Exposed: Mobile RAT Edition
|
George Kurtz
,
CrowdStrike, Inc.
|
Collective Defense: How the Defenders Can Play to Win
|
Microsoft Corporation
|
The Faces of Fraud: An Inside Look at the Fraudsters and Their Schemes
|
|
SCADA and ICS Security in a Post-Stuxnet World
|
|
Showcase Showdown: Browser Security Edition
|
Paul Mehta
,
Accuvant
|
The Dark Side of a Payment Card Breach
|
|
The Psychology of a Cyber Predator; Decoding the Deviate Mind
|
|
Lightning Round: Security Risk Management: Insurance and Legal Responsibilities
|
|
Cyber Battlefield: The Future of Conflict
|
|
BYOD(evice) without BYOI(nsecurity)
|
General Electric
|
Balancing Business Agility and its Risk in Today’s Evolving IT Environments
|
|
Elephant in the Room: Intellectual Property Hacking
|
RSA
|
Vulnerability Panel: Is it ZERO Day or ZERO Care?
|
MITRE
|
Making Sense of Software Security Advice: Best vs. Practiced Practices
|
Kyle Randolph
,
Adobe Systems, Inc.
|
Always-On SSL: A Necessity to Deal with an Inconvenient Truth
|
Symantec
|
The Vendor Management Challenge: Doing More with Less
|
|
CXO Perspective on Addressing Cyber Threats and Opportunities
|
USAA
|
eHealth: Securing Patient Records
|
|
Hacking the Vote?
|
University of Michigan
|
Terrorist Groups in the Online World
|
Mikko Hypponen
,
F-Secure
|
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
|
|
Risk Management Smackdown II: The Wrath of Kuhn
|
|
3 "C" Words You Need to Know: Custody - Control - Cloud
|
|
Biometrics and Access Token Technology, 10 Years Later…
|
|
Mobile Device Security: Is the Enterprise Up for the Challenge?
|
|
The Hidden Risks: Managing Risks in Outsourcing Contract Relationships
|
|
Application Access Control - Taming the Wild West
|
|
CISO View: Top 4 Major Imperatives for Enterprise Defense
|
|
30 Years and 500 Trillion Messages Later – Fixing the Email Plague
|
The FIDO Alliance
|
(ISC)2’s SSO Program – Bringing Cybersecurity Experts to the Classroom
|
|
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
|
Intel Corporation
|
Joining Forces: The Public-Private Imperative in Cybersecurity
|
|
Dormant Malware Attacks - What's Next?
|
|
Never Waste a Crisis --- Necessity Drives Software Security Improvements
|
Adobe Systems, Inc.
|
Earth vs. the Giant Spider: Amazingly True Stories of Real Pen-Tests
|
|
Public-Key Encryption II
|
|
Modern Cyber Gangs: Well-Organized, Well-Protected, and a Smart Adversary
|
SANS Institute
|
Security 2012: A Handbook for Cyber Security
|
FireEye, Inc.
|
Building a Security Operations Center (SOC)
|
Nettitude
|
Can DNS Protect Intellectual Property and Free Speech at the Same Time?
|
Paul Vixie
,
Farsight Security, Inc.
|
Partly Cloudy: Top Security Weathermen Forecast the Cloud
|
|
Advanced (Persistent) Binary Planting
|
Mitja Kolsek
,
ACROS Security
|
From Technology to Psychology: Understanding the Social Psychology of Hackers
|
|
Building Robust Security Solutions Using Layering and Independence
|
National Security Agency
|
Getting to “Like”: Real-world Enterprise Use Cases for Social Applications
|
|
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
|
Jeremiah Grossman
,
SentinelOne
|
Security Best Practices: SSL Certificate Management at TD Bank and MoneyGram
|
|
The Social Web: Business vs. Security - How to Be a Winner
|
|
Message in a Bottle - Finding Hope in a Sea of Security Breach Data
|
Davi Ottenheimer
|
20 in 2012: The Top Privacy Issues to Watch
|
|
Collecting and Sharing Security Metrics - The End of "Security by Obscurity"
|
|
Automated Certificate Lifecycle Management and How it Improved Business Agility and Security: Case Studies at Citi and United Airlines
|
|
Innovation and Technology Transfer in Security: From the Lab to General Use
|
|
How Can a CIO Secure a Moving Target with Limited Resources?
