Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.
(Source: RSA Conference USA 2017)
1) Threat Modeling the Trenches to the Clouds
Speakers : Brook S.E. Schoenfield
What wisdom percolates from building threat modeling practices across four organizations? This presentation will draw from hundreds of students, years of coaching, 100 formal trainings and 1000s of threat models. This presentation will draw upon experience gained in the trenches of the battle to reduce design errors that is often fought with threat modeling. Conclusions may overturn cherished beliefs.
2) Hardening the Cloud: Assuring Agile Security in High-Growth Environments
Speakers : Aaron McKeown
Modern businesses recognize one of the greatest challenges they face on a day-to-day basis is meeting the demand for security at speed without jeopardizing protection; this is especially true in high-growth environments. This session will deliver IT and security professionals actionable, real-world insights aimed to improve AWS security strategies at minimal cost while delivering high value.
3) Cloud Security: Automate or Die
Speakers : Dave Shackleford (@daveshckleford)
Much has been said about DevOps and SecDevOps for security automation and integration. However, to many in the security community, this is still a buzzword. There are many practical applications of automation in cloud security controls, however, across all security-related disciplines. This talk will delve into concrete examples of security automation in the cloud, with metrics examples, as well.
4) Securing Serverless Applications in the Cloud
Speakers : Mark Nunnikhoven
Serverless applications offer a number of advantages, the biggest one being freedom from a number of standard operational tasks. And while you may not need to do basic ops tasks, you still have a responsibility to keep your data safe and secure. Serverless designs require a completely new approach to development, and securing these applications also requires new concepts, processes and tools.
5) Securely Moving Data to the Cloud with Confidence and Customer Focus
Speakers : Michele Lacovone
This session will provide a deep dive of best practices to securely move customer data to the cloud through AWS, while keeping the customers’ interest top of mind. Michele Iacovone, SVP and CISO at Intuit, will illustrate how companies can successfully and securely harness the power of the cloud to ensure the speed of innovation.
6) What is needed in the Next Generation Cloud trusted platform?
Speakers : David B. Cross
The most important engineering pillar in the cloud security ecosystem is how you build a trusted platform. It is more than just 2FA and encrypting all data. We will walk through some next generation thinking in Google’s vNext cloud security pillar and how you should look at the cloud security stack layers to ensure you truly have a trusted platform for next generation applications and data.
7) Cloud Security Assessments: You're Doing It Wrong!
Speakers : Cory Scott, Trey Ford, Jim Trovato
Moving to the cloud was supposed to increase the speed of business, but progress grinds to a halt once the risk management team gets involved in vetting cloud service providers. Behind the scenes, customers flood cloud providers with lengthy, bespoke questionnaires trying to quantify business risk—which doesn’t scale. Hear best practices to vet CSPs from three leading cloud providers.
8) Transforming security Part 1: Cloud and Virtualization
Speakers : Tom Corn
The biggest obstacle in security may well be an architectural gap between the apps and data we must protect, and the infrastructure in which we place controls. The cloud presents a unique opportunity to architect-in security, rather than bolt it on. Micro-segmentation opened the door—enabling us to see and control the infrastructure through the lens of the application.
9) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...
Description: AI Assistant For Security Product Buying
FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).
Your Complete Guide To Top Talks @RSA Conference 2017 (USA)
Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.
>>Click Here To Get Your FREE Guide
Comments