RSAASIAJapan 2014 July 22, 2014 to July 23, 2014, Marina Bay,Singapore
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
United We Stand, Divided We Fall | Arthur W. Coviello | While there are many factors contributing to the growing complexity of the digital world, the ... | |
Get Real: Operationalizing an Intelligence Driven Security Program | Amit Yoran | Organizations are caught between the need to leverage the Cloud, mobile and other digital technologies ... | |
Cybercrime – Where Did We Go Wrong? | Steve Lam | Despite better technology, increased spending and cybercrime floating to be a top priority on the ... | |
The First Casualty of the Cyber Cold War | Kevin Kennedy | Our privacy is being invaded, our intellectual property is being stolen. The attack on our ... | |
Brothers In Arms: How the Financial Sector Fought the Brobot Attacks | Denise Anderson | The financial services sector was hit by well publicized Distributed Denial of Service Attacks (DDoS) ... | |
APIs – The Next Hacker Target, or a Business and Security Opportunity? | Tim Mather | Information security professionals: Do you know what’s necessary to secure the API portion of your ... | |
IP and Telephony Crime Has Converged – Wake Up, Wise Up & Get Protected! | Andrew Dancer | Telephones are increasingly used for secondary verification. Cybercriminals know this and are taking over phones ... | |
From Data to Wisdom: Big Lessons in Small Data | Jay Jacobs | The infosec industry has gone gaga over big data analytics—and with good reason. But in ... | |
Whose IP Is It Anyways: Tales of IP Reputation Failures | Michael Hamelin | Throughout our history we have used one form or another of reputation to identify adversaries. ... | |
Mobile Payment Services: Security Risks, Trends and Countermeasures | Suhas Desai | The purpose of this session is to focus on trends in mobile payment services, growth ... | |
Is Your Fridge Conspiring Against You? IoT Attacks and Embedded Defenses | Wolfgang Kandek | HVAC systems are being hacked! Surveillance cameras are being co-opted! Refrigerators are sending spam! The ... | |
Practical Attacks Against MDM Solutions | Dan Koretsky | How are mobile cyber-espionage attacks carried out? In this engaging session, we demonstrate how attackers ... | |
Project 2020 - Preparing Your Organization for Future Cyber Threats, Today | Ken Low | Hear the results of Project 2020, which is an ICSPA initiative, driven by Trend Micro ... | |
Cyber Early Warning and the Commonality of Cyber Warfare and Electronic Warfare | Nitzan Barkay | This lecture investigates a major issue of cyber situation awareness, which is enhancing the probability ... | |
Software Defined Perimeter: Securing the Cloud to the Internet of Things | Jim Reavis | CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened ... | |
Accelerate Your Security Operations With Machine Speed Responses to Cyber Attacks | Bernie Thomas | To defend against cyber attacks, security professionals must act as quickly, or more quickly, than ... | |
Understanding and Defending Against the Modern DDoS Threat | Stephen Gates | DDoS attacks, in a little more than a decade, have become a worldwide threat that ... | |
Cyber-Espionage Using an Android Spyphone | Kevin Mcnamee | This presentation will feature a live demonstration of how cyber-criminals can use remotely controlled SpyPhone ... | |
Malware Defenses and Beyond 2014 | Dick Bussiere | Attend this session to learn how businesses and governments can find hidden security intelligence buried ... | |
Cloud Trust Redefined: Eight Essential Steps in a Strong Defense | Davi Ottenheimer | Organizations rely upon cloud more every day. Are you prepared to defend against the latest ... | |
Application Security - The Invisible Onslaught Gets Worse | Anthony Lim | The “Heartbleed Bug”; shows that the unseen threat (application security) is not getting better. Despite ... | |
Memory Forensics & Security Analytics: Detecting Unknown Malware | Fahad Ehsan | This presentation will show how opensource tools can be used to detect ‘Unknown’ malware using ... | |
The Role of the ISACs in Critical Infrastructure Resilience | Denise Anderson | Information Sharing and Analysis Centers (ISACs) play a key role in disseminating threat, incident and ... | |
Continuous Delivery and Risk Assessment | Ravindra Rajaram , Shaik Mokhinuddeen | In the Cloud and Agile Software industry, the time between Development to Deployment has come ... | |
Minimizing the Threat of Mobile Banking Cybercrime | Paul Oliveria | As online banking transitions from PC to mobile, malware and web threats, too, are following ... | |
The Impact of National Laws on International Cloud Deployments | Robert Gregory | National laws, particularly national security, data protection and privacy laws can have a major impact ... | |
Out-Connect the Threats | Han Chon | The fact is, and challenge can be, that our users now connect in more ways ... | |
What Are Your Key Definitive Strategies Against Advanced Persistent Threat Today? | Mark Hofman , Brian Shen | Advanced threats are becoming an epidemic. Come join to learn how to recognize when your ... | |
Son of SpyEye – a Crimeware Soap Opera | Mauritis Lucas | SpyEye evolved from buggy crimeware to the weapon of choice for many, when ZeuS retreated ... | |
Combat Sophisticate Threats – How Big Data and Open SOC Could Help | James Sirota | The session will present an Open SOC architecture based on Horton Works HDP 2.x. We ... | |
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control | Sheung Chi Ng | Forget the geeky analysis of cloud security; risk is driven by people involved and the ... | |
Split and Conquer: Don’t Put All Your Keys in One Basket | Kayvan Alikhani , Salah Machani | Challenges and recommended approach for building mobile security solutions, with a focus on splitting users ... | |
