Identifying Healthcare Cybersecurity Challenges and Reference Designs
|
National Cybersecurity FFRDC, National Cybersecurity Center of Excellence
|
(CANCELLED)...This Is Your Enterprise on O365 (repeat)
|
Federal Communications Commission
|
Building the Cybersecurity Innovation Pipeline
|
McAfee
|
Balancing Public Good and Personal Privacy—Challenges in De-Identifying Open Datasets
|
Geotab
|
Foundations for a Strong Threat Intelligence Program
|
|
Charting a Clear Course: Prioritizing Security Investments and Activities
|
|
Crypto Collecting
|
Coventry Computer
|
Abstractions of Security: Mining a Decade of RSA Conference Abstracts
|
|
DARPA R&D Enabling US Cyber-Deterrence
|
DARPA
|
Mobile Payment Security—Risk and Response
|
|
The Cybersecurity Job Seekers Report: Results and Implications
|
|
Industrial IoT Exploits behind Insecure Cities and Rogue Robots
|
Trend Micro, Inc.
|
Creating Order from Chaos: Metrics That Matter (repeat)
|
|
Is Malware the New Weapon of Mass Destruction?
|
ESET
|
Nation-State Espionage: Hunting Multi-Platform APTs on a Global Scale
|
Eva Galperin
,
Electronic Frontier Foundation
|
Super Forecasting: Even You Can Perform High-Precision Risk Assessments
|
|
Navigating the Data Labeling Bottleneck as Security Embraces AI
|
Philip Tully
,
ZeroFOX
|
Inside Cloudbleed
|
Cloudflare
|
Finding Needles in a Haystack: Effective Indicators of Insider Threat
|
Microsoft Corporation
|
The Trump Administration & Congress: Decrypting the Cybersecurity Agenda
|
|
Strategies to Finding and Building Your Robust Workforce
|
|
Cybersecurity Impact on Mental Health: Managing Stress, Building Resilience
|
Foundation Physicians Medical Group, Inc.
|
Web Application Testing—Approach and Cheating to Win
|
|
Marketing in the Security Industry
|
Cybereason
|
Fear and Cyber in an Agile Defined World (BT)
|
|
SANS: Critical Security Controls: Planning, Implementing and Auditing
|
Enclave Security
|
Knowledge Assets, Their Defense and Regulation—Making Them Work for You
|
|
Tech Scams: It’s Time to Release the Hounds
|
Microsoft Corporation
|
The New Landscape of Airborne Cyberattacks
|
Ben Seri
,
Armis
|
Playing Games in the Sandbox—Dynamic Analysis and Modern Evasion Tactics
|
Sophos
,
Dynamic Protection, SophosLabs
|
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
|
Giovanni Vigna
,
Lastline, Inc.
|
Implementing Biometrics in a Bank: How to Design the Best User Experience?
|
Sberbank
|
ICS in the Cloud
|
|
CSA: Two Day CCSK v4 Plus Hands-On Course
|
Rich Mogull
|
Shaping the Future of Security: Lessons from Today
|
General Services Administration
|
Security Automation Simplified via NIST OSCAL: We’re Not in Kansas Anymore
|
|
Cybersecurity Silver Linings
|
RSA
|
Compromising a Fortune 500 Business without Hacking a Thing!
|
|
SOC Statistics and Metrics that Matter
|
|
Threat Models: Into the Deep!
|
Advanced Threat Research, McAfee
|
Remarks by the Honorable Kirstjen Nielsen, Secretary of the Department of Homeland Security
|
U.S. Department of Homeland Security
|
Enabling and Protecting Our Digital Future (DarkMatter)
|
|
Security in Connected/Autonomous Car Fleets
|
GuardKnox Cyber Technologies
|
Quantum Computing Is Here, Powered by Open Source
|
Konstantinos Karagiannis
,
BT Americas
|
Integrating Security with DevOps Toolchains
|
|
RSAC CyberSmart Parents Education Seminar: “Keeping Your Family Safe Online”
|
|
The Dark Web and How It Affects Your Industry
|
Deloitte
|
Applying Cyber-Intelligence
|
Carnegie Mellon University, Software Engineering Institute
|
Secrets of the Encrypted Internet—Worldwide Cryptographic Statistics
|
|
Pulling Our SOCs Up
|
Vodafone Group plc
|
Wanted: Better Cybersecurity Job Descriptions. Apply Within.