|
Secunia
|
War Stories: The Good, Bad and the Ugly of Application Security Programs
|
|
Trust Framework Model: Origins, FICAM, NSTIC, Missing Link And Evolution
|
|
Large Scale Cloud Forensics
|
Cybereason
|
The Role of Security in Company 2.0
|
Endgame
|
Achieving Operational Excellence in Security
|
|
ChromeOS vs. iCloud - a New Frontier in Security Challenges
|
Kaspersky Lab
|
The CERT Top 10 List for Winning the Battle Against Insider Threats
|
|
Making World Class Cloud Security the Rule, not the Exception
|
|
Base64 - the Security Killer
|
|
Becoming a Change Agent in a World Where Change Never Ends
|
Markel Corporation
|
Lightning Round: Mobile Infrastructure Security: Licensed Spectrum Eavesdropping and GSM Threats
|
Arbor Networks
|
Side Channel Attacks I
|
|
Whose Fault is it that I Didn’t Know it Wasn’t You—an Update
|
|
Compliance, Audits and Fire Drills: In the Way of Real Security?
|
Microsoft Corporation
|
Lightning Round: SAP Application Security
|
Onapsis, Inc.
|
The US Cyber Challenge: National Competitions to Find New Cyber Experts
|
Alex Levinson
,
Rochester Institute of Technology
|
Deploying IPv6 Securely
|
|
Side Channel Attacks III
|
Radboud University Nijmegen
|
Enteprise Access Control Patterns for REST and Web API
|
|
Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers
|
Michael Sutton
|
The First 24: Responding to an Attack within the Critical First Day
|
|
Defending Behind the Device: Mobile Application Risks
|
Chris Wysopal
,
Veracode
|
Secure the Smart Grid from Cyber Attacks to Avoid Putting Us Back 200 Years
|
Steptoe & Johnson LLP
|
Invited Talk II
|
|
The Three Myths of Cyberwar
|
Dave Aitel
,
Immunity, Inc.
|
Top Strategies for Detecting and Combating Advanced Persistent Threats
|
McAfee
|
Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?
|
|
Security Data Deluge- Zions Bank’s Hadoop Based Security Data Warehouse
|
|
Update Your Software or Die
|
Qualys
|
Looking Ahead - The Path to Moving Security into the Cloud
|
Google Inc.
|
The Metric System: Why Meaningful Metrics Matter
|
|
Rising to the Challenge of Vulnerability Management in an IPv6 World
|
|
The Security Professional as Data Steward: Understanding Privacy
|
|
Cryptographic Protocols I
|
|
Separation and Isolation: Towards a Proactive Approach for Information Security
|
|
Midmarket Application Security—Defend like a Fortune 500…or Better
|
|
Doing More with Less: Detailed, Highly Efficient Network Security Policies
|
|
Deconstructing the Breach – Miscreants, Their Malware, Our Response
|
Palo Alto Networks
|
Give Me My Cloud Back: Panel Discussion of Data Privacy Concerns
|
|
International Cyber Crime Arrests through Private/Public Collaboration
|
|
The Art of Breaking and Designing CAPTCHAS
|
Elie Bursztein
,
Google Inc.
|
Lightning Round: Data Confidentiality and Integrity in the Cloud
|
|
Smart Investments: Workforce Development Programs Working for You
|
|
Friending Your Life Away: How Social Networks Cause Long Term Damage to Individuals and Organizations
|
|
New Threats to the Internet Infrastructure
|
Bruce Schneier
,
IBM Security
|
Attacks 2011: How Complexity Evaded Defenses and Strategies for Prevention
|
Tomer Teller
|
Firewall Fail: Live Test of Top Next-Gen Firewall to Expose Its Breaking Points
|
|
Service Organization Controls (SOC) Reports - The 'New' SAS-70s
|
|
SSL Identifiers - Keeping Your Lines of Communication Open and Secure
|
|
PenTesting People: Social Engineering Integration
|
IOActive, Inc
|
Secure Implementation Methods
|
|
Revocation Checking for Digital Certificates: Why Won’t It Work?
|
Sid Stamm
,
Mozilla
|
Invited Talk I
|
|
Legal & Ethical Considerations of Offensive Cyber-Operations?
|
|
Why is Search Engine Poisoning Still the #1 Web Malware Vector?
|
Symantec
|
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
|
|
Strategies for the Eroding Network Perimeter: Defend the Perimeter or Retreat to Higher Ground
|
TELUS
|
SSL and Browsers: The Pillars of Broken Security
|
Qualys
|
Worm: The First Digital World War
|
|
Zero Day: A Non-Fiction View
|
|
Mobile Devices: A Privacy & Security Check-In
|
|
Digital Policy Management: Be Part of the Solution, Not the Problem
|
|
Data Breaches and Web Servers: The Giant Sucking Sound
|
|
Surviving Lulz: Behind the Scenes of LulzSec
|
Matthew Prince
,
CloudFlare
|
Staying Secure in an Agile World
|
|
Identifying and Exploiting Cryptographic Padding Oracles
|
Gotham Digital Science
|
Good Security on a Government Budget? Government CISOs Do More with Less
|
|
Cloud and Control: Any Program on 2000 or 2 Machines
|
|
Evolution of IT Security – Why the Status Quo is Already Extinct
|
The FIDO Alliance
|
What Motivated My Company to Invest in a Secure Development Program?
