RSAASIAJapan 2014 July 22, 2014 to July 23, 2014, Marina Bay,Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
United We Stand, Divided We Fall Arthur W. Coviello While there are many factors contributing to the growing complexity of the digital world, the ...
Get Real: Operationalizing an Intelligence Driven Security Program Amit Yoran Organizations are caught between the need to leverage the Cloud, mobile and other digital technologies ...
Cybercrime – Where Did We Go Wrong? Steve Lam Despite better technology, increased spending and cybercrime floating to be a top priority on the ...
The First Casualty of the Cyber Cold War Kevin Kennedy Our privacy is being invaded, our intellectual property is being stolen. The attack on our ...
Brothers In Arms: How the Financial Sector Fought the Brobot Attacks Denise Anderson The financial services sector was hit by well publicized Distributed Denial of Service Attacks (DDoS) ...
APIs – The Next Hacker Target, or a Business and Security Opportunity? Tim Mather Information security professionals: Do you know what’s necessary to secure the API portion of your ...
IP and Telephony Crime Has Converged – Wake Up, Wise Up & Get Protected! Andrew Dancer Telephones are increasingly used for secondary verification. Cybercriminals know this and are taking over phones ...
From Data to Wisdom: Big Lessons in Small Data Jay Jacobs The infosec industry has gone gaga over big data analytics—and with good reason. But in ...
Whose IP Is It Anyways: Tales of IP Reputation Failures Michael Hamelin Throughout our history we have used one form or another of reputation to identify adversaries. ...
Mobile Payment Services: Security Risks, Trends and Countermeasures Suhas Desai The purpose of this session is to focus on trends in mobile payment services, growth ...
Is Your Fridge Conspiring Against You? IoT Attacks and Embedded Defenses Wolfgang Kandek HVAC systems are being hacked! Surveillance cameras are being co-opted! Refrigerators are sending spam! The ...
Practical Attacks Against MDM Solutions Dan Koretsky How are mobile cyber-espionage attacks carried out? In this engaging session, we demonstrate how attackers ...
Project 2020 - Preparing Your Organization for Future Cyber Threats, Today Ken Low Hear the results of Project 2020, which is an ICSPA initiative, driven by Trend Micro ...
Cyber Early Warning and the Commonality of Cyber Warfare and Electronic Warfare Nitzan Barkay This lecture investigates a major issue of cyber situation awareness, which is enhancing the probability ...
Software Defined Perimeter: Securing the Cloud to the Internet of Things Jim Reavis CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened ...
Accelerate Your Security Operations With Machine Speed Responses to Cyber Attacks Bernie Thomas To defend against cyber attacks, security professionals must act as quickly, or more quickly, than ...
Understanding and Defending Against the Modern DDoS Threat Stephen Gates DDoS attacks, in a little more than a decade, have become a worldwide threat that ...
Cyber-Espionage Using an Android Spyphone Kevin Mcnamee This presentation will feature a live demonstration of how cyber-criminals can use remotely controlled SpyPhone ...
Malware Defenses and Beyond 2014 Dick Bussiere Attend this session to learn how businesses and governments can find hidden security intelligence buried ...
Cloud Trust Redefined: Eight Essential Steps in a Strong Defense Davi Ottenheimer Organizations rely upon cloud more every day. Are you prepared to defend against the latest ...
Application Security - The Invisible Onslaught Gets Worse Anthony Lim The “Heartbleed Bug”; shows that the unseen threat (application security) is not getting better. Despite ...
Memory Forensics & Security Analytics: Detecting Unknown Malware Fahad Ehsan This presentation will show how opensource tools can be used to detect ‘Unknown’ malware using ...
The Role of the ISACs in Critical Infrastructure Resilience Denise Anderson Information Sharing and Analysis Centers (ISACs) play a key role in disseminating threat, incident and ...
Continuous Delivery and Risk Assessment Ravindra Rajaram , Shaik Mokhinuddeen In the Cloud and Agile Software industry, the time between Development to Deployment has come ...
Minimizing the Threat of Mobile Banking Cybercrime Paul Oliveria As online banking transitions from PC to mobile, malware and web threats, too, are following ...
The Impact of National Laws on International Cloud Deployments Robert Gregory National laws, particularly national security, data protection and privacy laws can have a major impact ...
Out-Connect the Threats Han Chon The fact is, and challenge can be, that our users now connect in more ways ...
What Are Your Key Definitive Strategies Against Advanced Persistent Threat Today? Mark Hofman , Brian Shen Advanced threats are becoming an epidemic. Come join to learn how to recognize when your ...
Son of SpyEye – a Crimeware Soap Opera Mauritis Lucas SpyEye evolved from buggy crimeware to the weapon of choice for many, when ZeuS retreated ...
Combat Sophisticate Threats – How Big Data and Open SOC Could Help James Sirota The session will present an Open SOC architecture based on Horton Works HDP 2.x. We ...
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Sheung Chi Ng Forget the geeky analysis of cloud security; risk is driven by people involved and the ...
