RSA
RSA
YouTube Video
  • Michael Wood, Senior Manager, Dynamic Protection, SophosLabs, SOPHOS With many organizations using a sandbox to detonate suspicious files, many threats are implementing logic to detect sandbox environments, to alter their behavior and evade detection. This talk will highlight many real-world evasion tactics employed by recent malware, discussing challenges in measuring evasive behaviors and offer...

RSA
RSA
YouTube Video
  • Evan Wheeler, CISO, VP Risk Management, Financial Engines If you want your information risk program to be taken seriously by the business, you have to do more than just throwing around a few business terms. You need to embrace enterprise risk techniques. See how the engagement changes when you start talking about a product delivery risk instead of a Struts vulnerability. Cyber isn’t your top risk...

RSA
RSA
YouTube Video
  • Ed Bellis, CTO, Founder, Kenna Security Jonathan Cran, Head of Research, Kenna Security Understanding what you own is step one in securing your assets. A simple concept that still escapes the grasp of most, and it’s getting harder in a cloud-enabled world. Despite this struggle there’s a plethora of APIs and publicly available data to give you a jumpstart on identifying high-risk assets. This ses...

RSA
RSA
YouTube Video
  • Steve Kruse, Director, Clango Jack Jones, EVP R&D, RiskLens Tony Martin-Vegue, Director of Technology Risk, Lending Club Evan Wheeler, CISO, VP Risk Management, Financial Engines Identity and access management (IAM) has been a longtime domain for information security. How much energy should we be investing in these programs? How much risk is there for managing identities? This session will featur...

RSA
RSA
YouTube Video
  • Lion Gu, Sr. Threat Researcher, Trend Micro This session, based on research jointly performed with Vladimir Kropotov and Fyodor Yarochkin, explores methods used by threat actors to spread fake news and manipulate public opinion. Learn about the underground services that enable them, how they appear on social media sites, and the motivations behind these activities. Citing case studies from China ...

RSA
RSA
YouTube Video
  • Richard George, Senior Advisor for Cyber Security, Johns Hopkins University Applied Physics Lab Over 41 years at NSA, Richard George saw a number of real-world supply chain attacks of various types. He will present some of these examples, then talk about the threat they presented and how the intentional weaknesses were inserted. He’ll also discuss the reaction when these attacks were brought to t...

RSA
RSA
YouTube Video
  • Lawrence Dietz, General Counsel and Managing Director, Information Security, TAL Global Corporation The EU’s GDPR is the first major overall of data privacy requirements in the EU since the 1990s and is effective May 25, 2018. The GDPR is more than a regulation; it is a way of integrating data privacy and information security into day-to-day operations. This session will use case studies to bring...

RSA
RSA
YouTube Video
  • Rick Howard, CSO, Palo Alto Networks Richard Seiersen, SVP and Chief Information Security Officer, Lending Club Network defenders have avoided quantitative risk assessments in the past because they are too hard: the math is complex and too many variables exist. What if we could use simple math tricks to reduce our uncertainty about ranges of possibilities and that would be enough to help us make ...

RSA
RSA
YouTube Video
  • James Tarala, Principal Consultant, Enclave Security Philippe Langlois, Controls Technical Product Manager, Center for Internet Security Kelli Tarala, Principal Consultant, Enclave Security For 10 years, a volunteer community has worked with US agencies, international researchers and the private sector to define practical defenses to advanced cyberattacks. In this 10 year anniversary of the Contr...

RSA
RSA
YouTube Video
  • James Lugabihl, Director, Execution Assurance – Global Security Organization, ADP Marta Palanques, Security Lead Consultant, ADP Decision-makers need reliable data in order to understand risk and determine value of investments. With the amount of data available in a multinational company, one would assume that answers would be easy to find. But how does one identify which data is reliable and mak...

RSA
RSA
YouTube Video
  • Chris Olson, CEO and Co-Founder, The Media Trust Evan Wolff, Partner and Co-Chair, Privacy & Cybersecurity Group, Crowell & Moring Move past general GDPR discussions to focus on the implications of unauthorized and unchecked consumer tracking, data collection and sharing activities taking place on enterprise websites and mobile apps. Attendees will learn the value of assessing their digital ecosy...

RSA
RSA
YouTube Video
  • Caroline Wong, Vice President of Security Strategy, Cobalt Michael Rodriguez, Senior Application Security Analyst, Teradata Corporation Andreas Tiefenthaler, Security Consultant, GuardRails Vendor risk management is a necessity that continues to grow and change with the rise of SaaS everything. Managing vendor risk as a buyer and responding to assessments as a seller can be brutal work. This pane...

RSA
RSA
YouTube Video
  • Anil Karmel, Co-Founder and CEO, C2 Labs David Waltermire, Security Automation Architect, NIST COBIT, ISO/IEC 27001, NIST 800.53, PCI, oh my. The path to compliance is not a yellow brick road. IT professionals face a variety of security standards that they must meet simultaneously. This talk will present the NIST Open Security Controls Assessment Language (OSCAL) project as a way to standardize c...

