Title |
Speakers |
Summary |
Topic Types |
Introduction |
Hugh Thompson
|
N/A |
|
Security Industry and Trends |
Hugh Thompson
|
N/A |
|
User Authentication Trends and Methods for Native Mobile Applications |
Kayvan Alikhani
|
N/A |
|
Mobile & IOT Security: Will Big Data Make it Better or Worse? |
Hadi Nahari
|
N/A |
|
Viruses, Malware and Threats |
Tas Giakouminakis
|
N/A |
|
Crypto 101: Encryption, Codebreaking, SSL, and Bitcoin |
Benjamin Jun
|
N/A |
|
Security Enforcement Explained |
Dana Wolf
|
N/A |
|
Internet and Web Security Issues |
Patrick Sullivan
|
N/A |
|
Network Security |
Gary Sockrider
|
N/A |
|
As a New CISO – How to Assess Your Security Program for Success |
Gary Hayslip
|
N/A |
|
Are You Fighting the Wrong Battles? |
Bill Burns
|
N/A |
|
Being a CISO – What They Don’t Tell You |
Rick Howard
,
Evan Wheeler
,
Jack Jones
,
Julie Fitton
,
Amy Butler
|
N/A |
|
Stepping Inside the Boardroom |
Trey Ford
|
N/A |
|
(ISC)² CISSP CBK Training |
Kevin Stoffell
|
N/A |
|
Status of the Industry: 2015 Global Information Security Workforce Study |
Julie Peeler
,
Elise Yacobellis
,
Cheri Caddy
,
Angela Messer
,
Frank Dickson
|
N/A |
|
Across the Desk: Opposing Perspectives on InfoSec Hiring and Interviewing |
Lee Kushner
,
Lenny Zeltser
|
N/A |
|
Breaking the Glass Firewall: The Changing Role of Women in IT Security - |
Fahmida Y Rashid
,
Angela Knox
,
Melinda Rogers
,
Michelle Cobb
,
Penny Leavy
|
N/A |
|
Practical Quantitative Risk Analysis |
David Musselwhite
|
N/A |
|
An Inside Look at Cyber Insurance |
Jake Kouns
|
N/A |
IncludeThinkstScapes
|
Metrics That Matter |
Alex Hutton
,
Scott Borg
,
Evan Wheeler
,
Kymberlee Price
,
Michael Werneburg
|
N/A |
|
Leveraging Threat Analysis Techniques |
Mark Clancy
|
N/A |
|
IAPP: Engineering Privacy: Why Security isn’t Enough |
Malcolm Harkins
,
Jeff Northrop
,
Naomi Lefkovitz
,
Maureen Ohlhausen
,
Sagi Leizerov
,
Trevor Hughes
|
N/A |
|
building the bridge across the great minority cyber divide |
Joyce Brocaglia
,
Lisa Foreman-jiggetts
,
Larry Whiteside
,
Renee Forney
|
N/A |
|
The 50-Minute MBA for Information Security Professionals |
Branden R. Williams
,
James Anderson
|
N/A |
|
The Long and Winding Road: Building an InfoSec Career from Techie to CISO |
Justin Somaini
,
Steve Schlarman
,
Less Stoltenberg
,
Robert Buchheit
|
N/A |
|
DevOps Connect: SecOps Edition |
Joshua Corman
,
Gene H. Kim
,
Mark S. Miller
,
Alan Shime
|
N/A |
|
Just A Little Bit More |
Nigel Smart
,
Yuval Yarom
,
Joop Pol
|
N/A |
|
Cache Storage Attacks |
Billy Brumley
|
N/A |
|
The Evolution of the Cybersecurity Executive Trifecta: The CSO/CIO/CISO |
Rick Howard
|
N/A |
|
The Big Hacks, Malware and Exploits of 2014 and What is to Come |
James Lyne
|
N/A |
|
technologies that will shape the future privacy debate |
Trevor Hughes
|
N/A |
|
something awesome on cloud and containers |
Rich Mogull
,
Christofer ( Hoff ) Hoff
|
N/A |
|
security data sscience: theory to reality |
Jay Jacobs
,
Bob Rudies
|
N/A |
|
phising dark waters - defending against malicious emails |
Michele Fincher
|
N/A |
|
No more snake oil: why infosec needs security garuntees |
Jeremiah Grossman
|
N/A |
IncludeThinkstScapes
|
news flash:some things actually do work in security!!! |
John Pescatore
|
N/A |
|
network security and operations when the network is already compromised |
Eric Cole
|
N/A |
|
mock trial: international discovery and analysis:miscarriage of justice? |
John Facciola
,
Steven Teppler
,
John Jorgensen
,
Serge Jorgensen
,
Eric Hibbard
,
Lauren X Topelsohn
|
N/A |
|
license to kill:malware hunting with the sysinternals tools |
Mark Russinovich
|
N/A |
|
killing the kill chain:disrupting the cyber attack progression |
Tyler Reguly
,
Ken Westin
,
Alex Cox
|
N/A |
|
incident reponse: a test pilot's perspective |
Steve Ransom-jones
|
N/A |
|
hacking exposed: next generation attacks |
Stuart Mcclure
,
Brian Wallace
|
N/A |
|
exploitation trends:from potential ricj to actual risk |
David Weston
,
Matt Miller
,
Tim Rains
|
N/A |
|
endpoints in the new age:apps, mobility and the iunternet of things |
Benjamin Jun
|
N/A |
|
cybersecurity legislation; congressional & administrative action |
Ryan Gillis
,
Tom Corcoran
,
David Colberg
,
Deborah Gill
,
Sarah Beth Groshart
,
Tom Bossert
|
N/A |
|
continous security: 5 ways devops improves security |
David Mortman
,
Joshua Corman
|
N/A |
|
building a next generation security achitecture |
Michael Lewis
|
N/A |
|
bridging the divide between security and operational teams |
Jonathan Trull
|
N/A |
|
android security:data from the front lines |
Adrian Ludwig
|
N/A |
|
10 tips for running and effective SOC-BuzzFeed style |
Jeff Caplan
|
N/A |
|
closing the gap:steps to satisfy the demand for security talent |
Jacob Westin
|
N/A |
|
The new paradigm of business-driven cyber defense:an update from the FCC chairman |
Tom Wheeler
|
N/A |
|
the cyrptographers panel |
Paul Kocher
,
Whitfield Diffie
,
Ronald l. Rivest
,
Adi Shamir
,
Ed Giorgio
|
N/A |
|
keynote |
Charles Johnson
|
N/A |
|
security on offense |
Christopher Young
|
N/A |
|
enhancing cloud trust |
Scot Charney
|
N/A |
|
escaping security's dark ages |
Amit Yoran
|
N/A |
|
tracking ghosts through the fog |
Chris Larsen
,
Waylon Grange
|
N/A |
|
threat intelligence is like three day potty training |
