RSAeu 2013 Oct. 29, 2013 to Oct. 31, 2013, Europaplein, Amsterdam

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
SAML meets OAuth in the Cloud: A Marriage Made in Heaven Riaz Zolfonoon SAML is widely implemented by enterprises due to its robust security characteristics. Its primary use ...
Entropy, Random Numbers And Keys: What's Good Enough? John Leiseboer This session examines the relationship between entropy, random numbers and cryptographic keys. Currently, FIPS-140 only ...
Leveraging Big Data for Security Operations Josh Goldfarb With the tremendous volume of data collected by large enterprises on a daily basis, specialized ...
How Hackers are Outsmarting Smart TVs and Why it Matters to You Raimund Genes As Smart TVs become more prevalent in waiting rooms and conference rooms, cybercriminals are learning ...
How Large Should Your IR Team Be And Should They Be Dedicated Resources? Dave Baumgartner Many customers we work with have a hard time understanding how large (or small) their ...
Playing the Game of Thrones: ensuring the CISO role at the King’s Table Thom Langford For too long the CISO role has reported everywhere except to the board. This has ...
Rogue Apps & Desktop Malware: A Dangerous Combination For Online Security Maurits Lucas Mobile malware poses an increasing threat to users of online banks and retail. This session ...
Security vs. Privacy – The BIG Fight Carsten Casper , Antonis Patrikios , Neira Jones , David Cripps , J.c. Boggs Never has the tension between security and privacy been more sharply in focus. From news ...
Crafting An Adaptive Mobile Security Posture Vijay Dheap This session will highlight the key areas of focus for designing a mobile security posture. ...
If I Want a Perfect Cyberweapon, I'll Target ERP Alexander mikhailovich Polyakov I'm shocked, really, that this perfect weapon has not been made yet (or we just ...
Overhauling Compliance Frameworks for Software-Defined Data Centers Hemma Prafullchandra , Evelyn Sr. , James Greene Compliance frameworks were built for an era where protection was placed at key entry points ...
Android Malware Exposed - An In-depth Look at its Evolution Grayson Milbourne Explore the rapidly evolving world of Android malware as we shed light on the various ...
Scalable Authentication Rolf Lindemann Computer chip performance has doubled every two years and HDD capacity has scaled even faster. ...
Lessons Learned from a Rigorous Analysis of Two Years of Zero-Day Attacks Marc Dacier What happens when we analyse zero-day attacks from data obtained on 11 million hosts? We ...
Supply Chain Assurance Framework: The Supply Chain Standards Translator Michael De Crespigny The Supply Chain Assurance Framework (SCAF) is an ISF-led initiative including AICPA, ISACA, CSA, IAOP, ...
Is a Secure Agile SDLC Programme a Possibility? Chris Eng , Ryan O’boyle All organisations should incorporate security into their agile development processes; however best-practice models typically assume ...
Preventing Attackers From Using Verifiers: A-Pake With Pk-Ids Sean Parkinson To prevent attackers reading passwords from compromised servers, the passwords can be transformed into verifiers. ...
Defending Against Low-Bandwidth, Asymmetric Denial of Service Attacks David Holmes Data centers are hardening against simple attacks like SYN-floods. This is causing attackers to switch ...
The Era of Destructive Cyber Attacks - are you prepared? Erik De Jong , Frank Incognito Learn about common mistakes that organisations make during cyber crises. We'll cover the crucial points ...
iOS App Analysis Mike Price How can iOS apps be analysed in order to identify security and privacy-related issues? This ...
Cryptography as a Service Peter Robinson Deploying cryptographic keys on vulnerable VMs in the Cloud is risky. Similar risks exist when ...
Is Identity The New Money? Neira Jones TCH announced the development with its 22 member banks of an industry wide dynamic credentialing ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control Joshua Corman , David Etue Cloud, virtualization and mobility have changed how IT assets are owned and operated. Rather than ...
Alternatives and Enhancements to CAs for a Secure Web Ben Laurie , Benjamin Wilson Certification Authority (CA) breaches in 2011 created renewed interest in patching the vulnerabilities of TLS. ...
Understanding and Fighting Evasive Malware Christopher Kruegel Sandboxes have become popular tools to analyse and detect malware. Not surprisingly, malware authors have ...
Future Gazing: What Will 'Security' Be Like In The Year 2020? Rik Ferguson The group will debate whether future electronic and connected consumer devices will leave us more ...