|
|
Tech Debt and What to Do about It
|
|
Identifying threats outside the firewall with machine learning (ZeroFOX)
|
|
Perspectives from Government Leaders on Managing Global Partnerships
|
|
How the Best Hackers Learn Their Craft
|
ForAllSecure
|
Shifting Organizational Culture through Cyber-Awareness
|
Global Security Strategy and Awareness, United Airlines
|
Application Security—This Is the Future That SaaS Companies Want
|
|
The Untold Story of 8200: A Launching Point for Women in Cybersecurity
|
|
Cybersecurity and Data Breaches from a Business Lawyer’s Perspective
|
Kathy Delaney Winger
|
Do Not Prepare for a Data Breach—On Second Thought, Prepare!
|
|
Dungeons and Data, Let’s Role Play an Incident
|
Elastic
|
Closing the US Cyber-Skills Gap by Identifying and Motivating the Next Generation of Cyber-Experts
|
SANS Institute
|
Effective Leadership Skills
|
|
Quantitative Information Security Risk Management
|
|
When in Russia: Hacking Vice Abroad
|
Patrick Wardle
,
Digita Security
|
How-to for Innovators and Entrepreneurs
|
Cybereason
|
Behind the Scenes of Cyber-Incident: APT Corp. Communications Case Study
|
Kaspersky Lab
|
RSAC College Day Workforce 2020 – Exploring Infosec Careers
|
|
OPERATION: Dateline
|
McAfee
|
GDPR and You: Common Sense Approach to Privacy
|
GDPR Pros, LLC
|
IAPP: Security's Role in GDPR Compliance
|
|
Internet of Wild Things—A Mock Trial
|
|
DevOps Connect: DevSecOps
|
|
Building a Data-Driven Security Strategy
|
Verizon
|
SANS: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
|
SANS Institute
|
Keeping Up with Generation App: New Approaches for Cybersafety and Communicating with Kids
|
|
SANS Core NetWars Experience 4
|
|
Privacy as a Stakeholder: How to Get a Seat at the Table
|
Booz Allen Hamilton
|
Securing the IoT Connected Car with Digital Identity
|
ForgeRock
|
Turning DNS from Security Target into Security Tool
|
Infoblox
|
Charting a Clear Course: Prioritizing Security Investments and Activities (overflow)
|
|
10 Tenets of CISO Success
|
ThinkSec
|
Hacking Healthcare Live: Bits and Bytes Meet Flesh and Blood
|
University of California Davis
|
...This Is Your Enterprise on O365
|
Federal Communications Commission
|
There’s No Such Thing as a Cyber-Risk
|
|
Google and Microsoft Debut: Replacing Passwords with FIDO2 Authentication
|
Google Inc.
|
The NIST Cybersecurity Framework: What’s Next!
|
|
CSA Summit: Cloud 2018: Enterprise Grade Security
|
|
Evaluating AI- and ML-Based Security Products
|
|
Privileged Attack Vectors: Developing a Strategy to Protect your Business (BeyondTrust)
|
|
The Emerging Product Security Leader Discipline
|
|
Bug Bounty Buzzword Bingo—Deep Dive under a Jumped Shark
|
Katie Moussouris
,
Luta Security, Inc.
|
IDPro: How a Professional Organization Will Change the Future of Identity
|
Optiv
|
Exfiltrating Data through IoT
|
|
The Cryptographers’ Panel
|
Adi Shamir
|
AI Deception: Fooling (Artificial) Intelligence Is Easier than You Think
|
Itsik Mantin
,
Imperva
|
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
|
Fortinet, Inc.