Rick Holland
|
N/A |
|
the wolves of vuln street: the 1st dynamic systems model of the 0day market |
Katie Moussouris
,
Michael Sigel
|
N/A |
|
the six most dangerous new techniques and what's coming next |
Ed Skoudis
,
Michael J. Assante
,
Johannes Ullrich
,
John Pescatore
|
N/A |
|
six degrees of kevin bacon:securing the data security supply chain |
Adrian Sanabria
,
Garrett Bekker
|
N/A |
|
Risk-Ops at Scale: Framework Operationalization to Address Business Risk |
Eddie Block
,
Nancy Rainosek
|
N/A |
|
Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain |
Sean Doherty
,
Deb Banerjee
|
N/A |
|
Majority Report: Making Security Data Actionable (and Fun!) |
Andrew Hay
,
Thibault Reuille
|
N/A |
|
I Was Attacked by My Power Supply: A Mock Trial |
John Facciola
,
Steven Teppler
,
Hoyt Kesterson
,
Eric Hibbard
,
Laruen Topelsohn
|
N/A |
|
I’m in Control Here: Who’s in Charge of Cybersecurity? |
Jane holl Lute
,
Shawn Henry
,
John Inglis
,
Philip Reitinger
|
N/A |
|
How We Discovered Thousands of Vulnerable Android Apps in One Day |
Joji Montelibano
,
Will Dormann
|
N/A |
|
Getting a Jump on Hackers |
Wolfgang Kandek
|
N/A |
|
enterprise cloud security via devsecops |
Scott Kennedy
,
Shannon Lietz
|
N/A |
|
embedded exploitation party trick |
Ang Cui
|
N/A |
|
design and analysis of block ciphers |
Martin M. Lauridsen
,
Xiaoyang Dong
|
N/A |
|
cyber security: the brink of prediction |
Samir Kapuria
|
N/A |
|
combining firewalls and security intelligence is a hacker's worst nightmare |
Vijay Upadhyaya
|
N/A |
|
cisco's security dojo: raising the technical security awareness of 20000+ |
Christopher Romeo
|
N/A |
|
CANCELLED: Mobile Botnets: Fact or Fiction? |
Marc Eisenbarth
|
N/A |
|
A privacy primer for security officers |
Todd Fitzgerald
|
N/A |
|
another bug bites the dust |
Todd Inskeep
|
N/A |
|
hack the planet:some men just want to watch the world burn |
Mark Arena
|
N/A |
|
open garages=learn how technology drives your car |
Craigh Smith
|
N/A |
|
National Cyber Crisis – Live Exercise Scenario |
Dmitri Alperovitch
,
John d. Davis
,
Jason Healey
|
N/A |
|
Hacking the CEO: Ninja Mind Tricks and Other Ruses to Get Security $$$’s |
John B. Dickson
|
N/A |
|
Who’s Invited to Your Party? Minimizing Risk from Outsourced Partners |
Kenneth Morrison
|
N/A |
|
What Does Responsible Vulnerability Disclosure Look Like? |
Paco Hope
|
N/A |
|
lead like a woman |
Joyce Brocaglia
|
N/A |
|
hacking high:teaching our kids vital cyber skills |
Ronald Woerner
|
N/A |
|
trusting in mobile enterprise-have we lost the game? |
Ammar Alkassar
,
Norbert Pohlmann
,
Hans-cristoph Quelle
,
Kim Ngyuen
|
N/A |
|
the future of the ITU,ICANN and the IANA transition |
Paul Rosenzweig
,
Daniel Sepulveda
,
Lawrence Strickling
|
N/A |
|
the coming revolution:industry groups defining vendor assessment standards |
Chris Wysopal
,
Howard Schmidt
,
Reeny Sondhi
,
Jiim Routh
|
N/A |
|
structural entropy analysis for automated malware classification |
Glenn Chisolm
,
Matt Wolff
|
N/A |
|
Separating Signal from Noise: Taking Threat Intelligence to the Next Level |
Doron Shiloach
|
N/A |
|
Security in an Age of Catastrophic Risk |
Bruce Schneier
|
N/A |
|
security:changing the game |
Jennifer Henley
|
N/A |
|
riding the wave of the digital bank: a security perspective |
Juan Losa
,
Santiago Moral
|
N/A |
|
penetration testing with live malware |
Gunter Ollmann
|
N/A |
|
Mobile Vulnerabilities: From Data Breach to Complete Shutdown |
Adi Sharabani
,
Yair Amit
|
N/A |
|
Leveraging Global Threat Intelligence: Raising the Cost of Cyber-Warfare |
Dean Thompson
|
N/A |
|
how to become a world-class CISO |
Lee Kushner
,
Tim Wilson
,
James Christiansen
,
Jay Leek
,
James Nelms
|
N/A |
|
How to Avoid the Top Ten Software Security Flaws |
Gary Mcgraw
|
N/A |
|
Home Sweet Owned? – A Look at the Security of IoT Devices in our Homes |
Billy Rios
|
N/A |
|
From the Battlefield: Managing Customer Perceptions in a Security Crisis |
Nicole Miller
|
N/A |
|
From Nonexistent to Gartner's #1 Security Technology in Three Years: What's a CASB? |
Neil Macdonald
,
Adam Jalal
,
Myrna Soto
,
Ramachandra Hegde
,
Steve Martino
|
N/A |
|
Detecting Unknown Malware: Security Analytics & Memory Forensics |
Fahad Ehsan
|
N/A |
|
Defense in Depth to Coordinated Defense: Organizing against Our Common Enemy |
Chet Wisniewski
,
John Shier
|
N/A |
|
Cookin Up Metrics with Alex and David: A Recipe for Success |
David Mortman
,
Alex Hutton
|
N/A |
|
Before and Beyond the Breach: New Research in the 2015 DBIR |
Bob Rudis
,
Wade Baker
,
Jay Jacobs
,
Marc Spitler
|
N/A |
|
Attribute and Identity Based Encryption |
Keita Emura
,
Nuttapoing Attrapadung
|
N/A |
|
A Tale of Two Mocks—a Deep Dive into the Issues Raised |
John Facciola
,
Steven Teppler
,
Hoyt Kesterson
,
Serge Jorgensen
,
Eric Hibbard
,
Lauren X Topelsohn
,
John Jorgersen
|
N/A |
|
Incident Response Tabletop Meet 'n Swap |
Alissa Torres
|
N/A |
|
Does The New 2015 California Data Breach Law Protect Individual Privacy, Corporate Security, Both or Neither? |
Jill Bronfman
|
N/A |
|
Cybersecurity Framework: Adoption Experiences and Opportunities |
Timothy Shea
|
N/A |
|
challenges in network forensics |
Anoop Singhal
|
N/A |
|
When IT Threats Meet OT Innocence |