Why Does Database Patching Require A PhD? Amichai Shulman , Michael Cherny Over the years there is a tendency among some database vendors to avoid disclosure of ...
Evolving from Breach Prevention to Breach Acceptance to Securing the Breach Jason Hart Data breaches are prevalent. CIOs must accept their company will be breached and shift their ...
Nailing Cloud Security With Pre-Cloud Security Thinking? Joerg Fritsch Current cloud security guidelines are largely a remake of their pre-cloud ancestors. There’s a tension ...
Why Can’t You Get What I’m Saying? Penetrating the Mental Firewall David Porter We all need to communicate with decision makers to gain their approval. But it’s hard ...
Mine Is Bigger: When Cybercriminals Compare Tools Etay Maor , Uri Rivner Cybercriminals use a growing arsenal of weapons to steal data, remotely control devices and circumvent ...
Breach-Aholic Anonymous – What Can We Learn From Data Breaches? Javvad Malik , Brian Honan , Dwayne Melançon , Quentyn Taylor Currently, there is no universal EU law to mandate firms within the European Union to ...
Turning The Table Through Federated Information Sharing Kathleen Moriarty , Patrick Curry Amongst all the hype, your organisation has to collaborate to compete, reduce risks, and costs. ...
Concurrent Behaviour Analysis: Resilient Indicators of Emergent Exploits Dennis Moreau With emergent exploits (0-days), static indicators are of increasingly limited utility, due to the dynamics ...
Cyber Intelligence Collaboration Greg Day For years it’s been taboo to talk about cyber incidents for fear of impacting brand. ...
Good Guys vs. Bad Guys. Using Big Data to Counteract Advanced Threats Joseph Goldberg Advanced threats skilfully use social engineering and custom malware get into an organisation and move ...
Security Implications of NFC in Authentication and Identity Management Dmitry Barinov , Hugh Cumming Two-factor authentication (2FA) requirements are well defined. But the standard approach requiring distribution of factors ...
Security Culture: Figuring Out How Bad Your Company Really Is Ira Winkler The most talented security practitioners will fail if their organisations have a weak security culture. ...
Who Can Ensure Talent for the Future? John A. Colley As the skills gap in information security gains attention, many see the need for new ...
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns Ever since the term 'HTML5' came into the world, an immediate perception of insecurity trailed ...
Considering Cloud? Learn About Current Trends In Cloud Computing Jeff Jones , Frank Simorjay Sr. Considering cloud? Cloud computing can help organisations of all sizes. Learn about current trends in ...
10 IT Trends Influencing the Information Security Profession Marc Vael The world evolves rapidly – as does technology. This session will provide a glimpse of ...
Breaking The Kill Chain - An Early Warning System For Advanced Threat Rashmi Knowles The Kill Chain allows us to learn about adversaries. In an introduction to common warfare ...
Securing BYOD: Mitigating Risk, Not Forcing Control! Giri Sreenivas 80% of companies are already experiencing the “Bring Your Own Device” trend (BYOD). Yet less ...
Security Debt and the Rule of 72 Martin Mckeay Businesses have been under spending on security for decades. What will it take (and cost) ...
When Worlds Collide - Harmonising Governance Between Security And Privacy Rita Di Antonio , Gabriela Krader , Jyn Schultze-melling , Toby Stevens Enterprises are realising that a robust governance, risk management and compliance function is not a ...
Hacking Back as a Law Enforcement Role Ronald Prins , Bart Jacobs , Peter Zinn , Troels Oerting Hacking back as a law enforcement role is much debated topic. The Netherlands is the ...
Security Awareness Fails. What Now For The Human Firewall? Andrew Rose The statistics are clear, security exploits are often invited into the organisation by unsuspecting staff. ...
Degrees of Freedom: Rethinking Security Hugh Thompson In statistics, a degree of freedom is a variable in an equation that can change ...
Data-Driven Security - Where's the Data? Wolfgang Kandek Data drives decisions for business leaders on a daily basis - whether it’s for routine ...
Security at the Greatest Show on Earth Mark Hughes When the world’s media turned its spotlight on the UK for the London Olympic and ...
Survival Isn’t Mandatory: Challenges and Opportunities of DevOps Joshua Corman DevOps (development + operations) is a game-changer and may be the end of security as ...
Top Ten Proactive Software Controls James Manico In the past, application security professionals thought firewalls, SSL, patching, and privacy policies were enough. ...
