RSAChina 2012 Aug. 28, 2012 to Aug. 29, 2012, Chengdu, China
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
SSRF: The New Threat For Business-Critical Applications | Alexander mikhailovich Polyakov | Most business applications like SAP are secured from attackers by firewalls, DMZs and internal ACLs, ... | Security |
Effective Auditing & Key Management under Evolving Regulatory Challenges | Tatu Ylonen | An evolving regulatory framework in China poses requirements for strong authentication, control and auditing of ... | Security |
Keys and Clouds: Strategies for Key Management in the Hybrid Cloud | Robert w. Griffin | The rapid increase in the use of hybrid cloud services also increases the risk of ... | Security |
Security Development Processes & Mitigation Tools to Help Protect Against Cyber Criminals | Xue Feng | The threat landscape has evolved over the past ten years in dramatic and unexpected ways, ... | Security |
Software-Defined Networks and Security | Zang Tiejun | Transforming a traditional IT framework to a virtual one and planning for a cloud network ... | Security |
Encrypt Your Cloud | Davi Ottenheimer | This presentation provides a look at how encryption is being built into Cloud environments. The ... | Security |
Security as a Service in Action | Zheng Lin | This session will focus on the experience sharing of SeaaS in action. In this session, ... | |
The 7 Deadly Sins: 7 Security Mistakes Enterprises Make When They Move to the Cloud and How to Avoid Them! | Dave Elliott | As enterprises move to the cloud, security professionals must protect information in a world with ... | Security |
Smartphone Security Winners & Losers | Cesare Garlati | Android is the most popular mobile platform in the world. It is also the most ... | Security |
Open Platform Security for Mobile Internet | Li Tieyan | Mobile applications are growing rapidly in the world and China is leading the wave. Despite ... | Security |
The Privacy Protection of Location Services that are Based on Mobile Internet | Wang li Na | "As the number of applications for Mobile Location Services (MLS) increase so does the concern ... | Security |
NFC Technologies for Secure Mobile Payment | Ciaran Fisher | With over 100 million mobile NFC devices estimated to ship in 2012 and NFC mobile ... | |
Identifying, Valuing, and Protecting Informational Assets | Branden R. Williams , Jason Rader | Common advice among security professionals in 2012 is to seek out and understand high-value digital ... | |
Testing Darwinism: The History and Evolution of Network Resiliency | Mike Hamilton | Ensuring network security, performance, and reliability must be a key corporate objective. The history of ... | |
Analysis, Research, and Practice of Chinas Domain Names | Chen Zhong | "The main speech analyses the research on aspects of domestic and foreign domain name system ... | Security |
The Growing Threat of Embedded Hacking | Stuart Mcclure | The computing world has moved from a purely virtual to a real world physical. Everything ... | |
Sharing Threat Intelligence Analytics for Collaborative Attack Analysis | Samir Saklikar | This session discusses how sharing structured information about the security incident analytics process between organizations ... | |
Cybercrime Trends in Asia | Michal Blumenstyk-braverman | This session will discuss the latest trends and development in the underworld and how they ... | |
Reshaping Enterprise Security Architecture Under Today's Threat Landscape | Ma Weiyan | The evolution of internet security threats in 2011, the much-focused malicious code or the emerging ... | Security |
Message in a Bottle: Finding Hope in a Sea of Security Breach Data | Davi Ottenheimer | Breach data is now available from a wide variety of sources and perspectives. This session ... | Security |
New Developments in Trustworthy Computing | Zhang Huanguo | Trustworthy Computing has ten years of development and important achievements. In development there have been ... | Security |
To Enable Trusted Computing In Cloud and Enterprise | Ryan Wu | This session will focus on 3 topics: 1.Introduction of Trusted Computing technology, including the commercial ... | |
Trusted Computing's Successful Application Trusted & Software Defined Network | Mao Wenbo | Rounding a multi-tenant cloud data center with a firewall is no longer meaningful as doing ... | |
Pre-boot Security Vision Threats & Defense Beyond the OS | Long Qin , Gao Zhan | Firmware threats and security are attracting more and more attentions from hackers and researchers. Its ... | |
Remote Attestation Based on Trusted Computing Technology | Chen Kai | With the rapid development of cloud computing and mobile Internet, the state of device health, ... |