Udi Solomon
|
N/A |
|
Live Industrial Control Systems (ICS) Demo |
Tom Van Norman
|
N/A |
|
Cyber-Shock 2015: Corporate Breach Role Play |
Azeem Aleem
,
Stephen Mccombie
|
N/A |
|
Be Heard: Developing Effective Board-Level Communications for the CISO |
Kai Axford
|
N/A |
|
How Much Does Your Ox Weigh?: Crowdsource Your Way to Data Protection |
Maor Goldberg
|
N/A |
|
Evasive Malware Exposed and Deconstructed |
Christopher Kruegel
|
N/A |
|
Whats Next? Teaching Machines How to Speak Security |
Aharon Chernin
|
N/A |
|
Wanted: Innovation in Security Research |
Gus Reyes
|
N/A |
|
The Social Network Panel at RSA Conference |
James C. Foster
,
Mike Kail
,
Avi Rubin
,
Paul Moreno
|
N/A |
|
the long road to a secure web |
Andy Ellis
|
N/A |
|
the ciso reporting project |
Nicholas J. Percoco
,
Trey Ford
|
N/A |
|
Security and Privacy in the Cloud: How Far Have We Come? |
Bruce Schneier
,
John Pescatore
,
Eran Feigenbaum
,
Bret Arsenault
|
N/A |
|
Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project |
Daniel Miessler
|
N/A |
|
Restoring Order: The Inevitable Evolution of IT Security Regulation |
Stephen Treglia
|
N/A |
|
Powering Your Threat Intel Team with Off-the-Shelf Tools |
Ryan Olson
|
N/A |
|
Membership |
Olivier Blazy
,
David Derler
|
N/A |
|
Inception: APT Campaign Spanning PCs, Mobile, the Cloud, and Home Routers |
Snorre Fagerland
,
Waylon Grange
|
N/A |
|
Implementing an Automated Incident Response Architecture |
James Carder.jessica Hebenstreit
|
N/A |
|
Hot Topics in Information Security Law 2015 |
Michael Aisenberg
,
Richard Abbott
,
Benham Dayanim
,
Brendan O Connor
,
Martha Chemas
|
N/A |
|
Hacktivism in 2015 - It Isn’t Just for the Lulz Anymore |
Joseph Gallop
|
N/A |
|
hacking in smart cities |
Cesar Cerrudo
|
N/A |
|
hacking exposed:beyond the malware |
Dmitri Alperovitch
,
George Kurtz
,
Elia Zaitsev
|
N/A |
|
From Cowboys to Sales Engineers: Building Mature Security Services |
Julian Mihai
,
Tom Baltis
|
N/A |
|
FBI and Trend Micro: Combating Cybercrime within your Organization |
Tom Kellermann
|
N/A |
|
Defending Critical Infrastructure: Preparing via Real-World Cyber Exercises |
Fred Kost
,
Bob Ducharme
,
Henry Capello
,
Philip Susmann
,
Randolph Siegel
|
N/A |
|
Cybersecurity as a Boardroom Investment: Business Speaks Resilience |
Phyllis Schneck
,
Karen Neuman
,
Suzanne Spaulding
|
N/A |
|
Continuous Security: 5 Ways DevOps Improves Security |
David Mortman
,
Joshua Corman
|
N/A |
|
A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk |
Jason Straight
|
N/A |
|
Victims DON'T Have Their Heads in the Cloud - An Insider Threat Case Study |
Summer Fowler
,
Randall Trzeciak
|
N/A |
|
the promise and the perils of wearables |
Andres Molina-markham
,
Shirirang Mare
|
N/A |
|
The Hazards of Online Ads: What Is Being Done and What You and Your Employees Can Do |
Craiz Spiezle
,
Casey Oppenheim
,
Chris Olson
,
Elias Manousos
|
N/A |
|
State of Cybersecurity: 2015 Findings and Implications |
Fahmidas Y Rashid
,
Rob Stroud
|
N/A |
|
Secure and Efficient Implementation of AES Based Cryptosystems |
Conrado Gouvea
,
Junwei Wang
|
N/A |
|
Privacy and Security, the Ties That Bind |
Jeff Northrop
|
N/A |
|
More Apt Than You Think: Data Protection at Massive Scale |
Davi Ottenheimer
|
N/A |
|
Inconvenient Security: When Attorneys Drive Security Decisions |
Joseph Burton
,
Dan Mitchell
,
George Tubin
,
William Nelson
|
N/A |
|
Implementing the U.S. Cybersecurity Framework at Intel—A Case Study |
Tim Casey
|
N/A |
|
IANS Research - The 7 Factors of CISO Impact |
Phil Gardner
,
Stan Dolberg
|
N/A |
|
How Secure are Contact-less Payment Systems? |
Chris Scott
,
Matthew Ngu
|
N/A |
|
How DHS Does Cybersecurity with Content Filtering |
Thomas Ruoff
|
N/A |
|
Dissecting Office Malware for Fun and Espionage |
Jonathan Grier
|
N/A |
|
Countering Development Environment Attacks |
David Wheeler
,
Dan Reddy
|
N/A |
|
Characterizing Malicious Traffic on Cellular Networks: A Retrospective |
Charles Lever
|
N/A |
IncludeThinkstScapes
|
But...It’s an App/Play Store Download: Research Exposes Mobile App Flaws |
Andrew Hoog
,
Ryan Welton
|
N/A |
|
Be like Water: Applying Analytical Adaptability to Cyber Intelligence |
Jay Mcallister
|
N/A |
|
Balancing Compliance and Operational Security Demands |
Steve Winterfeld
|
N/A |
|
Attribution Debate - Is It Worth It? |
Dmitri Alperovitch
,
Freddy Dezeure
,
Tom Corcoran
,
Rick Hollard
|
N/A |
|
Assume Breach: An Inside Look at Cloud Service Provider Security |
Mark Russinovich
|
N/A |
|
applied information sharing:lessons learned from the gameover/zeus takedwon |
Marshall Miller
,
Andrew Auid
,
Brett Stone-gross
,
Michael Mckeown
,
Vikram Thakur
|
N/A |
|
Using Team Structure as Defense in Depth |
William Harmer
|
N/A |
|
SANS NetWars |
Ed Skoudis
|
N/A |
|
TLS/SSL and Certificate Crossfire |
Errol Lloyd
|
N/A |
|
Should 2015 Be the Year We Ditch Information Security Certifications? |
Ben Rothke
|
N/A |
|
Doing Security Response with Your Cloud Service Provider |
Jerry Cochran
|
N/A |
|
Can We Satisfy the ACLU and Still Share Suspicious Activity Reports (SARs)? |
Karyn Higa-smith
|
N/A |
|
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control |
David Etue
|
N/A |
|
The Mother of All Pen Tests |
Robert Hawk
,
Steve Vandenberg