Using Big Intelligence to Defend against Modern Attacks Sian John There isn’t a magic bullet that can completely prevent attack or stop Advanced Persistent Threats. ...
Social Media Deception Aamir Lakhani , Joseph Muniz Emily Williams does not exist. She is not a real person, yet she was able ...
Comparative Study: Iran, Russia & PRC Cyber War William Hagestad International governments including the Islamic Republic of Iran, the Russian Federation and the People’s Republic ...
Old Vulnerabilities In New Protocols? Headaches About IPv6 Fragments Eric Vyncke There is no doubt anymore: IPv6 is more and more deployed and is here to ...
Raising Awareness of Information Security Through Human Analogies Bruce Hallas Knowledge, information and data have been central to the course of humanity. Since man first ...
Case Study: Bankia Reaching the Highest Maturity Levels Vicente Aceituno Canal Learn how ISMS of Bankia, a major financial institution from Spain, increased value and security ...
Citizen Centric E-Identity Ecosystems and The Internet of Things Rachel Oconnell - See more at: http://www.rsaconference.com/events/eu13/agenda/sessions/909/citizen-centric-e-identity-ecosystems-and-the#sthash.LI34jTNb.dpuf
Big Data’ for Security Purposes – How to Be Effective Joseph Goldberg The latest buzz phrase for information security is ‘Big Data’. This session will demonstrate how ...
Managing Daily Security Operations with Lean and Kanban Branden R. Williams For years we have heard about the fantastic promises of lean production; but what can ...
Can There be Accetable Compromise? Greg Day Breaches occur every day. So what is an ‘acceptable’ breach? And, if we can accept ...
Thousands Of Apps Can't Be Wrong: Mobile Application Analysis At Scale Samskriti King Are mobile apps sending data to other countries? Which apps actually track my location and ...
Ideas to Make Security & Risk a Team Sport, Engaging the Business & IT Dave Martin Securing our environments has traditionally been the responsibility of dedicated teams and while those teams ...
Bug Parades, Zombies, and the BSIMM: A Decade of Software Security Gary Mcgraw Software security has come a long way in the last decade, moving from the original ...
Trending Now: Privacy and Cyber Security Policy in the U.S. and E.U. Pulina Whitaker This group will discuss legislation, regulation and public policy impacting privacy and cybersecurity in both ...
Cyber Security Information Exchange Luc Dandurand In this session we will explore the high-level requirements of a Cyber Security Data Exchange ...
Did You Read The News? Http Request Hijacking Adi Sharabani , Yair Amit Imagine a world in which what you believe is true has been meddled with by ...
Automating the 20 Critical Security Controls Wolfgang Kandek The CSIS 20 critical controls are known for driving effective security programmes across government agencies, ...
My Personality - Your Security Problem! Kai Roer Learn all about personality types and how they impact your security efforts. You will be ...
A New Paradigm for Defending Against Targeted Attacks Stephen Trilling How do you stop a state-sponsored attacker who has unlimited resources from compromising your enterprise’s ...
A New Era of Operational Security in Online Services Mike Reavey Worldwide growth in the volume of people, devices and data connected to the internet is ... IncludeThinkstScapes
Microsoft Security Intelligence Report Jeff Jones , Timothy Rains Using the latest data from hundreds of millions of systems around the world and some ...
Information Stewardship: Avoiding Data Breaches and Managing Big Data Mike Small Information security is an increasing problem because of the volume, velocity and variety associated with ...
To Share or Not to Share, Or Is It An Obligation? Alan Stockey With cyber situational awareness and intelligence sharing on every national agenda, where are private sector ...
Dissecting Banking Trojan Carberp Jaromir Horejsi , Peter Kalnai This presentation provides results of work at Avast Virus Lab on the banking Trojan Carberp. ...
You’re Not Your iPhone – or Are You? Robert w. Griffin , Robin Wilton Most of us are inseparable from our mobile devices. Shouldn’t we just accept that fact ...
Cut Through the Hype to Expose the Truth About Advanced Persistent Threats Costin Raiu , Rick Holland , Jaap Van , Jaime Blasco , Neil Thacker The Advanced Persistent Threat (APT) remains one of the most controversial topics in information security. ...
Battle Scars And Friendly Fire: War Stories from a Threat Research Team Will Gragido , Seth Geftic Building a threat research team and making that team an effective part of your organisation ...
Big Data Transforms Security Amit Yoran , Art Coviello Welcome to a universe of Big Data, the next wave in Information Technology. One of ...