RSA
RSA
YouTube Video
  • Jason Li, Senior Manager, Cyber Security, Ernst & Young LLP Majid Malaika, Application Security Specialist, International Monetary Fund The IMF and Aspect Security (now part of EY) created a risk-based assurance process to build the IMF’s application security program from the ground up. Presenters will share experiences in scaling from the occasional review of a few applications to providing assu...

RSA
RSA
YouTube Video
  • Zoe Lindsey, Advocacy Manager, Duo Security In an organization, people make up a complex system that is crucial for security teams to understand. Education, messaging and culture are all “inputs” for this system, and user behavior is its output. This session will cover how the actions and values an organization rewards—individual bias, training methods and the security team/user relationship—can ...

RSA
RSA
YouTube Video
  • David Brumley, CEO, ForAllSecure Do you want to know how to build a top-ranked competitive hacking team? It's all about the system. In sports, we understand systems that coaches can use to build a system for identifying talent, recruiting them, training them up, and competing in big games. Learn our proven system for building an elite team of hackers that win DEFCON. It's surprisingly easy, but n...

RSA
RSA
YouTube Video
  • Erik Wahlstrom, Sr. Program Manager, Microsoft Tech scams continue to be profitable social engineering attacks plaguing people around the world. Yet the security community has collectively shrugged at the problem offering the occasional educational campaign or blacklisted site. It’s time to help protect people by going on the offense. Come hear how aggressive ML models and extended behavioral ana...

RSA
RSA
YouTube Video
  • Christopher Romeo, CEO, Security Journey Security culture hacking is the skills and creativity to disrupt an existing security culture and redirect it towards a more secure future, and it is a skill that can be learned. Explore how to use awareness, big learning and security champions as “hacks” to disrupt your security culture. It is time to disrupt your organization’s security future. Learning...

RSA
RSA
YouTube Video
  • Daniel Kern, CSO, County of Monterey Want a unique way to arouse your users to take security far more seriously? In this presentation, you will learn how to use real-world hacking demonstrations to help cultivate a more engaged and equipped end-user community. Users love them! Come learn what these are all about, how they are done, and how they can enhance your human security posture. Learning O...

RSA
RSA
YouTube Video
  • Jeff Bardin, Chief Intel Officer, Treadstone 71 Khatuna Mshvidobadze, Principal, Cyberlight Global Associates Deception, distortion, dishonesty are core to social media postings. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own or...

RSA
RSA
YouTube Video
  • Lance Spitzner, Director, SANS Institute Learn how to scale your awareness program and effectively engage people throughout your organization by establishing a security awareness ambassador program. Based on the lessons learned working with over ten different ambassador programs, Lance Spitzner will provide you the roadmap and key steps to building a network of security awareness volunteers embed...

RSA
RSA
YouTube Video
  • Joe Gray, Senior Security Architect, IBM Rachel Tobac, CEO, SocialProof Security A simulated compromise of a Fortune 500 company as part of a social engineering competition will lead to discussion about how data was collected using open source intelligence (OSINT) beyond that of social media and tools. It will identify places to find data, providing insight for more valuable data sources. This wi...

RSA
RSA
YouTube Video
  • Daniel Costa, Technical Lead – Insider Threat Technical Solutions, CERT Division at Software Engineering Institute, Carnegie Mellon University Randall Trzeciak, Director – National Insider Threat Center, CERT Division at Software Engineering Institute, Carnegie Mellon University The CERT Insider Threat Center will present a framework for organizations to consider as they first attempt to identify...

RSA
RSA
YouTube Video
  • Samantha Davison, Security Engineering Manager, Snap Inc. Mike Mackintosh, Security Engineer, Snap Inc. Phishing: everyone does it but not often with customized exercises and phishing risk modeling. Why not test like an attacker would and find the true protections of your technology while testing the full spectrum of phishing attacks? This session will show you how to apply a phishing risk model ...

RSA
RSA
YouTube Video
  • Tom Pendergast, Chief Strategist, MediaPro, Inc. Jason Hoenich, Founder and Security Awareness Expert, Habitu8 Lisa Plaggemier, Director, Security Culture and Client Advocacy, CDK Global Melissa Plicque, Sr. Manager, Information Security Training and Awareness, eBay Let’s face it: security awareness is broken. It bores people and doesn’t get results. That’s why it’s time to blow up current practi...

RSA
RSA
YouTube Video
  • Dr. Doug White, Chair, Cybersecurity and Networking, Roger Williams University/Security Weekly This session shares some adventures in physical pen tests and social engineering in terms of the dangers of not thinking outside the box when it comes to pen testing our enterprise. Bad guys (and good guys) are definitely outside the box and taking advantage of our rigid and limited approaches. Dr. Whit...

RSA
RSA
YouTube Video
  • Dr. Christine Izuakor, Senior Manager – Global Security Strategy and Awareness, United Airlines Cybersecurity is no longer just a discipline requiring a passion for technology, programming and basement hoodie hacking. Today cybersecurity marketing, business acumen and relationship management are just as important to the success of security teams. This session will cover leveraging a diverse pool ...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.