|
N/A |
|
That Point of Sale Is a PoS |
David Byrne
,
Charles Henderson
|
N/A |
|
Security Metrics That Your Board Actually Cares About! |
Troy Braban
|
N/A |
|
Security in the App Economy: How to Ride the Wave Without Wiping Out |
Michelle Waugh
|
N/A |
|
Security and Privacy: Let’s Stay Together, Baby |
Malcolm Harkins
,
Ruby A. Zefo
|
N/A |
|
Protecting Critical Infrastructure Is Critical |
Robert Hinden
|
N/A |
|
Major Cyberfraud Innovations of the Last Twelve Months |
Etay Maor
|
N/A |
|
Live mobile hacking demon and dissection! |
Jason Rader
,
Lior Ben-porat
,
Rotem Salinas
|
N/A |
|
Is DevOps Breaking Your Company? |
Elizabeth Lawler
|
N/A |
|
Internet of Threats: What’s Really Connected to the Net and Why You Care |
Trey Ford
|
N/A |
|
Inside the Boardroom: How Boards Manage Cybersecurity and Risk |
Asheem Chandna
,
Renee Guttmann
,
Aaref Hilaly
,
Michael Corey
|
N/A |
|
Gumshoes Part Deux – Security Investigative Journalists Speak Out |
Joseph Menn
,
Dan Hubbard
,
Kevin Poulsen
,
Brian Krebs
,
Nicole Perlroth
|
N/A |
|
Finally We've Got Game: Real Government Info Sharing after 15 Years of Talk |
Andy Ozment
|
N/A |
|
FBI Cyber: Leading Globally |
Charles Garzoni
|
N/A |
|
Cyber Insurance: The Next Big Thing or the Next Requirement? |
Tom Finan
,
Ben Beeson
,
Mark Massey
,
Erin Kenneally
,
Paul Ferrillo
,
Tracie Grella
|
N/A |
|
Cyber Battlefield: The Future of Conflict |
Dmitri Alperovitch
,
Jason Healey
,
Martin Libicki
,
Adam Segal
|
N/A |
|
Chosen Ciphertext Attacks in Theory and Practice |
Jean-rené Reinhard
,
Fuyuki Kitagawa
|
N/A |
|
Building The Midgardian Citadel: Active Detection and Response |
Dave Baumgartner
,
Grady Summers
|
N/A |
|
Bricks and Mortar to Bits and Bytes: A History and Future of Insider Threat |
Jesse Goldhammer
,
Michael Gelles
|
N/A |
|
Addressing The Global Supply Chain Threat Challenge: Huawei, A Case Study |
Andy Purdy
|
N/A |
|
Insider Threat and the Dark Web: Cyber Response Mini-Wargame |
Thad Allen
,
Mike Mcconnell
,
Nicole Monteforte
,
Ronald Sanders
|
N/A |
|
Combating Cyber Risk in the Supply Chain |
Joshua Douglas
|
N/A |
|
Building an Appsec Program with Sun Tzu, the Dalai Lama and Honey Badger |
Dan Cornell
|
N/A |
|
JTAGulator with |
Joe ( Kingpin ) Grand
|
N/A |
|
“Your VISA has been DEACTlVATED” – How Cybercriminals Cash In Via SMS Attacks |
Cathal Mc Daid
|
N/A |
|
Watt, Me Worry? Analyzing AC Power to Find Malware |
Benjamin Ransford
,
Denis foo Kune
|
N/A |
|
The Kelvin Mantra: Implementing Data-Driven Security Practices |
Bob Rudis
,
Stephen Boyer
|
N/A |
|
The Insider Threat in the Cloud: The Harsh Reality in Today's World |
Davi Ottenheimer
,
George Gerchow
,
Rick Hollard
,
Eric Chiu
|
N/A |
|
Should Organizations Share Threat Intel to Avoid the Next Cybergeddon? |
Anton Chuvakin
,
Richard Struse
,
Hugh Njemanze
,
Nate Lesser
|
N/A |
|
Pragmatic Metrics for Building Security Dashboards |
James Tarala
|
N/A |
|
Post-Snowden Cryptography Part I |
Paul Kocher
,
Bart Preneel
,
Adi Shamir
,
Hugo Krawczyk
,
Nigel Smart
|
N/A |
|
Modern Department of Homeland Security Cyber: Our Vision Forward |
Phyllis Schneck
|
N/A |
|
Incident Response Agility: Leverage the Past and Present into the Future |
Josh Thurston
,
Torry Campbell
|
N/A |
|
How Vulnerable Are Our Homes? - The Story of How My Home Got Hacked |
David Jacoby
|
N/A |
|
Hot Topics in Privacy: A Conversation with Facebook, Google and Microsoft |
Brendon Lynch
,
Keith Enright
,
Trevor Hughes
,
Erin Egan
|
N/A |
|
Healthcare Case Study: Beating Cybercrime, Nation-states & Insider Threats |
Jigar Kadakia
|
N/A |
|
Game of Hacks: The Mother of All Honeypots |
Maty Siman
|
N/A |
|
Enterprise Cloud: Advancing SaaS Security and Trust |
Chang Kawaguchi
,
Raji Dani
|
N/A |
|
Demystifying Cloud Security: Lessons Learned for the Public Sector |
Chad Woolf
,
Richard Hale
,
Brad Beaulieu
,
Matt Goodrich
|
N/A |
|
Defending the Cloud from the Full Stack Hack |
Erik Peterson
|
N/A |
|
Data Science Transforming Security Operations |
Alon Kaufman
|
N/A |
|
Cyber Security for Start-ups: An Affordable 10-Step Plan |
David Cowan
|
N/A |
|
Curbing Email Threats & Spearphishing– The Promise & Results with DMARC |
Craig Spiezle
,
John Sparrow
,
J Rent Adams
,
Pattrick Peterson
|
N/A |
|
Can Cyber Insurance Be Linked to Assurance? |
Larry Clinton
,
Dan Reddy
|
N/A |
|
Building a Next Generation Security Architecture |
Michael Lewis
|
N/A |
|
Breach 360: How Top Attacks Impact Tomorrow’s Laws, Litigation, Security |
Brian Honan
,
Tom Field
,
Educardo Perez
,
Jospeh Burton
,
Mathew Schwartz
|
N/A |
|
Amazing True Crimes and the Lessons They Can Teach Us |
Mark Mcgovern
|
N/A |
|
How to Develop a Security Operations Center (SOC) |
Devin Bhatt
|
N/A |
|
Data Collection for Litigation: Avoiding Privacy and Security Pitfalls |
Kenneth Mendelson
|
N/A |
|
Are Digital Anonymity and a "Right to Forget" the New Snake Oil? |
Joni Brennan
|
N/A |
|
A Dialogue on Threat Intelligence KPIs |
Rafal wh1t3rabbit Los
|
N/A |
|
You Are What You Click: Using Decoys to Identify Mobile Device Attackers |
Salvatore Stolfo
,
Joel Peterson
|
N/A |
|
What a Relief - It Works! How to Build an Insider Threat Program in One Year |
Dawn Cappelli
|
N/A |
|
Tools of the Hardware Hacking Trade |
