RSA
RSA
YouTube Video
  • James Wickett, Head of Research, Signal Sciences All organizations want to go faster and decrease friction in their cloud software delivery pipeline. Infosec has an opportunity to change their classic approach from blocker to enabler. This talk will discuss hallmarks of CI/CD and some practical examples for adding security testing across different organizations. The talk will cover emergent patte...

RSA
RSA
YouTube Video
  • Ravi Honnavalli, Staff Engineer, Walmart This talk will show how, on a large container deployment, the speaker achieved insight into security events like file events on sensitive files, system call auditing, user level activity trail, network activity, etc., by customizing and plumbing a stack of open source tools that use the underlying Linux’s inotify and kernel audit components and by aggregat...

RSA
RSA
YouTube Video
  • Rich Mogull, CEO, DisruptOPS Everything in cloud computing is automated and API-enabled, giving security teams a big opportunity to build and embed security into infrastructures. From continuous guardrails to automated "afterburners" to speed up complex processes, this advanced session leverages the latest software-defined security techniques and shows how to integrate automation. Be prepared for...

RSA
RSA
YouTube Video
  • John Graham-Cumming, Chief Technology Officer, Cloudflare A year ago, Cloudfare encountered an extremely serious bug, dubbed “Cloudbleed,” that caused some data flowing through Cloudflare’s network to be leaked onto the Internet. The bug generated a lot of buzz and uncertainty among Cloudflare’s partners, customers and customers’ customers. But what technically happened to cause the bug, how was ...

RSA
RSA
YouTube Video
  • Matt Kemelhar, Director of Incident Response and Recovery, Microsoft Based on investigations of real-world attacks, Microsoft Office 365 cybersecurity experts provide a prescriptive approach to identifying and implementing the most critical security controls to protect your Office 365 tenant. You will learn threats and defenses change from on-premises attacks and what Microsoft recommends for qui...

RSA
RSA
YouTube Video
  • Caroline Wong, Vice President of Security Strategy, Cobalt Historically, security has been always thought of as a cost center. But with SaaS-first businesses rapidly taking over the traditional enterprise software space, that’s changing. This talk will explore the reasons why secure software is business critical for SaaS companies and why application security is what matters, and presenters will ...

RSA
RSA
YouTube Video
  • Chris Czub, Senior Information Security Engineer, Duo Security Living BeyondCorp comes with its own challenges. This talk will dive into how Duo gets our hands around difficult problems regarding the security and management of cloud services and endpoints internally. This session will cover technical details of our security orchestration and automation approach, cloud service monitoring, and chat...

RSA
RSA
YouTube Video
  • Are you ready for the May 25, 2018 deadline? Security experts from around the world provide insights into GDPR -- what they are doing, why it matters, and offer advice on what you should be doing. "GDPR can't be administered by just one person in the organization," offers Rogier Holla, CERT-EU, Deputy Head. The May deadline is only the beginning. Your work to remain compliant on privacy will be o...

RSA
RSA
YouTube Video
  • RSA Conference 2018 featured a full-day seminar, which served as a forum for key industry leaders and attendees to delve into topics related to key components of blockchain -- from ledgers, to cryptocurrencies, Ethereum and smart contracts, to the potential of identity management with blockchain. Questions pursued throughout the sessions: - What things can we store in blockchain ledgers besides c...

RSA
RSA
YouTube Video
  • Frans Johansson, author, speaker and CEO of The Medici Group, shared his most recent insights on why and how inclusive and diverse teams drive innovation and business outcomes for organizations in multiple industries. For many companies, this talk has become a catalyst that permanently changed how the organization viewed diversity and inclusion. https://www.rsaconference.com/events/us18/agenda/se...

RSA
RSA
YouTube Video
  • Bill Burns, Chief Trust Officer, Informatica Cloud is a new frontier that requires new architectures, higher velocity processes and crisper business-level metrics—all of which smacks security programs square in the face. This session will leverage the nearly 20 years of the speakers’ combined cloud experience to lay out a complete strategy for building out a cloud-first security program that cove...

RSA
RSA
YouTube Video
  • Todd Carr, DevOps Engineer, Unity Technologies This talk will explore the concepts and experiences of using configuration management in a highly disposable environment of ephemeral virtual machines. It will cover why an operations team may desire such an environment, the tools the presenter used to build one, and most importantly, the sorts of failures, accomplishments and considerations encounte...

RSA
RSA
YouTube Video
  • Grayson Brewer, Cybersecurity Consultant, UnitedHealth Group Aaron Rinehart, Chief Enterprise Security Architect, UnitedHealth Group ChaoSlingr introduces the discipline of security testing into chaos engineering with the focus on driving failure out of the model and going beyond the reactive processes that currently dominate traditional security testing methodology. Learning Objectives: 1: Lear...

RSA
RSA
YouTube Video
  • Mark Russinovich, Chief Technology Officer, Azure, Microsoft Machine learning algorithms are key to modern at-scale cyber-defense. Transfer learning is a state of the art ML paradigm that enables applying knowledge and algorithms developed from one field to another, resulting in innovative solutions. This talk will present transfer learning in action wherein techniques created from other areas ar...

RSA
RSA
YouTube Video
  • Michael Farnum, Solution Architect Manager, Set Solutions Michael Farnum had been a network and application security person for many years. He switched roles in the industry right about the same time cloud networking started getting popular, which means he missed the cloud hype train. Now he finds himself in a position where cloud security is a primary concern. Here is what he has learned so far ...

RSA
RSA
YouTube Video
  • Hidden Figures' author Margot Lee Shetterly explores the untold story of three African American women who were instrumental in helping NASA send America's first astronaut into space. But what’s just as important is Margot’s perspective on why we haven’t heard about this story until just now and how their story provides more than inspiration. It offers us a playbook for: 1. challenging bias 2. d...

RSA
RSA
YouTube Video
  • Is the threat of our jobs becoming automated real? Can we improve our lives by looking at our 'future-self' from a first-person perspective? World-renowned video game designer, Jane McGonigal, shows us how we can objectively look at our future selves to improve our long-term decision making. She also shares the forecast that by 2030 most men ages 18-35 in the U.S and China will not have full-ti...

RSA
RSA
YouTube Video
  • What needs to be done to give people more security and a greater say in their political and economic future? Watch Dambisa Moyo, global economist, in our latest RSA Spotlight - the edits which take you straight to the heart of the event! SUBSCRIBE to our channel! Follow the RSA on Twitter: https://twitter.com/RSAEvents Like RSA Events on Facebook: https://www.facebook.com/rsaeventsofficial/ L...

RSA
RSA
YouTube Video
  • Stephen Schmidt, Vice President and Chief Information Security Officer, Amazon Web Services While the causes of outages are varied, human error far outpaces all hardware failures. The risk of humans touching sensitive data is clear, but the tools, techniques and risk-mitigation strategies lag behind current realities. Stephen Schmidt, AWS CISO, will share hard-earned lessons around potential gaps...

RSA
RSA
YouTube Video
  • Alan Paller, Research Director and Founder, SANS Institute Ed Skoudis, Instructor, SANS James Lyne, Head of R&D, SANS Institute Johannes Ullrich, Dean of Research, SANS Technology Institute At RSAC 2018 in San Francisco, you saw SANS Institute's annual selection of the five most dangerous new attack techniques, and the methods of countering them. In this follow-up Virtual Session, the SANS team i...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.