|
SAFECode
|
How to Create a Software Security Practice
|
Alert Logic
|
The Virtualization Security Landscape: What's Changed?
|
SANS Institute
|
Offensive Countermeasures: Making Attackers' Lives Miserable
|
|
Cracking Open the Phone: An Android Malware Automated Analysis Primer
|
|
Three Ways to Lose Data and One Way to Stop It
|
|
Exploring Converged Access of IT Security and Building Access - Today, Tomorrow and the Future
|
|
Data Loss Prevention: The Evolving Landscape of Mobile Enterprise Threats
|
|
Fraud and Data Exfiltration: Defending Against the Mobile Explosion
|
|
Convergence of BCM and Information Security at Direct Energy
|
|
Breaking News! Up to the Minute Hacking Threats
|
Kaspersky Lab
|
Hot Topics in Information Security Law 2012
|
|
Modern Cyberthreats: The Changing Face Behind the Keyboard
|
|
Firewalls: Security, Access, The Cloud - Past, Present and Future
|
|
Side Channel Attacks II
|
|
BYOD: Securing Mobile Devices You Don’t Own
|
Microsoft Corporation
|
Information Protection in Today's Changing Mobile and Cloud Environments
|
|
Data Breach Laws: Will They Save or Sink You in a Massive Attack?
|
|
Updating the Law on Government Access to User Data in the Cloud
|
Google Inc.
|
Estimating the Likelihood of Cyber Attacks When There’s “Insufficient Data”
|
|
Cyber War: You’re Doing it Wrong!
|
|
Getting Your Session Proposal Accepted
|
|
CISOs Check the Weather: Beyond the Hype of Cloud Security
|
|
Human Hacking Exposed: 6 Preventative Tips That Can Save Your Company
|
|
Job Performance Model for Advanced Threat Responders
|
iSIGHT Partners
|
Public-Key Encryption I
|
|
Grilling Cloudicorns- Mythical Cloudsec Tech You Can Consume Today
|
Rich Mogull
|
Cyber Incidents Centers: Information Sharing
|
Federal Bureau of Investigation
|
The Keys to the Cloud: How Aetna Addresses Certificate and Key Management
|
|
Continuous Monitoring for Federal Agencies: Challenges and Opportunities
|
|
Smartphones: Placing Enterprise Security into the Hands of the Users
|
|
Managing Advanced Security Problems Using Big Data Analytics
|
|
That Doesn't Actually Work: Hard Truths About Cryptographic Innovations
|
|
Crowdsourcing Access Control in the Cloud
|
|
Just Because They’re Authenticated Doesn’t Mean You Should Trust Them
|
|
Tackling the Identity Management Liability Problem
|
|
Adding a Security Assurance Dimension to Supply Chain Practices
|
|
Optimizing Security for Situational Awareness
|
McAfee
|
Is Your Mobile Device Radiating Keys?
|
|
When the Cloud Goes Bust: Data Breaches in the Cloud
|
|
Digital Signatures II
|
|
Code Red to Zbot: 10 Years of Tech, Researchers and Threat Evolution
|
WW Cybersecurity & Data Protection, Microsoft
|
Hacking Exposed: Embedded - The Dark World of Tiny Systems and Big Hacks
|
Cylance
|
eDiscovery and Forensics: Working Together for the Winning Solution
|
|
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats
|
|
iOS Security Internals
|
Dino Dai Zovi
|
From the Bottom to the Top: The Evolution of Application Monitoring
|
|
Symmetric Key Primitives
|
Georgia Institute of Technology
|
Garage Sale Forensics: Data Discovery Through Discarded Devices
|
|
Victimless Malware - How Blackhats Make a Killing Targeting Companies
|
|
Privacy by Design: Baking Privacy into Business and Product Development
|
|
Targeted Exploits & Spear Phishing – Will it be the Demise of Trusted Email?
|
|
Compliance Fatigue: How to Stop Chasing Compliance and Move on to Business
|
|
Hacking’s Gilded Age: How APIs Will Increase Risk and Foment IT Chaos
|
|
Taking Information Security Risk Management Beyond Smoke & Mirrors
|
|
Should I Sue? The Perils of Litigation in the Age of Anonymous
|
|
Cryptographic Protocols II
|
|
Digital Signatures I
|
|
Taking to the Skies: IT Flight Plan for Cloud Security
|
|
PCI Security as a Lifecycle: How to Plan for PCI in 2012 and Beyond
|
|
Cyber Security School Challenge: Information Security Professionals Needed
|
|