RSAChina 2012 Aug. 28, 2012 to Aug. 29, 2012, Chengdu, China

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
SSRF: The New Threat For Business-Critical Applications Alexander mikhailovich Polyakov Most business applications like SAP are secured from attackers by firewalls, DMZs and internal ACLs, ... Security
Effective Auditing & Key Management under Evolving Regulatory Challenges Tatu Ylonen An evolving regulatory framework in China poses requirements for strong authentication, control and auditing of ... Security
Keys and Clouds: Strategies for Key Management in the Hybrid Cloud Robert w. Griffin The rapid increase in the use of hybrid cloud services also increases the risk of ... Security
Security Development Processes & Mitigation Tools to Help Protect Against Cyber Criminals Xue Feng The threat landscape has evolved over the past ten years in dramatic and unexpected ways, ... Security
Software-Defined Networks and Security Zang Tiejun Transforming a traditional IT framework to a virtual one and planning for a cloud network ... Security
Encrypt Your Cloud Davi Ottenheimer This presentation provides a look at how encryption is being built into Cloud environments. The ... Security
Security as a Service in Action Zheng Lin This session will focus on the experience sharing of SeaaS in action. In this session, ...
The 7 Deadly Sins: 7 Security Mistakes Enterprises Make When They Move to the Cloud and How to Avoid Them! Dave Elliott As enterprises move to the cloud, security professionals must protect information in a world with ... Security
Smartphone Security Winners & Losers Cesare Garlati Android is the most popular mobile platform in the world. It is also the most ... Security
Open Platform Security for Mobile Internet Li Tieyan Mobile applications are growing rapidly in the world and China is leading the wave. Despite ... Security
The Privacy Protection of Location Services that are Based on Mobile Internet Wang li Na "As the number of applications for Mobile Location Services (MLS) increase so does the concern ... Security
NFC Technologies for Secure Mobile Payment Ciaran Fisher With over 100 million mobile NFC devices estimated to ship in 2012 and NFC mobile ...
Identifying, Valuing, and Protecting Informational Assets Branden R. Williams , Jason Rader Common advice among security professionals in 2012 is to seek out and understand high-value digital ...
Testing Darwinism: The History and Evolution of Network Resiliency Mike Hamilton Ensuring network security, performance, and reliability must be a key corporate objective. The history of ...
Analysis, Research, and Practice of Chinas Domain Names Chen Zhong "The main speech analyses the research on aspects of domestic and foreign domain name system ... Security
The Growing Threat of Embedded Hacking Stuart Mcclure The computing world has moved from a purely virtual to a real world physical. Everything ...
Sharing Threat Intelligence Analytics for Collaborative Attack Analysis Samir Saklikar This session discusses how sharing structured information about the security incident analytics process between organizations ...
Cybercrime Trends in Asia Michal Blumenstyk-braverman This session will discuss the latest trends and development in the underworld and how they ...
Reshaping Enterprise Security Architecture Under Today's Threat Landscape Ma Weiyan The evolution of internet security threats in 2011, the much-focused malicious code or the emerging ... Security
Message in a Bottle: Finding Hope in a Sea of Security Breach Data Davi Ottenheimer Breach data is now available from a wide variety of sources and perspectives. This session ... Security
New Developments in Trustworthy Computing Zhang Huanguo Trustworthy Computing has ten years of development and important achievements. In development there have been ... Security
To Enable Trusted Computing In Cloud and Enterprise Ryan Wu This session will focus on 3 topics: 1.Introduction of Trusted Computing technology, including the commercial ...
Trusted Computing's Successful Application Trusted & Software Defined Network Mao Wenbo Rounding a multi-tenant cloud data center with a firewall is no longer meaningful as doing ...
Pre-boot Security Vision Threats & Defense Beyond the OS Long Qin , Gao Zhan Firmware threats and security are attracting more and more attentions from hackers and researchers. Its ...
Remote Attestation Based on Trusted Computing Technology Chen Kai With the rapid development of cloud computing and mobile Internet, the state of device health, ...