Split and Conquer: Don’t Put All Your Keys in One Basket Kayvan Alikhani , Salah Machani Challenges and recommended approach for building mobile security solutions, with a focus on splitting users ...
Securing Secure Browsers Prashant Verma Secure Browsers generally safeguard users from web application attacks that can be prevented at the ...
The Second Machine Age Andrew Mcafee We are living in a time of brilliant technologies: cars that drive themselves; Jeopardy!-champion supercomputers; ...
The History of Internet Failures and How We Might Break the Cycle Wolfgang Kandek Over the decades, we have witnessed serious events that caused the Internet to fail including ...
The Analytics Enabled SOC - Best Practices for Improving Incident Response and Breach Investigation Haiyan Song A new approach is needed to combat the modern security threat. Join this session to ...
New Approaches for Defending IT in Today’s Threat Landscape Bret Hartman To protect against the multitude of attack vectors, IT professionals must cope with the complexity ...
A Strategic Approach to Threat Intelligence Matthew Mcglashan , Scott Ceely Threat Intelligence is the new buzzword with every security product claiming to generate it and ...
Leave the App Alone! - Attack and Defense of Android App Hijack Ryu Zhou It's very risky for an App running in a rooted Android device, as this App ...
Cisco Unified Security Metrics: Measuring Your Organization’s Security Health Hessel Heerebout Cisco Unified Security Metrics is the governance track of a broader CIO initiative, offering a ...
Current and Emerging Trends Within the Cybercrime Ecosystem Uri Fleyder , Lior Ben-porat The Cybercrime ecosystem is a fascinating, dynamic and constantly changing place. During our session we ...
The Perimeter is Dead! Birth of the Elastic Network John Ellis Your data lives everywhere, and resides on systems that are beyond your control. Cloud, mobile ...
Revenge of the Full Proxy Edwin Seo Proxies have been in existence for a while - way longer than most of the ...
Learning Malware Languages: Fun with Dick and Jane’s Malware Brian Foster Recognizing the languages of today's malware families requires an understanding of both their grammar and ...
Cybercrime Layers – How Cybercriminals Defeat Security Measures Etay Maor For years the security industry has been talking about layered security, and cybercriminals have been ...
How to Hadoop Without the Worry: Protecting Big Data at Scale Davi Ottenheimer Hadoop capabilities challenge traditional security models and can create worry about risk. Dependence on a ...
Mobile Security Attacks: A Glimpse From the Trenches Adi Sharabani , Yair Amit Hackers today apply covert and persistent techniques to attack mobile devices. Attend this presentation in ...
Infrastructure Complexity – a Business Puzzle Worth Solving Tom Salkield Our attempts to outrun information security threats with disparate technology investments have created complex infrastructures ...
EAS-SEC Project: Securing Enterprise Business Applications Alexander mikhailovich Polyakov Seven years of research and security assessment focused on enterprise business applications such as ERP, ...
Is the Security Industry Ready for On Appliance SSL Decryption Features? John W. Pirc , Will Gragido This session will uncover research findings regarding the issues with on-board SSL decryption with next ...
DDoS Past, Present, and Future Terrence “tuna” Gareau , Michael “drbearsec” Smith Over the past several years, the frequency, size, and complexity of Distributed Denial of Service ...
Mobile Devices Security: Evolving Threat Profile of Mobile Networks Selim Aissi This presentation will cover the evolution of threats related to 3G/4G Mobile Networks and their ...
One Failure Leads to Another: Developing Leading Indicators for Security Threats and Risks Lance Hayden This session discusses techniques for developing leading indicators of security failure. Such indicators are measurable ...
Building and Breaking Privacy Barriers Mike Shema Data privacy and data security have unequal footing within browsers and mobile apps. Data security ... IncludeThinkstScapes
Next Generation Enterprise Security Aylwin Lam To address today’s security, it needs to be a security platform approach which natively classifies ...
EITC Lessons Learned: Building Our Internal Security Intelligence Capability Tamer El Refaey When it comes to APT attacks, security intelligence is the most effective security control that ...
Will Your Company Be to Intellectual Property What Mt. Gox Was to Bitcoin? Tim Mather The long established virtual currency in Silicon Valley is not Bitcoin, but intellectual property (IP). ...
Supply Chain: The Exposed Flank Dave Lewis This talk will speak to the issues pertaining to supply chain security as is relates ...
Restoring Trust After a Data Breach Dwayne Melançon While many organizations take preventive methods to reduce the risk of data breaches, even the ...
Third Party Components in Applications: Understanding Application Security Olli Jarva Understanding Application Security talk concentrates on what comprises the core of most mobile applications: open ...
IP Challenges in Asia: Keeping Your Data Safe from Malware & Other Threats Michael Kendzierski Intellectual Property theft and Data Breaches are a daily occurrence in 2014. We’ll look at ...
Securely Enable the Open Enterprise Vic Mankotia As enterprises are getting collaboration in the center of their business themes, the balance has ...
Combatting Cyber Attacks Through Advanced Analytics & Intelligence Bryan Sartin Targeted attacks and advanced malware continue to create untenable cyber risk for even the best ...