Securing Secure Browsers | Prashant Verma | Secure Browsers generally safeguard users from web application attacks that can be prevented at the ... | |
The Second Machine Age | Andrew Mcafee | We are living in a time of brilliant technologies: cars that drive themselves; Jeopardy!-champion supercomputers; ... | |
The History of Internet Failures and How We Might Break the Cycle | Wolfgang Kandek | Over the decades, we have witnessed serious events that caused the Internet to fail including ... | |
The Analytics Enabled SOC - Best Practices for Improving Incident Response and Breach Investigation | Haiyan Song | A new approach is needed to combat the modern security threat. Join this session to ... | |
New Approaches for Defending IT in Today’s Threat Landscape | Bret Hartman | To protect against the multitude of attack vectors, IT professionals must cope with the complexity ... | |
A Strategic Approach to Threat Intelligence | Matthew Mcglashan , Scott Ceely | Threat Intelligence is the new buzzword with every security product claiming to generate it and ... | |
Leave the App Alone! - Attack and Defense of Android App Hijack | Ryu Zhou | It's very risky for an App running in a rooted Android device, as this App ... | |
Cisco Unified Security Metrics: Measuring Your Organization’s Security Health | Hessel Heerebout | Cisco Unified Security Metrics is the governance track of a broader CIO initiative, offering a ... | |
Current and Emerging Trends Within the Cybercrime Ecosystem | Uri Fleyder , Lior Ben-porat | The Cybercrime ecosystem is a fascinating, dynamic and constantly changing place. During our session we ... | |
The Perimeter is Dead! Birth of the Elastic Network | John Ellis | Your data lives everywhere, and resides on systems that are beyond your control. Cloud, mobile ... | |
Revenge of the Full Proxy | Edwin Seo | Proxies have been in existence for a while - way longer than most of the ... | |
Learning Malware Languages: Fun with Dick and Jane’s Malware | Brian Foster | Recognizing the languages of today's malware families requires an understanding of both their grammar and ... | |
Cybercrime Layers – How Cybercriminals Defeat Security Measures | Etay Maor | For years the security industry has been talking about layered security, and cybercriminals have been ... | |
How to Hadoop Without the Worry: Protecting Big Data at Scale | Davi Ottenheimer | Hadoop capabilities challenge traditional security models and can create worry about risk. Dependence on a ... | |
Mobile Security Attacks: A Glimpse From the Trenches | Adi Sharabani , Yair Amit | Hackers today apply covert and persistent techniques to attack mobile devices. Attend this presentation in ... | |
Infrastructure Complexity – a Business Puzzle Worth Solving | Tom Salkield | Our attempts to outrun information security threats with disparate technology investments have created complex infrastructures ... | |
EAS-SEC Project: Securing Enterprise Business Applications | Alexander mikhailovich Polyakov | Seven years of research and security assessment focused on enterprise business applications such as ERP, ... | |
Is the Security Industry Ready for On Appliance SSL Decryption Features? | John W. Pirc , Will Gragido | This session will uncover research findings regarding the issues with on-board SSL decryption with next ... | |
DDoS Past, Present, and Future | Terrence “tuna” Gareau , Michael “drbearsec” Smith | Over the past several years, the frequency, size, and complexity of Distributed Denial of Service ... | |
Mobile Devices Security: Evolving Threat Profile of Mobile Networks | Selim Aissi | This presentation will cover the evolution of threats related to 3G/4G Mobile Networks and their ... | |
One Failure Leads to Another: Developing Leading Indicators for Security Threats and Risks | Lance Hayden | This session discusses techniques for developing leading indicators of security failure. Such indicators are measurable ... | |
Building and Breaking Privacy Barriers | Mike Shema | Data privacy and data security have unequal footing within browsers and mobile apps. Data security ... | IncludeThinkstScapes |
Next Generation Enterprise Security | Aylwin Lam | To address today’s security, it needs to be a security platform approach which natively classifies ... | |
EITC Lessons Learned: Building Our Internal Security Intelligence Capability | Tamer El Refaey | When it comes to APT attacks, security intelligence is the most effective security control that ... | |
Will Your Company Be to Intellectual Property What Mt. Gox Was to Bitcoin? | Tim Mather | The long established virtual currency in Silicon Valley is not Bitcoin, but intellectual property (IP). ... | |
Supply Chain: The Exposed Flank | Dave Lewis | This talk will speak to the issues pertaining to supply chain security as is relates ... | |
Restoring Trust After a Data Breach | Dwayne Melançon | While many organizations take preventive methods to reduce the risk of data breaches, even the ... | |
Third Party Components in Applications: Understanding Application Security | Olli Jarva | Understanding Application Security talk concentrates on what comprises the core of most mobile applications: open ... | |
IP Challenges in Asia: Keeping Your Data Safe from Malware & Other Threats | Michael Kendzierski | Intellectual Property theft and Data Breaches are a daily occurrence in 2014. We’ll look at ... | |
Securely Enable the Open Enterprise | Vic Mankotia | As enterprises are getting collaboration in the center of their business themes, the balance has ... | |
Combatting Cyber Attacks Through Advanced Analytics & Intelligence | Bryan Sartin | Targeted attacks and advanced malware continue to create untenable cyber risk for even the best ... |