Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.
(Source: RSA Conference USA 2017)
1) Critical Hygiene for Preventing Major Breaches
Speakers : Tony Sager, Mark Simos, Jonathan Trull
Microsoft's Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. Microsoft and the Center for Internet Security (CIS) will share step by step recommendations to defend against these attacks, including information on cybersecurity solutions that Microsoft has open-sourced to protect our customers.
Speakers : David Tobar, Lisa Young
It is critical to measure the right things in order to make better-informed management decisions, take appropriate actions and change behaviors. But how do managers figure out what those right things are? A measurement approach tied to strategic business objectives ensures that planning, budgeting and the allocation of operational resources are focused on what matters to the organization.
3) Top Five Secrets to Successfully Jumpstarting Your Cyber-Risk Program
Speakers : Husam Brohi, Chris Houlder
Businesses like Autodesk understand that cyber-risk management is essential, but they often don’t know where to begin. Autodesk implemented a cyber-risk framework in six months by using Agile software development, risk modeling and risk quantification. This session will explore the company’s success secrets and offers advice on how security leaders can jumpstart their cyber-risk program.
4) Crown Jewels Risk Assessment: Cost Effective Risk Identification
Speaker : Doug Landoll
Enterprise security risk assessments are typically shallow or expensive due to the vastness of the systems and data. But a study on sensitive data found that the organization’s “crown jewels” (top 0.01% to 2.0% sensitive data) accounts for 70% of the value to the enterprise. This allows for a unique approach to performing a security risk assessment—namely the crown jewels approach.
5) A Field Guide to Insider Threat Helps Manage the Risk
Speaker : Tim Casey
This session will provide a full characterization of insider threat types in a simple field guide with 60 separate threat vectors. Just as a field guide of birds helps narrow down species, our Insider Threat Field Guide identifies the primary ways insiders can harm your organization, informing your strategy and resource allocation for more effective insider risk management.
6) Threat Modeling Demystified
Speaker : Brook S.E.Schoenfield
Most organizations require threat models. The industry has recommended threat modeling for years. What holds us back? Master security architect, author and teacher Brook Schoenfield will take participants through a threat model experience based upon years of teaching. Expect a kick start. Practitioners will increase understanding. Experts will gain insight for teaching and programs.
7) Hot Topics In Cyber Law 2017
Speakers : Richard Abbott, Thomas Smedinghoff, Lucy Thomson
ABA Information Security leaders kick off Law Track with the annual expert panel on critical new issues. “Hot Topics” gives attendees a snapshot of new developments in law, public policy, regulation, court cases and legal framework for our industry. Focus on privacy and civil liberties, identity, cyber-conflict, IOT, standards, corporate structuring and the international technology marketplace.
8) Cyber-Insurance: Fraud, Waste or Abuse?
Speakers : David Nathans
Cyber-insurance is quickly becoming one of the hottest selling products on the market and an ever-increasing variety is being offered to businesses. Did you know that a security breach caused by dry rot, acts of terrorism or a known vulnerability won’t pay out? After careful review of cyber-policies, you may find them to be fraudulent, a waste of money, abuse of power or the best thing ever.
9) Toward Distributed and Virtualized Enterprise Security
Speakers : Dr. Edward Amoroso
Architectural issues with perimeter protections will be shown to create exploitable vulnerabilities for enterprise security teams. A design approach leading toward distributed, virtualized support for cloud workloads with hyper-resiliency and flexible security policy support is shown. Provocative commentary on how such a security architecture applies to large networks such as the US Department of State is included.
10) Cybersecurity Roadmap: Global Healthcare Security Architecture
Speakers : Nick H. Yoo
Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed the global security architecture and roadmap addressing security gaps by architecture domain and common security capability. This session will discuss the architecture framework, capability matrix, the architecture development methodology and key deliverables.
11) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...
Description: AI Assistant For Security Product Buying
FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).
Your Complete Guide To Top Talks @RSA Conference 2017 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.
Comments