Star 0

Talks

Title Humans
A “Cyber Secure” Nation Global Security Solutions, Telstra
Welcome Reception
Mapping APEC to the GDPR OneTrust
Cybersecurity Silver Linings RSA
Now Matters: Of Data Governance, Cybersecurity, and Regulation
Opening
How to Effectively Share Information among Competitors
Security Operations 2018: What Is Working? What Is Not. Palo Alto Networks
Building a Cloud Platform Hardware Root of Trust Using Titan Google Inc.
IoT Ransomware—We Ain’t Seen Nothing Yet (or Have We?) Thomas Keenan , University of Calgary
Journey of Securing Medical Devices Philips
From 123456 on a Staging to a Multimillion Dollar VC Owned in ~200 Days Bugsbounty.com
Data Integrity: The Elephant Threat in the Room (Ask the Expert Roundtable) Microsoft Corporation
Transparent Orchestration: The Visibility to Act Qualys
Securing IoTs in the Age of Smart Cities Singapore Management University
Unify DevOps and SecOps: Security without Friction Layered Insight
Hacking the Blockchain Industry Projects Group-IB
GDPR: A Global View
Mining Botnets Reemerge, Bringing Shifts into the Threat Landscape Trend Micro, Inc.
Security Maturity Drives Growth and Innovation DXC Technology
Cloud CTF: Identifying and Resolving Attacks in Azure Microsoft Corporation
Beyond Traditional Password Authentication: PKI and Blockchain
White Hats' and Cybercriminals’ New Tool: Artificial Intelligence IBM Security
Privacy for Security Professionals Symantec
Blockchains: Ushering in a New Age? Symantec
The Global Impact and Lessons Learned from WannaCry and NotPetya
Autotuning Cyber: Finding the Threat Signal in the Data Noise Microsoft Corporation
How Threat Intelligence Sharing and Automation Wins the War against Attackers ServiceNow
Cyberthreat Intelligence: A People, Process and Technology Perspective (Ask the Expert Roundtable)
The CISO—in a Box PwC
Outside the Box – Redefining the Workforce to Defeat the Cyber Adversary Australian Government Department of Human Services
Android Malware Trends on a Global Scale
Cyberthreat Intelligence: A People, Process and Technology Perspective
Operationalised Risk Modeling Using the Data Breach Repository Verizon
Next Generation Cloud Security
From Ransomware to Coin Mining: An Evolution in the 2018 Threat Landscape Symantec
Eliminating Passwords from Legacy Web Applications StrongKey
Analysis of Cobalt Attacks on Financial Institutions: SWIFT, Processing, ATMs Group-IB
How a Diverse Underground Ecosystem Creates Resilience in the Dark Web Recorded Future
Asia Interregional Collaboration for Critical Infrastructure Protection
M&A Risk in the Digital Ecosystem
The Hugh Thompson Show: Artificial Intelligence APJ Style
iOS Trustjacking: Trust Has a Price Roy Iarchy , Modern OS, Symantec
Appropriate Information Security Risk Management for Today and the Future Discover Financial Services
What The GDPR Means For The Asia Pacific Region CS
Serverless Infections: Malware Just Found a New Home Maty Siman , Checkmarx
Incident Response—Capability and Compliance Edith Cowan University
RSAC Women’s Networking Reception
1984 Redux: China’s Social Credit System a Harbinger of the Future?
Building a Cloud Platform Hardware Root of Trust Using Titan (Ask the Expert Roundtable) Google Inc.
DevOps Connect: DevSecOps Day
Harnessing the Law of Data Gravity: Cyber-Defence for the Hybrid Cloud Microsoft Corporation
Exploit Kits and Malware ROI
We Are All Equifax: Lessons (Not Learned)
How to Effectively Share Information among Competitors (Ask the Expert Roundtable)
Using APKLAB.IO Mobile Threat Intel Platform to Fight Banking Threats
The Impact of Autonomous Security in Today’s Threat Landscape Oracle Corporation
Critical Control Systems—The Hidden World at Risk
Truth or Snare? Understand and Combat Cyber-Propaganda and Fake News Lion Gu , Trend Micro, Inc.
Safeguarding the Digital Frontier RSA
Securing Your Cloud Estate with the CIS Critical Security Controls Microsoft Corporation
40,001 Attacks: How We Got through the Trump-Kim Summit and What’s Next Acronis
Our Biggest Bet Yet IBM Security
Promoting International Peace and Stability in Cyberspace
My First 12 Months as CISO: Lessons Learned CBRE
Evolving Your Security Operation to Keep Pace with Digital Risk NetWitness Platform, RSA, Inc
Endpoint vs. Cloud: Forensicating Cyberthreats in Two Parallel Worlds!
Harmonizing Regulators Globally FS-ISAC
Ransomware: Robbed with a Rubber Knife Carbon Black
Global Cyber Alliance (GCA) Smart Cities IoT Roundtable
The Blurred Lines between Cybercrime and Statecraft CrowdStrike, Inc.
Data Integrity: The Elephant Threat in the Room Microsoft Corporation
A Real-World Example of Using Network Behaviour to Detect Cyber-Compromise
When Web Code Developers Decide to Go Phishing IBM Security
The Age of AI and Algorithms: Legal, Regulatory and Policy Issues SAARC , Autodesk India Private Limited