Joe ( Kingpin ) Grand
|
N/A |
|
The Internet of Things: Revolutionary, Evolutionary or Fad? |
James Lewis
,
Sameer Bhalotra
,
Jeffrey Greene
,
Victoria Yan Pillitteri
|
N/A |
|
Stuxnet: The Real Story Behind the Digital Whodunit |
Kim Zetter
|
N/A |
|
SSLammed, SSLayed and SSLapped Around - Why Hackers Love SSL |
Grant Asplund
|
N/A |
|
Security: Meet Your New Roommate, The Dynamic Provisioning Environment |
Chris Morales
,
Jason Pappalexis
|
N/A |
|
Secure Apache Web Server with HMTL5 and HTTP 2.0 |
Brandy Mauff
|
N/A |
|
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 |
John Summers
|
N/A |
|
Preventing and Disrupting National Security Cyber Threats |
David Sanger
,
John Carlin
|
N/A |
|
Practical Advice for Embracing RASP - A New Kind of Defense |
Tyler ( Txs ) Shields
,
Jsaon Schmitt
,
Joe Sechman
,
Steve Dyer
|
N/A |
|
Post-Snowden Cryptography Part II |
Paul Kocher
,
Bart Preneel
,
Adi Shamir
,
Hugo Krawczyk
,
Nigel Smart
|
N/A |
|
Phishing Dark Waters – Defending against Malicious Emails |
Michele Fincher
|
N/A |
|
Next Wave of Security Operationalization |
Peter Lam
|
N/A |
|
Managing Expectations: The S.E.C. & F.T.C. Target InfoSEC Compliance |
Randy Sabett
,
Patrick Oot
,
David Shonka
,
Jerami Kemintz
,
Johan Davis
|
N/A |
|
Hunting the Undefined Threat: Advanced Analytics & Visualization |
Joshua Stevens
|
N/A |
|
How to Design Data Centric Security and What to Watch For? |
Ali Golshan
,
Fengmin Gong
,
Philip Martin
|
N/A |
|
Don't Touch That Dial: How Smart Thermostats Have Made Us Vulnerable |
Ray Potter
,
Yier Jin
|
N/A |
|
Don’t Get Left in the Dust: How to Evolve from CISO to CIRO |
James Christiansen
,
Bradley Schaufenbuel
|
N/A |
|
Containers vs. VMs for Secure Cloud Applications |
Christofer ( Hoff ) Hoff
,
Mark Russinovich
,
Simon Crosby
,
Scott Johnson
|
N/A |
|
Analysis of SSL and Crypto Vulnerabilities in Android Applications |
Adrian Mettler
,
Yulong Zhang
|
N/A |
|
70% of US Business Will Be Impacted by the CSF: Are You Ready? |
Tom Cunkle
,
Greg Witte
|
N/A |
|
Pragmatic SecDevOps |
Rich Mogull
,
Mike Rothman
,
Adrian Lane
|
N/A |
|
Open Garages: Learn How Technology Drives Your Car |
Craigh Smith
|
N/A |
|
How To: Aggressive Remediation in an APT World |
Jim Jaeger
|
N/A |
|
Accountability: How to Make Professional Risk a Growth Opportunity and Love It |
Karen Worstell
|
N/A |
|
Effective Security Governance in Critical Infrastructure |
Jon Standford
|
N/A |
|
How to Motivate Security and Compliance Performance & Get People to Love It |
Mike Mcalpen
|
N/A |
|
Let's Talk Security and Adoption of IPv6. Is Your Organization Ready? |
Chris Grundemann
|
N/A |
|
A Short History of Attacks on Finance |
Marutis Lucas
|
N/A |
|
Attacks on Crown Jewels: SAP Vulnerabilities and Exploits |
Mariano Nunez
|
N/A |
|
CSI Digital Crime Lab: A Virtual Whodunnit |
Amber Schroader
|
N/A |
|
There’s an App for That: How the Future of Privacy Will Be Consumer-Driven |
David Gorodyansky
|
N/A |
|
Sun Tzu Meets the Cloud: Everything Is Different, Nothing Has Changed |
Sean Jennings
|
N/A |
|
Information Technology Insights from the DoD CIO |
Terry Halvorsen
|
N/A |
|
Qigong for Health and Vitality |
Chris Shelton
|
N/A |
|
Fail-safe the Human Pysche to Advance Security and Privacy |
Theresa Payton
|
N/A |
|
2014 Hack, Exploit and Malware Retrospective...And the Worry List Ahead |
James Lyne
|
N/A |
|
The Second Machine Age |
Andrew Mcafee
|
N/A |
|
The Day My Kids Brought Home Malware |
Kellman Meghu
|
N/A |
|
Quantitative Security: Using Moneyball Techniques to Defend Corporate Networks |
Amit Mital
|
N/A |
|
Open Garages – Learn How Technology Drives Your Car |
Craig Smith
|
N/A |
|
Welcome to the New School of Cyber Defense |
Art Gilliland
|
N/A |
|
Stuck in Patterns - How Your Mind Fools You Every Day |
Doug Kevilus
|
N/A |
|
Talking ’bout My Next Generation |
Christofer ( Hoff ) Hoff
|
N/A |
|
Never, Ever, Give Up |
Diana Nyad
|
N/A |
|
What You Don't See WILL Breach You! "Intelligizing" Detection through Context |
Gaurav Kapil
,
Bryan Krekel
|
N/A |
|
Using the Cybersecurity Framework: Lessons Learned and Opportunities |
Michael Brown
,
David Simpson
,
Tim Casey
,
Steve Whitlock
,
Donna Dodson
|
N/A |
|
To Sign and Protect - COPS in OS X and iOS |
Jonathan Levin
|
N/A |
|
Terror Gone Social: The Islamic State and Social Media |
Kenneth Geers
,
James C. Foster
|
N/A |
|
Standards for Exchange of Identification Context between Federated Parties |
Pamela Dingle
|
N/A |
|
Seven Grades of Perfect Forward Secrecy |
Oleg Gyrb
|
N/A |
|
Rapid Threat Modeling Techniques |
Chad Childers
|
N/A |
|
Patching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps |
James Lyne
,
Stephen Sims
|
N/A |
|
Owning SAP ASE: Chained Database Attack |
Martin Rakhmanov
|
N/A |
|
On the Care and Feeding of Human and Device Relationships |
Ian Glazer
,
Eve Maler
|
N/A |
|
Notice of Eviction |
Phil Burdette
|
N/A |
|
More Books You Should Have Read by Now: The Cybersecurity Canon Project |
Rick Howard
|
N/A |
|
Managing the Unmanageable: A Risk Model for the Internet of Things |
Gib Sorebo
|
N/A |
|
Layered Defenses to Prevent Phishing Attacks |
Ira Winkler
|
N/A |
|
How APIs Turned Cloud Security on Its Head |
Ben Kus
,
Rajneesh Chopra
|
N/A |
|
Drones: All Abuzz with Privacy & Security Issues |
