RSA

Category: Content
Type: Youtube Video

Generated 4 days ago

New videos detected

  • The Knowledge Illusion with Steven Sloman

    How have we achieved so much despite understanding so little? Whilst individuals know very little, the collective mind knows a lot. Acclaimed cognitive scientist Steven Sloman explains how we survive and thrive despite our mental shortcomings, because we live in a rich community of knowledge. The key to our intelligence lies in the people and things around us. Watch Steven Sloman, cognitive scien...

RSA

Category: Content
Type: Youtube Video

Generated 4 days ago

New videos detected

  • Stop the Spread of Fear, Uncertainty and Doubt

    Keren Elazari, Analyst, Author and Senior Researcher at Blavatnik Interdisciplinary Cyber Research Center, Tel Aviv University, currently fields millions of messages from hackers from around the world responding to her clarion call that hackers can save the day. Her advice on how to change the world? First, as a responsible security professional, eliminate the FUD: fear, uncertainty and doubt. Ela...

RSA

Category: Content
Type: Youtube Video

Generated 4 days ago

New videos detected

  • Hackers Can Change the World

    Trust and safety should be our new industry goal, argues Keren Elazari, Analyst, Author and Senior Researcher at Blavatnik Interdisciplinary Cyber Research Center, Tel Aviv University. No longer is it just about protecting our credit card data, our Facebook friends or unlocking our private and most intimate wishes. While this continues to be important, we need to focus on securing our new modern, ...

RSA

Category: Content
Type: Youtube Video

Generated 4 days ago

RSA

Category: Content
Type: Youtube Video

Generated 4 days ago

New videos detected

  • The Future of Cyber Security | Keren Elazari | RSAC 2017

    In her RSAC 2017 talk on the "Cyber Circus" Keren Elazari, Analyst, Author and Senior Researcher at Blavatnik Interdisciplinary Cyber Research Center, Tel Aviv University, explains that it really insn't about any secrets anymore. Its not about hiding from Big Brother. Trust is at the core of the future of the cyber security. https://www.rsaconference.com/events/us17/

RSA

Category: Content
Type: Youtube Video

Generated 4 days ago

RSA

Category: Content
Type: Youtube Video

Generated 4 days ago

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • DEMO: The Anatomy of Ransomware

    Ransomware has become increasingly pervasive -- but effective -- as a form of cybercrime. James Lyne, Global Head of Security Research, Sophos & SANS, walks RSAC 2017 attendees through a demo of how ransomware victimizes unsuspecting users. With humor and amusing examples, Lyne talks through numerous examples showing how cyber criminals use the internet to piece together ransomware to create crypt...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • DEMO: Uncovering IoT Vulnerabilities in a CCTV Camera

    James Lyne, Global Head of Security Research, Sophos & SANS, discusses how IoT security concerns have lacked specificity on what the real issues are -- until recently. Lyne demonstrates how he assesses a CCTV camera for vulnerabilities and finds a total lack of security -- borderline humorous. Username: Admin. Digging around in the binary and firmware is just one way for hackers to tap into IoT ...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • Captain Unhook: How to Bypass Everything… Literally

    Stuart McClure, CEO of Cylance, Inc., walks through a series of live demos: 1) Unhooking "Captain Unhook" 2) Boyson: Network Device Ransomware 3) BIOS Ransomware McClure dives into the anatomy of a hack—from the modules being loaded into the process all the way down to comparing the clean and current versions. In user-land, malicious processes have the same access to hooks as the security prod...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • Disrupting the Disruptors: How to Use Machine Learning to Unseat Cyber Criminals

    Mark Russinovich, CTO, Microsoft Azure, shares best practices in cloud-scale Machine Learning in cyber defense. He shares the properties of a successful Machine Learning solution: they are adaptable, explainable, actionable and successfully detected. Algorithms need to be adaptable as security professionals constantly deploy changes and patches and usage behavior changes daily. With that, it's w...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • The Economics of the Internet of Things is Different

    Bruce Schneier, CTO IBM Resilient & Special Advisor to IBM Security, presents part two of his RSAC 2017 talk on regulating the Internet of Things. In this discussion, Schneier explains why all information security experts need to get involved in policy decisions. We know that governments are going to get involved in regulating the internet of things regardless. The risks are simply too high. This ...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • Five Truisms of Internet Security That Apply to the Broader World