|
Cebolla Chan 3.0: A Window into the Chaotic Spanish-Language Underground
|
Flashpoint
|
Corpsec: “What Happened to Corpses A and B?”
|
Duo Security
|
Big Little Lies—Truth on the New EU Regulations for ID and Data Protection
|
D-Trust GmbH
|
Into the Web of Profit: Tracking the Proceeds of Cybercrime
|
University of Surrey
|
Surviving Contact: Keeping Your CEO Employed and Your Business in Business
|
|
Cybersecurity and Mental Health
|
Foundation Physicians Medical Group, Inc.
|
Predicting Exploitability—Forecasts for Vulnerability Management
|
Kenna Security
|
The Price of Cyber-Warfare
|
Microsoft Corporation
|
Securing Innovation: Shifting the Conversation from Fear to Possibility
|
|
Google on BeyondCorp: Empowering Employees with Security for the Cloud Era
|
|
AI and Cybersecurity - Applications of Artificial Intelligence in Security. Understanding and Defending Against Adversarial AI.
|
IBM Research
|
The Emergent Cloud Security Toolchain for CI/CD
|
Signal Sciences Corp.
|
Defeating Insider Threats to Critical Infrastructure
|
|
Fighting Malware with Graph Analytics: An End-to-End Case Study
|
Infoblox
|
Gamification: Emerging Regulation (aka “Make Money and Avoid Jail”)
|
|
Enhance Virtualization Stack with Intel CET and MPX
|
Xiaoning Li
|
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Management
|
|
Blurred Lines: Hybrid Threats Posed by State-Sponsored Hackers
|
|
Age of the Machines in Cyber—Machine Learning and AI, the Next Frontier
|
|
Foundations of Bitcoin, Blockchain and Smart Contracts
|
|
How Secure Is the Hyper-Connected Car?
|
|
Hot Topics In Cyber-Law 2018
|
|
ISACA: CISM 2-Day Cram to the Max Course
|
BAC
|
Economics of Security - Incentives, Behaviors, and more
|
|
The Future of Security for SecOps and NetOps (Gigamon)
|
|
A Framework to Effectively Develop Insider Threat Controls
|
|
The Sad Tale of Etaoin ShrdLu and the Danger of Automated Pen Tests
|
Cybersecurity
|
Efficacy of Layered Application Security through the Lens of Hacker
|
|
RSAC Innovation Sandbox Contest
|
|
How Cloud, Mobility and Shifting App Architectures Will Transform Security
|
Security Products, VMware
|
Learning from the Three-Ring Circus of NotPetya
|
Booz Allen Hamilton
|
POTUS Is Posting: Social Media and National Security
|
Kenneth Geers
,
Comodo Group
|
Automotive, Aviation and Mobility Cybersecurity
|
|
The Life and Times of Cybersecurity Professionals
|
|
How Open Source Components Increase Speed and Risk (Veracode)
|
|
The Promise of IoT Best Practices, Testing and Hazards of Inaction
|
Terrell McSweeny
,
Federal Trade Commission
|
GDPR Essentials
|
University of Washington
|
“The System...Is People!” Designing Effective Security UX
|
Duo Security
|
SOC 2030—SOCs Are Broken. Let’s Fix Them.
|
Palo Alto Networks
|
Exploring the Real-World Application Security Top 10
|
DevSecOps, Intuit
|
Identify Theft through OSINT
|
|
The Incident Response Class of 2018: Tactics and Tales from the Frontline
|
|
Debunking Myths for Cyber-Insurance
|
|
Infosec 101 for ICOs: How the Most “Secure” Transaction Protocol Failed
|
Herjavec Group Inc.
|
STIX Patterning: Viva la Revolución!