Christopher Pierson
,
James Shreve
|
N/A |
|
Cultivating a New Generation of Cyber-Workforce Talent |
Michael Kaiser
,
Cecily Joseph
,
Ann Barron-dicamillo
,
Jeffery Jacoby
|
N/A |
|
Compliance by Design: Using Innovation to Beat the Compliance Rat Race |
Robert w. Griffin
,
Hayden Delaney
|
N/A |
|
CForum: A Community Driven Solution to Cybersecurity Challenges |
Greg Witte
,
Tom Conkle
|
N/A |
|
Bug Hunting on the Dark Side |
Felix Leder
,
Tillmann Werner
|
N/A |
|
Become the Leader the Industry Needs |
Philip Casesa
|
N/A |
|
Algorithms for Solving Hard Problems |
Wei Wei
,
Koji Nuida
|
N/A |
|
Active Response: Automated Risk Reduction or Manual Action? |
Monzy Merza
|
N/A |
|
How to Spread Information Security Best Practices Virally Across Your Organization |
Miguel Saiz Serrano
|
N/A |
|
Effective Management of Key Storage Files Including Java Keystores and Oracle Wallets |
Saikat Saha
|
N/A |
|
Can Peer Collaboration Be Our Next Best Practice for Risk Management? |
Robin Slade
|
N/A |
|
Active Defense & Offensive Security: Where Are We Now and How Did We Get Here? |
Neil Wyler
|
N/A |
|
We Have Met the Future of Security and It Is Us |
David Mortman
,
Jack Daniel
,
Trey Ford
,
Katie Moussouris
|
N/A |
|
U.S. Government Initiatives for Securing the Global Supply Chain |
Joe Jarzombek
,
Nadya Bartol
,
Emile Monette
,
Dan Reddy
,
Donald Davidson
|
N/A |
|
Use of Technology in Preserving and Protecting Humanity |
Morgan Marquis-boire
,
Alex Stamos
,
Davi Ottenheimer
,
Bruce Schneier
,
Beau Woods
|
N/A |
|
Threat Intelligence Is Dead. Long Live Threat Intelligence! |
Mark Orlando
|
N/A |
|
The Truth about Cyber Risk Metrics: Connecting Vulnerabilities to Economics |
Scott Borg
|
N/A |
|
The Newest Piece of Defense-in-Depth: Social Media & DNS |
Andrew Hay
,
Evan Blair
|
N/A |
|
The Little JPEG That Could (Hack Your Organization) |
Marcus Murray
|
N/A |
|
Six Things Wireless Security Professionals Need to Know About Wireless |
Avril Salter
|
N/A |
|
Security’s Evolving Role as an Enabler to the Business |
Wendy Nather
,
Jon Ramsey
,
John Mcclurg
,
Timothy Brown
|
N/A |
|
Security Data Science: From Theory to Reality |
Bob Rudis
,
Jay Jacobs
|
N/A |
|
Please DON'T Share My Data: Imparting Sensitivity Markings on Shared Data |
Patrick Cain
|
N/A |
|
Misinforming Management |
Jack Jones
|
N/A |
|
Managing Risk in a Mobile First World |
Justin Somaini
,
Mike Kail
,
Manoj Leelanivas
,
David Giambruno
|
N/A |
|
Insider Threat Best Practice, Developing a Solid Program for Success |
Dawn Cappelli
,
Geoff Hancock
,
Pat Reidy
|
N/A |
|
Identity Proofing - Blinding the Eye of Sauron |
Paul Grassi
,
Chi Hickey
|
N/A |
|
Enterprise Acquisition of Cloud Computing Services |
Robert Hawk
,
Steve Vandenberg
|
N/A |
|
Domain Name Abuse: How Cheap New Domain Names Fuel the eCrime Economy |
Paul A. Vixie
|
N/A |
|
Dan Geer on the Future of Security |
Dan Geer
|
N/A |
|
Constructions of Hash Functions and Message Authentication Codes |
Yusi Zhang
,
Aishwarya Thiruvengadam
|
N/A |
|
Big Tech's Burden to Develop Predictive Indicators to Combat Cyber-Attacks |
Jon Stanley
,
William Rogers
,
Joseph Burton
,
Mark Silvestri
,
Rita Heimes
|
N/A |
|
Advanced Attacks: How One Exploited Endpoint Leads to Total Datacenter Breach |
Nati Davidi
,
Sebastian Goodwin
|
N/A |
|
A Case Study in Building an AppSec Program: 0–60 in 12 months |
Robb Reck
|
N/A |
|
CyberLegislation is Upon Us... But Are We Ready? |
Joshua Corman
|
N/A |
|
Third Party Supplier Governance – Secure the Supply Chain |
Puneet Kukreja
|
N/A |
|
Rapid Threat Modeling - Start Your Own Threat Model Now! |
Chad Childers
|
N/A |
|
PCI DSS and SSL: What You Need to Know in 2015 |
Troy Leach
|
N/A |
|
Continuous Network Compliance: Finding Flaws and Betting Futures |
Alan Shimel
|
N/A |
|
Best Practice or Bust? Test Your Approach to Third-Party Risk |
James Christiansen
|
N/A |
|
Vulnerability and Risk Scoring: What Ratings Really Mean |
Tyler Reguly
|
N/A |
|
The Evolution of Threats Targeting Industrial Control Systems |
Frank Marcus
|
N/A |
|
Cyber Bullying, Revenge Porn and the Work Place |
Lawrence Dietz
|
N/A |
|
Can DNSSEC and DANE Add a Layer Of Trust to TLS and DNS? |
Wes Hardaker
|
N/A |
|
Automate or Die! How to Scale and Evolve to Fix Our Broken Industry |
Ben Tomhave
|
N/A |
|
Want to be Secure in the Cloud? Build a Casino |
Joan Pepin
|
N/A |
|
WestJet’s Security Architecture Made Simple—We Finally Got It Right! |
Richard Silito
|
N/A |
|
Use Context to Improve Your User Identification Odds |
Eve Maler
|
N/A |
|
The Third Rail: New Stakeholders Tackle Security Threats and Solutions |
Ted Ross
|
N/A |
|
There’s a Cougar in the Car – Quickly Navigating through a Cyber Crisis |
Dave Baumgartner
,
David White
,
Mike Mcconnell
,
David Lashway
,
Patrick Gorman
|
N/A |
|
There Are No Domestic Cyber Issues: US & UK Leaders on Global Partnership |
Natalie Black
,
Michael Daniel
|
N/A |
|
The Legal Pitfalls of Failing to Develop Secure Cloud Services |
Cristin Goodwin
,
Edward Mcnicholas
|
N/A |
|
Surviving SOC2 – The Why and How for Cloud Service Providers |
Shaun Gordon
|
N/A |
|
Secure Multi-party Computation |
Antigoni Polychrondiadou
,
Handan Kilinc
|
N/A |
|
POSitively under Fire: What Are Retailers Facing? |