    Bruce Schneier, CTO IBM Resilient & Special Advisor to IBM Security, presents a compelling argument about the regulations needed for IoT in his talk at RSAC 2017. He argues that when software permeates every aspect of our lives, everything becomes a computer. This leads to computer security becoming ""everything security."" Our immediate security threats are greater as a result -- cyber threats ar...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • When the Security Risk is Truly Life or Death

    Four expert panelists discuss how federal policies help or hinder cybersecurity in major industries—including healthcare, medical device manufacturers and transportation. The stakes are as high. And can be as severe as patient safety and even loss of life. Scott Erven underscores the risk when safety-critical industries are not protected or supported with proper cybersecurity protocols. IoT devi...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • Eric Schmidt | Artificial Intelligence Keynote Highlights

    Eric Schmidt, Executive Chairman at Alphabet, shares his favorite scenario of the future and uses science fiction films to contextualize our current state of artificial intelligence. In his keynote presentation, Schmidt makes predictions on where we will see the benefit of the application of artifical intelligence: decreased traffic accidents and better medical diagnoses. https://www.rsaconferenc...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • Keep Your Foot on the Gas: Gov. McAuliffe (D) of Virginia on Cybersecurity

    Following his RSAC 2017 Talk, Virginia's 72nd governor, Terry McAuliffe, sat down with Michael Daniel, Former Special Assistant to the President, Cyber Security Coordinator, to discuss critical cybersecurity infrastructure at the state level. Govenor McAuliffe commends the private sector for its support and commitment to cybersecurity and shares sage wisdom for future governors on putting cybersec...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

New videos detected

  • Department of Homeland Security and Justice Department on the Role of Government in Cyber Security

    Michael Daniel, Former Special Assistant to the President, leads the discussion on how two major government agencies approach cyber security: the Department of Homeland Security and the justice Department. Jeanette Manfra, Acting Deputy Under Secretary for the Office of Cybersecurity and Communications, and Adam Hickey, Deputy Assistant Attorney General, take on these challenging questions. The ov...

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

RSA

Category: Content
Type: Youtube Video

Generated 5 days ago

RSA

Category: Content
Type: Youtube Video

Generated 1 week ago

RSA

Category: Content
Type: Youtube Video

Generated 1 week ago

New videos detected

  • Stopping the Gaps: Gov. Mc Auliffe (D) of Virginia on Preventing Cyber Attacks | RSAC 2017

    Governor McAuliffe of Virginia advises present and future legislators that being transparent about cyber attacks is critical. The earlier you can share information on a cyber threat, the more effectively you can prevent a worse future attack. When legislators are open about the cyber attacks they face, it encourages the private sector to invent creative solutions to secure the state's data. Virgin...

RSA

Category: Content
Type: Youtube Video

Generated 1 week ago

RSA

Category: Content
Type: Youtube Video

Generated 1 week ago

New videos detected

  • We Need to Lean In: Gov. McAuliffe (D) of Virginia | RSAC 2017

    Governor Terry McAuliffe of Virginia has a big job on his hands: securing his state's massive data records from the prying eyes of cyber criminals. With 27 military installations in Virginia alone, McAuliffe's focus has been to combat the 86 million cyber attacks to the state's data. Tax returns, health records and driver's license information are all vulnerable data points. McAuliffe's advice for...

RSA

Category: Content
Type: Youtube Video

Generated 1 week ago

New videos detected

  • Thwarting Even the Most Effective Malicious Lures

    Elia Zaitsev, Senior Manager of Solutions Architecture; George Kurtz, CEO; and Dmitri Alperovitch, Co-Founder and CTO of CrowdStrike demonstrate how to deal with advisaries -- Bears Pandas -- in the real world. Zaitsev discusses how hackers use social engineering in their lure documents to sound credible and convincing—however, lure documents don’t need to be hyper sophisticated any longer. Learn ...

RSA

Category: Content
Type: Youtube Video

Generated 1 week ago

New videos detected

  • When Ransomware Meets IoT

    Panelist Ed Skoudis, Faculty Fellow, Penetration Testing Cirriculum Lead for SANS, describes the current landscape of ransomware and crypto ransomware. Using visual aids and humor, Skoudis breaks down the best practices for protecting your organization against new and ever-changing network vulnerabilities. He walks through the specific steps to take when under ransomware attack -- and what decisio...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in