RSA USA 2013 Feb. 25, 2013 to March 1, 2013, San Francisco, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Big Data Redefines Security | Jr. , Arthur Coviello | "Welcome to a universe of Big Data, the next wave in Information Technology. Big data ... | |
Making a Case for Security Optimism | Scott Charney | Security issues have always been industry issues. There is no silver bullet and there is ... | Introductory IncludeThinkstScapes Defence |
Building a Higher Order of Security Intelligence | Francis Desouza | Security professionals have reached a turning point where the solutions and methods of the past ... | Security |
The Cryptographers' Panel | Dan Boneh , Whitfield Diffie , Dr. ari Juels , Ron Rivest , Adi Shamir | Join the founders and leaders of the field for an engaging discussion about the latest ... | |
Building and Securing Aadhaar – the World's Largest National ID System | Srikanth Nadhamuni | "The Government of India embarked on an ambitious National ID project in 2009 called Aadhaar ... | Security |
The Freedom to Be Who You Want to Be: Strong Authentication and Pseudonymity on the Internet | Vint Cerf | There are different ways people choose to identify themselves (or not) on the Internet. Attribution ... | Introductory IncludeThinkstScapes Internet of Things |
The Hyperconnected World of Intelligent Devices: A New Era for Security | Philippe Courtot , John Pescatore | "The hyperconnected world of intelligent devices is now today's reality. We live in a new ... | |
Securing the Data Center's Future Today | Christopher Young | Virtualization and Software Defined Networking are game changers for the next generation data center, enabling ... | Security |
The New Fundamentals of Security | Mike Fey | "McAfee's Worldwide CTO, Michael Fey, warns the current trajectory of the security landscape will lead ... | Security |
Democracy and the Internet | Jimmy Wales | Freedom of speech and the distribution of knowledge is the foundation of Wikipedia. Jimmy Wales ... | Security |
Pandora's Box Meets the Sword of Damocles: Curtailing Cyber Abuse | David Kirkpatrick , Sameer Hinduja , Joe Sullivan | "Six years ago RSA Conference featured a panel in which the danger to children from ... | |
Criminal Education: Lessons from the Criminals and their Methods | Art Gilliland | Market forces are organizing our adversaries, driving cooperation, specialization and efficient predatory behavior. Their rapid ... | Security |
The Lifecycle of Cybercrime | Nicholas J. Percoco , Erik Rasmussen | Trustwave and the U.S. Secret Service will highlight cybercrime trends from forensic investigations compiled in ... | |
Mind over Matter: Managing Risk with Psychology Instead of Brute Force | Andy Ellis | "Risk management is not a science... it's an art. To manage risk effectively, we need ... | Security |
How Gaming Can Make a Better World | Jane Mcgonigal | Drawing on the latest findings in psychology, cognitive science and sociology, video game developer Jane ... | Security |
The Hugh Thompson Show | "herbert 'hugh' Thompson , " | Internet security guru and bestselling author Dr. Herbert "Hugh" Thompson has seen it all –– ... | |
Remarks by Condoleezza Rice | Condoleezza Rice | In this inspiring presentation, Rice provides a sweeping look at global affairs discussing how recent ... | Security |
Government Forum: New Directions from the White House | Michael Chertoff , Jim Lewis , Michael Daniel , Eric Rosenbach | "The last three months have seen major developments in U.S. cybersecurity policy with a Presidential ... | |
007 or DDOS: What is Real-world Cyber Policy? | Speaker: michael Daniel , Cybersecurity Coordinator , The white House | "Special Assistant to the President and White House Cybersecurity Coordinator Michael Daniel, discusses the Administration's ... | |
The FBI and the Private Sector: Safeguarding Our Cyber Security | Federal Investigation , Director , Speaker: Mueller , Iii | "Director Mueller will address the cyber threat to our national security. Intrusions and network attacks ... | |
Data Analysis & Visualization for Security Professionals | Jay Jacobs , Bob Rudis | Introductory IncludeThinkstScapes Visualisation | |
Combating the Insider Threat: Real World Lessons | Patrick Reidy , Kate Randal | Introductory IncludeThinkstScapes Insider Threat |