Sean Mason
|
N/A |
|
Pass-the-Hash II: The Wrath of Hardware |
Nathan Ide
|
N/A |
|
Malware Persistence on OS X Yosemite |
Patrick Wardle
|
N/A |
|
LTE Security - How Good Is It? |
Joshua Franklin
,
Jeff Cichonski
|
N/A |
|
Limiting the Spread of Threats: A Data Center for Every User |
Geoff Huang
,
Tony Paikeday
|
N/A |
|
Lie. Cheat. Deceive. How to Practice the Art of Deception at Machine Speed |
Jason Bird
|
N/A |
|
Gamification of your Global Information Security Operations Center |
Kevin Mclaughlin
,
Kody Mclaughlin
|
N/A |
|
Full Disclosure: What Companies Should Tell Investors about Cyber Incidents |
Jacob Olcott
,
Smeeta Ramarathnam
,
Jonas Kron
|
N/A |
|
Evolving Security Operations and Sharing at Net Speed |
Peter Fonash
,
Paul Nguyen
,
Brian Biesecker
,
Darlene Renee Tarun
,
Philip Quade
|
N/A |
|
Epidigitalogy: Surveying for Digital Diseases like an Epidemiologist |
Efrain Ortiz
|
N/A |
|
Endpoints in the New Age: Apps, Mobility and the Internet of Things |
Benjamin Jun
|
N/A |
|
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices |
Andrew Blaich
|
N/A |
|
Deconstructing Incident Response |
Richard George
,
Martin Nystrom
,
Bret Hartman
,
James Todd
|
N/A |
|
You’ve Been Warned: iBeacons to Bring a Tsunami of Change to Data Security |
Gabriel Kang
|
N/A |
|
You Can’t Stop What You Can’t See |
Grant Geyer
,
Jared Myers
|
N/A |
|
When Will InfoSec Grow Up? |
David Mortman
,
Alex Hutton
,
Jack Jones
,
John Johnson
|
N/A |
|
Using an Open Source Threat Model for Prioritized Defense |
James Tarala
|
N/A |
|
True Cost of Fraud and Cybercrime Against Your Mobile Channel |
Charles Mccolgan
,
Mark Crichton
|
N/A |
|
The Internet of TR-069 Things: One Exploit to Rule Them All |
Shahar Tal
,
Lior Oppenheim
|
N/A |
|
States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent |
Tim Hastings
,
Thomas Maclellan
,
Srini Subramanian
,
Christopher Ipsen
|
N/A |
|
Security Hopscotch |
Chris Roberts
|
N/A |
|
Making Threat Intelligence Actionable: Recommending Responses with STIX |
David Mcgrew
,
Jyoti Verma
|
N/A |
|
Lock Your Front Door: Protecting Patient Portals |
David Finn
,
Steve Johnson
,
Debiie Bucci
,
Lee Barrett
|
N/A |
|
Is Your Third-Party Service Provider Vendor Management Program Good Enough? |
Patrice Coles
|
N/A |
|
Identithication: Convergence of Identity and Authentication - A Rock Opera |
Bob Blakley
,
Eve Maler
,
Josh Alexander
,
Charisse Castagnoli
|
N/A |
|
How One Smart Phone Picture Can Take Down Your Company |
Larry Ponemon
|
N/A |
|
Following the Sun: A Worldwide View of Cybersecurity Laws and Regulations |
Larry Clinton
,
Jessica Gulick
,
Gene Fredriksen
,
James Jalpert
|
N/A |
|
Common IAM Flaws Plaguing Systems after Years of Assessment |
John Steven
|
N/A |
|
Bug Bounties: Internet Savior, Hype or Somewhere Between? |
Chris Evans
,
Jake Kouns
,
Casey Ellis
,
Nate Jones
|
N/A |
|
Beware the Cloudpocolypse: A Panel on Cloud Security from Cloud Providers |
Jim Reavis
,
Bart Vansevenant
,
Hugh Tatton-brown
,
Patrick Foxhoven
|
N/A |
|
Automating Security Workflows: The SDDC Approach |
Catherine Fan
,
Joshua Soto
|
N/A |
|
Authenticated Encryption |
Yu Sasaki
,
Christoph Dobraunig
|
N/A |
|
Analogue Network Security |
Winn Schwartau
|
N/A |
|
Wait! Wait! Don't Pwn Me! |
Mark S. Miller
|
N/A |
|
Leadership Lessons of History: American Presidents |
Doris Kearns Goodwin
|
N/A |
|
Security – Rewritten by the Application Economy |
Amit Chatterjee
|
N/A |
|
Into the Woods: Protecting Our Youth from the Wolves of Cyberspace |
Lance Spitzner
,
Sandra Toms
,
Alicia Kozakiewicz
,
Michael Osborn
,
Sharon W Cooper
|
N/A |
|
Advanced Strategies for Defending Against a New Breed of Attacks |
Martin Roesch
|
N/A |
|
The Terrorist’s Son – A Story of Choice |
Zak Ebrahim
|
N/A |
|
Phishing for the Phoolish: Why Hackers Love Gilligans and Their Best Lures |
Grant Asplund
|
N/A |
|
Stop Selling and Start Marketing Your Information Security Program |
Thom Langford
|
N/A |
|
Renewing the Patriot Act |
Richard P. Salgado
,
James Lewis
,
Mike Rogers
|
N/A |
|
The Sound of Metrics |
David Scott
|
N/A |
|
The Economics of Online Identity: 6 Buzzwords to Impress your Boss |
Michael Garcia
|
N/A |
|
Security Humanitarianism: Extraordinary Examples of Tech Improving Lives |
Davi Ottenheimer
|
N/A |
|
Evolution of Hackers and Reverse Incident Response |
Alex Holden
|
N/A |
|
Operationalizing Threat Intelligence |
Brandon Hoffman
|
N/A |
|
Mindfulness: Leadership from Within |
Jennifer Minella
|
N/A |
|
Designing your Cloud Security Reference Architecture |
Pete Lindstrom
|
N/A |
|
Behind Enemy Lines: Security in a Hostile Environment |
Don Kendrick
|
N/A |
|
We're Gonna Need a Bigger Boat |
Alan Ross
,
Grant Babb
|
N/A |
|
Vulnerability Management Nirvana: A Study in Predicting Exploitability |
David Severski
,
Michael Roytman
,
Kymberlee Price
|
N/A |
|
To Swipe or Not to Swipe: A Challenge for Your Fingers |
Yulong Zhang
,
Tao Wei
|
N/A |
|
Top 10 Web Hacking Techniques of 2014 |
Matt Johansen
,
Jonathan Kuskos
|
N/A |
|
The Six Most Dangerous New Attack Techniques and What's Coming Next |
Ed Skoudis
,
Michael J. Assante
,
Johannes Ullrich
,
John Pescatore
|
N/A |
|
The Emperor’s New Password Manager: Security Analysis of Password Managers |
Zhiwei Li
|
N/A |
|
