RSAeu 2013 Oct. 29, 2013 to Oct. 31, 2013, Europaplein, Amsterdam
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
SAML meets OAuth in the Cloud: A Marriage Made in Heaven | Riaz Zolfonoon | SAML is widely implemented by enterprises due to its robust security characteristics. Its primary use ... | |
Entropy, Random Numbers And Keys: What's Good Enough? | John Leiseboer | This session examines the relationship between entropy, random numbers and cryptographic keys. Currently, FIPS-140 only ... | |
Leveraging Big Data for Security Operations | Josh Goldfarb | With the tremendous volume of data collected by large enterprises on a daily basis, specialized ... | |
How Hackers are Outsmarting Smart TVs and Why it Matters to You | Raimund Genes | As Smart TVs become more prevalent in waiting rooms and conference rooms, cybercriminals are learning ... | |
How Large Should Your IR Team Be And Should They Be Dedicated Resources? | Dave Baumgartner | Many customers we work with have a hard time understanding how large (or small) their ... | |
Playing the Game of Thrones: ensuring the CISO role at the King’s Table | Thom Langford | For too long the CISO role has reported everywhere except to the board. This has ... | |
Rogue Apps & Desktop Malware: A Dangerous Combination For Online Security | Maurits Lucas | Mobile malware poses an increasing threat to users of online banks and retail. This session ... | |
Security vs. Privacy – The BIG Fight | Carsten Casper , Antonis Patrikios , Neira Jones , David Cripps , J.c. Boggs | Never has the tension between security and privacy been more sharply in focus. From news ... | |
Crafting An Adaptive Mobile Security Posture | Vijay Dheap | This session will highlight the key areas of focus for designing a mobile security posture. ... | |
If I Want a Perfect Cyberweapon, I'll Target ERP | Alexander mikhailovich Polyakov | I'm shocked, really, that this perfect weapon has not been made yet (or we just ... | |
Overhauling Compliance Frameworks for Software-Defined Data Centers | Hemma Prafullchandra , Evelyn Sr. , James Greene | Compliance frameworks were built for an era where protection was placed at key entry points ... | |
Android Malware Exposed - An In-depth Look at its Evolution | Grayson Milbourne | Explore the rapidly evolving world of Android malware as we shed light on the various ... | |
Scalable Authentication | Rolf Lindemann | Computer chip performance has doubled every two years and HDD capacity has scaled even faster. ... | |
Lessons Learned from a Rigorous Analysis of Two Years of Zero-Day Attacks | Marc Dacier | What happens when we analyse zero-day attacks from data obtained on 11 million hosts? We ... | |
Supply Chain Assurance Framework: The Supply Chain Standards Translator | Michael De Crespigny | The Supply Chain Assurance Framework (SCAF) is an ISF-led initiative including AICPA, ISACA, CSA, IAOP, ... | |
Is a Secure Agile SDLC Programme a Possibility? | Chris Eng , Ryan O’boyle | All organisations should incorporate security into their agile development processes; however best-practice models typically assume ... | |
Preventing Attackers From Using Verifiers: A-Pake With Pk-Ids | Sean Parkinson | To prevent attackers reading passwords from compromised servers, the passwords can be transformed into verifiers. ... | |
Defending Against Low-Bandwidth, Asymmetric Denial of Service Attacks | David Holmes | Data centers are hardening against simple attacks like SYN-floods. This is causing attackers to switch ... | |
The Era of Destructive Cyber Attacks - are you prepared? | Erik De Jong , Frank Incognito | Learn about common mistakes that organisations make during cyber crises. We'll cover the crucial points ... | |
iOS App Analysis | Mike Price | How can iOS apps be analysed in order to identify security and privacy-related issues? This ... | |
Cryptography as a Service | Peter Robinson | Deploying cryptographic keys on vulnerable VMs in the Cloud is risky. Similar risks exist when ... | |
Is Identity The New Money? | Neira Jones | TCH announced the development with its 22 member banks of an industry wide dynamic credentialing ... | |
Control Quotient: Adaptive Strategies For Gracefully Losing Control | Joshua Corman , David Etue | Cloud, virtualization and mobility have changed how IT assets are owned and operated. Rather than ... | |
Alternatives and Enhancements to CAs for a Secure Web | Ben Laurie , Benjamin Wilson | Certification Authority (CA) breaches in 2011 created renewed interest in patching the vulnerabilities of TLS. ... | |
Understanding and Fighting Evasive Malware | Christopher Kruegel | Sandboxes have become popular tools to analyse and detect malware. Not surprisingly, malware authors have ... | |
Future Gazing: What Will 'Security' Be Like In The Year 2020? | Rik Ferguson | The group will debate whether future electronic and connected consumer devices will leave us more ... | |