|
IBM Security
|
Open Source in Security-Critical Environments (repeat)
|
|
(ISC)2 CCSP® Cloud Security Professional Two Day Crash Course
|
|
Hype or Myth: Smart Home Security
|
ESET
|
Security Foundations
|
Fastly
|
Former NSA and Israeli Intelligence Directors on Resilience
|
|
From SIEM to SOC: Crossing the Cybersecurity Chasm
|
Proficio
|
Investigative Journalists Speak Out
|
|
Meeting Business Needs by Filling the Cybersecurity Skills Gap
|
|
Spectre Attacks: Exploiting Speculative Execution
|
Paul Kocher
|
Show Me the Money: Making the Cost-Benefit Pitch That Prevails (repeat)
|
Morrison Consulting
|
Improving Mobile Authentication for Public Safety and First Responders
|
NIST/NCCoE
|
Opening
|
RSA
|
Cyberwar Game: Behind Closed Doors with the National Security Council
|
|
RSAC Dimension of Diversity—Opportunity to Co-create
|
|
Working with Board Committees and the C-suite
|
CyberVista
|
DevOps and the Future of Enterprise Security
|
ThinkSec
|
Google and Microsoft Debut: Replacing Passwords with FIDO2 Authentication (overflow)
|
Google Inc.
|
Why Did We Make Security So Hard?
|
|
IoT and Critical Infrastructures: A Collision of Fundamentals?
|
|
What’s the holdup: Debunking Cloud Cybersecurity Misconceptions (iboss)
|
|
ISACA: CSX Cybersecurity Fundamentals
|
|
SANS: Lethal Windows Forensic Analysis
|
SANS Institute
|
Next Big Blockchain Applications
|
Linux Foundation
|
Industrial Cyberattacks: A Quest for Nuance with Lessons from the Field
|
Robert Lee
,
Dragos, Inc.
|
Ransomware and Destructive Attacks
|
|
ChaoSlingr: Introducing Security-Based Chaos Testing
|
UnitedHealth Group
|
Trust and the Economics of Insecurity.
|
Cylance
|
Business Executive Fundamentals: How to Beat the MBAs at Their Own Game
|
CyberVista
|
Building Capacity in Global Incident Response
|
|
Efficacy of Layered Application Security through the Lens of Hacker (repeat)
|
|
Securing Diversity
|
Palo Alto Networks
|
Privacy Essentials for Security Professionals
|
CISO Spotlight, LLC
|
(ISC)2 CISSP® Two Day Crash Course
|
Battelle Memorial Institute
|
The GDPR Is Only for Europe—Right?
|
|
Learning from the Three-Ring Circus of NotPetya (repeat)
|
Booz Allen Hamilton
|
“No You May Not Have a Pony”—The Art of the Possible in Secure IAM Design
|
|
Online Trust: Do Execs, Consumers & Security Pros Define It Differently? (CA Technologies)
|
|
Risk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank
|
Sberbank
|
The Top Nine Factors for Effective Data Protection Controls
|
Verizon
|
Millennials in Cybersecurity
|
|
Turtles, Trust and the Future of Cybersecurity (Varonis Systems)
|
|
Evolution of AI Bots for Real-Time Adaptive Security
|
|
Cybersecurity Capability Readiness: Necessary Conversations, Next Steps
|
|
How Govt and Private Industry Can Work Together to Strengthen Human and Device Identity Management
|
General Electric
|
Strategic Cyber-Actions and How They Could Affect Your Company
|
|
Dos and Don'ts of DevSecOps
|
Carnegie Mellon University
|
Trust as a Service—Beyond the Blockchain Hype (Verizon)
|
|
A General Introduction to Modern Cryptography
|
Microsoft Corporation
|
Hello, Moscow. Greetings, Beijing. Addressing Risk in Your IT Supply Chain
|
General Services Administration
|
Secure the Digital Transformation without Breaking the Bank (One Identity)
|
|
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
|
Cruise Automation
|
From IT to IoT: Bridging the Growing Cybersecurity Divide
|
AT&T
|
Measuring and Modeling Human Trafficking: A Data-Driven Approach
|
North Carolina State University
|
GPS Spoofing: No Longer a Fish Story
|
APERIO Systems
|