Side-Channels in the 21st Century: Information Leakage from Smartphones |
Gabi Nakibly
,
Yan Michalevsky
|
N/A |
|
Securing Boomers, Gen Xers And Gen Yers: OMG We Are So Different! |
Todd Fitzgerald
|
N/A |
|
Next Generation Healthcare Security |
Frank Kim
|
N/A |
|
Network Security and Operations When the Network Is Already Compromised |
Eric Cole
|
N/A |
|
IoT: When Things Crawl into Your Corporate Network |
Sam Curry
,
Uri Rivner
|
N/A |
|
Hunted to the Hunter |
Clinton Firth
,
Stephen Brennan
|
N/A |
|
How Security Can Be the Next Force Multiplier in DevOps |
Andrew Storms
|
N/A |
|
Do You Know What You Don't Know? |
Marcus Sachs
|
N/A |
|
Detecting and Tracing Malicious Activities |
Satsuya Ohata
,
Essam Ghadafi
|
N/A |
|
Cybersecurity: You’re Doing IT Wrong |
Jared Carstensen
|
N/A |
|
Cyber Security and Aviation |
Lawrence Dietz
,
Erroll Southers
|
N/A |
|
Cyber Ranges – A Strategic Outlook |
Michael Brown
,
William J. Adams
,
Cheri Caddy
,
Guy Walsh
,
Tim Polk
|
N/A |
|
Chipping: The Next Litigation Issue on the Horizon |
John Jorgensen
,
Serge Jorgensen
,
Eric Hibbard
,
Lauren X Topelsohn
|
N/A |
|
CANCELLED: Zero Knowledge Security |
Martin Mckeay
|
N/A |
|
Website Counterintelligence: Leveraging Web Logs to Gather Intelligence |
Lance Cottrell
|
N/A |
|
Updating Surveillance Law on Government Access to Your Online Data |
Richard P. Salgado
,
James Dempsey
|
N/A |
|
Understanding Threats Using Big Data and Contextual Analytics |
David Dufour
|
N/A |
|
The Physics of Security |
Andrew Rutiewicz
|
N/A |
|
The Library of Sparta: Applying Military Doctrine to Cybersecurity |
Greg Conti
,
Tom ( Decius ) Cross
,
David Raymond
|
N/A |
|
Securing Active Directory Correctly |
Derek Melber
|
N/A |
|
Secure Graphical Passwords |
Peter Robinson
|
N/A |
|
Secure Application Development with Go |
Nick Galbreath
|
N/A |
|
Risk & Compliance Management for Private & Hybrid Cloud Deployments |
Hemma Prafullchandra
,
Randal Asay
,
Edward Shortnacy
,
Rodolphe Simonetti
|
N/A |
|
PORTAL: Open Source Secure Travel Router for International Adventure |
Ryan Lackey
,
Marc Rodgers
|
N/A |
|
Mobility and the Law: Protecting Your M-Info |
Jay Brudz
,
Aaron Crews
,
Ralph Poore
,
Sandra Lambert
,
Stephen Wu
|
N/A |
|
Minimizing the PCI Footprint: Reduce Risk and Simplify Compliance |
Troy Leach
|
N/A |
|
Inside the World of Java Applets |
Abhishek Singh
,
Varun Jain
|
N/A |
|
Implementation Attacks on Exponentiation Algorithms |
Michael Tunstall
,
Dale Sibborn
|
N/A |
|
General Alexander: Life After the NSA |
Ted Schlein
,
Keith b. Alexander
|
N/A |
|
Cybersecurity Awareness is a Big Deal for Small Business |
Andy Ozment
,
Michael Kaiser
,
Duncan Logan
,
William O Connell
|
N/A |
|
CSOC for Critical Infrastructure Protection |
Timothy Lee
|
N/A |
|
Avoiding the 'Creepy Factor' in Biometric and Other Technologies |
Thomas Keenan
|
N/A |
|
Are You Giving Firmware Attackers a Free Pass? |
Xeno Kovah
,
Corey Kallenberg
|
N/A |
|
Android Security: Data from the Front Lines |
Adrian Ludwig
|
N/A |
|
(ISC)2® CSSLP® CBK® Training Preview Seminar |
James Kelath
|
N/A |
|
(ISC)2® CISSP-ISSMP® CBK® Training Preview Seminar |
Barbara Johnson
|
N/A |
|
A Case Study for Building Cybersecurity Policies for Industrial Robots |
Francis Cianfrocca
,
Bryce Barnes
|
N/A |
|
Hugh Thompson and Guests |
Hugh Thompson
,
Alec Bladwin
,
Srini Pillay
|
N/A |
|
What Trusted Computing History Teaches Us about Today's Challenges |
Robert Bigman
|
N/A |
|
Wargaming for the Boardroom: How to Have a Successful Tabletop Exercise |
David Navetta
,
Serge Jorgensen
|
N/A |
|
UMA in Health Care: Providing Patient Control or Creating Chaos? |
David Staggs
|
N/A |
|
The Sophisticated Attack Myth: Hiding Unsophisticated Security Programs |
Ira Winkler
,
Araceli Tre Gomes
|
N/A |
|
The Art of Thinking Security Clearly |
Augusto Barros
|
N/A |
|
Taking a Business Risk Portfolio (BRP) Approach to Information Security |
Johna Till Johnson
|
N/A |
|
Supply Chain as an Attack Chain: Key Lessons to Secure Your Business |
Benjamin Jun
,
Tony Gaidhane
,
Sam Philips
,
Scott Stephens
|
N/A |
|
STIX in Practice for Incident Response |
Freddy Dezeure
|
N/A |
|
Securing the Grid: Opportunities and Risks in Operational Technology |
Mark Weatherford
,
Michael J. Assante
,
Andy Ozment
,
Marty Edwards
,
Robert Butler
|
N/A |
|
Realities of Private Cloud Security |
Scott Carlson
|
N/A |
|
New Trends In Cryptographic Algorithm Suites Used for TLS Communications |
Shay Gueron
|
N/A |
|
News Flash: Some Things Actually Do Work in Security!!! |
John Pescatore
|
N/A |
|
Mobile Security Shootout - Which Smartphones Are Up to the task? |
Chet Wisniewski
|
N/A |
|
Medical Device Security: Assessing and Managing Product Security Risk |
Russell Jones
,
John Lu
|
N/A |
|
Homomorphic Encryption and Its Applications to DRM |
Qiang Tang
,
Guilhem Castagnos
|
N/A |
|
Game Consoles & Mobile Device Security: A Model for the Internet of Things |
Matthew Clapham
|
N/A |
|
Defending against State-Sponsored Cyber Theft of Intellectual Property |
Catherine Lotrionte
,
Stewart a. Baker
,
Luke Dembosky
,
Sean Kanuck
|
N/A |
|
Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies |
Wayne Huang
,
Fyodor Yarochkin
,
Danny Yang
,
Charlie Lee
,
Kristov Atlas
|
N/A |
|