RSAC2020 2020 Feb. 24, 2020 to Feb. 28, 2020, San Francisco, US
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Accelerate Threat Detection and Response in Modern Networks (Rapid7) | N/a | With sprawling environments, multiple clouds, and businesses dependency on IT, security is challenged to keep ... | |
BEC: Fighting a $26 Billion Phishing Problem (Agari) | N/a | Phishing via non-technical social engineering methods, such as business email compromise, now costs businesses more ... | |
Keynote: Reality Check: The Story of Cybersecurity | Rohit Ghai | It’s our stories that make us human. We love a memorable narrative and often exaggerate ... | |
Keynote: Time to Tell | Steven Grobman | The sun rises and sets like clockwork, and yesterday’s innovations are gone tomorrow. Except, it ... | |
Keynote: We the People: Democratizing Security | Wendy Nather | The industry is still building security based on an outdated model. Where enterprises used to ... | |
The Cryptographers’ Panel | Whitfield Diffie , Ronald l. Rivest , Zulfikar Ramzan , Adi Shamir , Arvind Narayanan , Tal Rabin | Each year the founders and leaders of the cryptography field take the RSA Conference keynote ... | |
Keynote: Cybersecurity Has a Posse | Heather Krebs | Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs will participate in a fireside ... | |
Keynote: Fear and Loathing in Cybersecurity: An Analysis of the Psychology of Fear | Dr. Jessica Barker | For too long, the cybersecurity industry has attempted to use FUD to engage with the ... | |
Consent, Alignment and Cooperation in the Internet Era | Dr. Paul Vixie | Much of the spectrum of human action and human custom translates more or less from ... | |
The Journey of Cybersecurity in Kuwait’s Oil and Gas Industry | Dr. Reem Al-shammari | The journey of cybersecurity in Kuwait’s oil and gas (O&G) industry encompasses the establishment of ... | |
Panel Discussion: Open Source: Promise, Perils and the Path Ahead | Diana Kelley , Lenny Zeltser , Ed Moyle , Inigo Merino , Dr. Kelley Misata | This informative discussion will explore security ramifications and implications of open source tools as well ... | |
Cybersecurity Tips, Tools and Techniques: Updated for 2020 | Ron Woerner | This rapid-fire presentation, updated from 2019, showcases apps and sites used in cybersecurity testing, investigations, ... | |
Imagining the Future of Security | Heather Vescent | The foresight process can help imagine a range of possible futures and a set of ... | |
Hot Topics in Cyber-Law 2020 | Michael Aisenberg , Lucy Thomson , Stephen Wu , Catherine Barrett | ABA information security leaders kick off the Law Track with the annual panel on critical ... | |
Leading Change: Building a Security Culture of Protect, Detect and Respond | Lance Spitzner | Cybersecurity is no longer just about technology; it is ultimately about organizational change. Change in ... | |
Using the Hacker Persona to Build Your DevSecOps Pipeline | Dr. Yeman | The requirement to build mission critical capabilities faster while ensuring the capabilities are secure and ... | |
It’s All about the States: Navigating the Privacy Thicket | Behnam Dayanim | In the wake of Europe’s landmark GDPR and in the face of federal legislative inaction, ... | |
Shodan 2.0: The World’s Most Dangerous Search Engine Goes on the Defensive | Dr. Michael Mylrea | Shodan has been called the world’s most dangerous search engine that can hack IoT with ... | |
The Power of Cooperation: Why Cybersecurity Risks Need Public-Private Punch | Tim Clarke | Sophisticated, unrelenting cyberthreats are forcing IT and business leaders to find more effective solutions. Learn ... | |
Enterprise Incident Management: How to Get Everyone Ready for a Crisis | Erin Becker | Erin Becker will talk about how Target built an enterprise cyber-response program, structured the team ... | |
Balancing UX and Secure Banking in a Fast Transforming Industry | Boudewijn Valk | The digital transformation of the financial sector leads to customers expecting an experience as offered ... | |
Break the Top 10 Cloud Attack Killchains | Shawn Mogull | As cloud adoption matures, so do cloud attacks. This session will highlight the top 10 ... | |
Panel Discussion: Coordinating a Competitive 5G Strategy among Freemarket Democracies | Michael Chertoff , Arthur W. Coviello , Admiral Dennis Blair , William Roth , Christy Wyatt | Huawei’s potential domination of 5G markets brings with it significant economic and national security risks. ... | |
5 Ways to Break the Cloud (and How to Mitigate against Them) | (cyberark) | As businesses continue to move critical infrastructure to cloud environments, attackers are more motivated than ... | |
Speed Networking Morning Session | Britta Malik | It’s not quite Musical Chairs or Twister, and it’s definitely not Pin the Tail on ... | |
Imagining a Civilized Internet | Jeff Klaben | It is time to expect and demand more civilized behavior on the Internet. Adopting more ... | |
Generic Attack on Iterated Tweakable FX Constructions | Ferdinand Sibleyras | N/A | |
Universal Forgery Attack against GCM-RUP | Gaetan Leurent , Meiqin Wang , Wei Wang , Ferdinand Sibleyras , Yanbin Li , Guoyan Liu | N/A | |
Detect and Respond to Enterprise IoT Threats on the Network (Extrahop) | N/a | By 2020, more than half of all Internet-connected devices will be for IoT applications. How ... | |
APIs: Transformative or Destructive? | Arxan Technologies | API access has changed app development – and how data is accessed – creating massive ... | |
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed! | Netskope | Security teams are constantly keeping up with complex attacks leveraging the cloud, but traditional security ... | |
IAST—How DAST Solutions Can Be Maximized through IAST | Acunetix | This session will go through the definition of a DAST solution including its strengths and ... | |
Be Proactive: Secure Your Data Now | Oracle | Today’s bad actors are smart - and well-funded. Organizations must be more vigilant now than ... | |
Scaling-UP & Automating Your Web Application Security in this Brave New World | Netsparker | Session will explore how to get started working with RESTful APIs in the context of ... | |
How to Deploy Secure Technologies to Help Reduce eCommerce Fraud | William Newhouse | E-commerce fraud costs businesses billions of dollars each year. Strengthening user authentication can help mitigate ... | |
Forensic Techniques against Hackers Evading the Hook | Mike Januszkiewicz | Cybercrime is a very lucrative business, because it’s quite easy to get away with it. ... | |
Insider Threats—When Is It Too Late? | Jacqueline Collins | Based on case trends from the last five years, the Department of State’s Insider Threat ... | |
Protect Privacy in a Data-Driven World: Privacy-Preserving Machine Learning | Casimir Wierzynski | Combining AI and privacy doesn’t have to be a zero-sum game. An exciting set of ... |