Why Does Database Patching Require A PhD? | Amichai Shulman , Michael Cherny | Over the years there is a tendency among some database vendors to avoid disclosure of ... | |
Evolving from Breach Prevention to Breach Acceptance to Securing the Breach | Jason Hart | Data breaches are prevalent. CIOs must accept their company will be breached and shift their ... | |
Nailing Cloud Security With Pre-Cloud Security Thinking? | Joerg Fritsch | Current cloud security guidelines are largely a remake of their pre-cloud ancestors. There’s a tension ... | |
Why Can’t You Get What I’m Saying? Penetrating the Mental Firewall | David Porter | We all need to communicate with decision makers to gain their approval. But it’s hard ... | |
Mine Is Bigger: When Cybercriminals Compare Tools | Etay Maor , Uri Rivner | Cybercriminals use a growing arsenal of weapons to steal data, remotely control devices and circumvent ... | |
Breach-Aholic Anonymous – What Can We Learn From Data Breaches? | Javvad Malik , Brian Honan , Dwayne Melançon , Quentyn Taylor | Currently, there is no universal EU law to mandate firms within the European Union to ... | |
Turning The Table Through Federated Information Sharing | Kathleen Moriarty , Patrick Curry | Amongst all the hype, your organisation has to collaborate to compete, reduce risks, and costs. ... | |
Concurrent Behaviour Analysis: Resilient Indicators of Emergent Exploits | Dennis Moreau | With emergent exploits (0-days), static indicators are of increasingly limited utility, due to the dynamics ... | |
Cyber Intelligence Collaboration | Greg Day | For years it’s been taboo to talk about cyber incidents for fear of impacting brand. ... | |
Good Guys vs. Bad Guys. Using Big Data to Counteract Advanced Threats | Joseph Goldberg | Advanced threats skilfully use social engineering and custom malware get into an organisation and move ... | |
Security Implications of NFC in Authentication and Identity Management | Dmitry Barinov , Hugh Cumming | Two-factor authentication (2FA) requirements are well defined. But the standard approach requiring distribution of factors ... | |
Security Culture: Figuring Out How Bad Your Company Really Is | Ira Winkler | The most talented security practitioners will fail if their organisations have a weak security culture. ... | |
Who Can Ensure Talent for the Future? | John A. Colley | As the skills gap in information security gains attention, many see the need for new ... | |
Relax Everybody: HTML5 Is Securer Than You Think | Martin Johns | Ever since the term 'HTML5' came into the world, an immediate perception of insecurity trailed ... | |
Considering Cloud? Learn About Current Trends In Cloud Computing | Jeff Jones , Frank Simorjay Sr. | Considering cloud? Cloud computing can help organisations of all sizes. Learn about current trends in ... | |
10 IT Trends Influencing the Information Security Profession | Marc Vael | The world evolves rapidly – as does technology. This session will provide a glimpse of ... | |
Breaking The Kill Chain - An Early Warning System For Advanced Threat | Rashmi Knowles | The Kill Chain allows us to learn about adversaries. In an introduction to common warfare ... | |
Securing BYOD: Mitigating Risk, Not Forcing Control! | Giri Sreenivas | 80% of companies are already experiencing the “Bring Your Own Device” trend (BYOD). Yet less ... | |
Security Debt and the Rule of 72 | Martin Mckeay | Businesses have been under spending on security for decades. What will it take (and cost) ... | |
When Worlds Collide - Harmonising Governance Between Security And Privacy | Rita Di Antonio , Gabriela Krader , Jyn Schultze-melling , Toby Stevens | Enterprises are realising that a robust governance, risk management and compliance function is not a ... | |
Hacking Back as a Law Enforcement Role | Ronald Prins , Bart Jacobs , Peter Zinn , Troels Oerting | Hacking back as a law enforcement role is much debated topic. The Netherlands is the ... | |
Security Awareness Fails. What Now For The Human Firewall? | Andrew Rose | The statistics are clear, security exploits are often invited into the organisation by unsuspecting staff. ... | |
Degrees of Freedom: Rethinking Security | Hugh Thompson | In statistics, a degree of freedom is a variable in an equation that can change ... | |
Data-Driven Security - Where's the Data? | Wolfgang Kandek | Data drives decisions for business leaders on a daily basis - whether it’s for routine ... | |
Security at the Greatest Show on Earth | Mark Hughes | When the world’s media turned its spotlight on the UK for the London Olympic and ... | |
Survival Isn’t Mandatory: Challenges and Opportunities of DevOps | Joshua Corman | DevOps (development + operations) is a game-changer and may be the end of security as ... | |
Top Ten Proactive Software Controls | James Manico | In the past, application security professionals thought firewalls, SSL, patching, and privacy policies were enough. ... | |
Using Big Intelligence to Defend against Modern Attacks | Sian John | There isn’t a magic bullet that can completely prevent attack or stop Advanced Persistent Threats. ... | |
Social Media Deception | Aamir Lakhani , Joseph Muniz | Emily Williams does not exist. She is not a real person, yet she was able ... | |
Comparative Study: Iran, Russia & PRC Cyber War | William Hagestad | International governments including the Islamic Republic of Iran, the Russian Federation and the People’s Republic ... | |
Old Vulnerabilities In New Protocols? Headaches About IPv6 Fragments | Eric Vyncke | There is no doubt anymore: IPv6 is more and more deployed and is here to ... | |
Raising Awareness of Information Security Through Human Analogies | Bruce Hallas | Knowledge, information and data have been central to the course of humanity. Since man first ... | |
Case Study: Bankia Reaching the Highest Maturity Levels | Vicente Aceituno Canal | Learn how ISMS of Bankia, a major financial institution from Spain, increased value and security ... | |
Citizen Centric E-Identity Ecosystems and The Internet of Things | Rachel Oconnell | - See more at: http://www.rsaconference.com/events/eu13/agenda/sessions/909/citizen-centric-e-identity-ecosystems-and-the#sthash.LI34jTNb.dpuf | |
Big Data’ for Security Purposes – How to Be Effective | Joseph Goldberg | The latest buzz phrase for information security is ‘Big Data’. This session will demonstrate how ... | |
Managing Daily Security Operations with Lean and Kanban | Branden R. Williams | For years we have heard about the fantastic promises of lean production; but what can ... | |
Can There be Accetable Compromise? | Greg Day | Breaches occur every day. So what is an ‘acceptable’ breach? And, if we can accept ... | |
Thousands Of Apps Can't Be Wrong: Mobile Application Analysis At Scale | Samskriti King | Are mobile apps sending data to other countries? Which apps actually track my location and ... | |
Ideas to Make Security & Risk a Team Sport, Engaging the Business & IT | Dave Martin | Securing our environments has traditionally been the responsibility of dedicated teams and while those teams ... | |
Bug Parades, Zombies, and the BSIMM: A Decade of Software Security | Gary Mcgraw | Software security has come a long way in the last decade, moving from the original ... | |
Trending Now: Privacy and Cyber Security Policy in the U.S. and E.U. | Pulina Whitaker | This group will discuss legislation, regulation and public policy impacting privacy and cybersecurity in both ... | |
Cyber Security Information Exchange | Luc Dandurand | In this session we will explore the high-level requirements of a Cyber Security Data Exchange ... | |
Did You Read The News? Http Request Hijacking | Adi Sharabani , Yair Amit | Imagine a world in which what you believe is true has been meddled with by ... | |
Automating the 20 Critical Security Controls | Wolfgang Kandek | The CSIS 20 critical controls are known for driving effective security programmes across government agencies, ... | |
My Personality - Your Security Problem! | Kai Roer | Learn all about personality types and how they impact your security efforts. You will be ... | |
A New Paradigm for Defending Against Targeted Attacks | Stephen Trilling | How do you stop a state-sponsored attacker who has unlimited resources from compromising your enterprise’s ... | |
A New Era of Operational Security in Online Services | Mike Reavey | Worldwide growth in the volume of people, devices and data connected to the internet is ... | IncludeThinkstScapes |
Microsoft Security Intelligence Report | Jeff Jones , Timothy Rains | Using the latest data from hundreds of millions of systems around the world and some ... | |
Information Stewardship: Avoiding Data Breaches and Managing Big Data | Mike Small | Information security is an increasing problem because of the volume, velocity and variety associated with ... | |
To Share or Not to Share, Or Is It An Obligation? | Alan Stockey | With cyber situational awareness and intelligence sharing on every national agenda, where are private sector ... | |
Dissecting Banking Trojan Carberp | Jaromir Horejsi , Peter Kalnai | This presentation provides results of work at Avast Virus Lab on the banking Trojan Carberp. ... | |
You’re Not Your iPhone – or Are You? | Robert w. Griffin , Robin Wilton | Most of us are inseparable from our mobile devices. Shouldn’t we just accept that fact ... | |
Cut Through the Hype to Expose the Truth About Advanced Persistent Threats | Costin Raiu , Rick Holland , Jaap Van , Jaime Blasco , Neil Thacker | The Advanced Persistent Threat (APT) remains one of the most controversial topics in information security. ... | |
Battle Scars And Friendly Fire: War Stories from a Threat Research Team | Will Gragido , Seth Geftic | Building a threat research team and making that team an effective part of your organisation ... | |
Big Data Transforms Security | Amit Yoran , Art Coviello | Welcome to a universe of Big Data, the next wave in Information Technology. One of ... |