Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

8669805263?profile=original

1) Threat Modeling the Trenches to the Clouds

Speakers : Brook S.E. Schoenfield 

What wisdom percolates from building threat modeling practices across four organizations? This presentation will draw from hundreds of students, years of coaching, 100 formal trainings and 1000s of threat models. This presentation will draw upon experience gained in the trenches of the battle to reduce design errors that is often fought with threat modeling. Conclusions may overturn cherished beliefs.

>> Go To Presentation

8669810889?profile=original


2) Hardening the Cloud: Assuring Agile Security in High-Growth Environments

Speakers : Aaron McKeown

Modern businesses recognize one of the greatest challenges they face on a day-to-day basis is meeting the demand for security at speed without jeopardizing protection; this is especially true in high-growth environments. This session will deliver IT and security professionals actionable, real-world insights aimed to improve AWS security strategies at minimal cost while delivering high value.

>> Go To Presentation

8669806893?profile=original


3) Cloud Security: Automate or Die

Speakers : Dave Shackleford (@daveshckleford)

Much has been said about DevOps and SecDevOps for security automation and integration. However, to many in the security community, this is still a buzzword. There are many practical applications of automation in cloud security controls, however, across all security-related disciplines. This talk will delve into concrete examples of security automation in the cloud, with metrics examples, as well.

>> Go To Presentation

8669811274?profile=original


4) Securing Serverless Applications in the Cloud

Speakers : Mark Nunnikhoven

Serverless applications offer a number of advantages, the biggest one being freedom from a number of standard operational tasks. And while you may not need to do basic ops tasks, you still have a responsibility to keep your data safe and secure. Serverless designs require a completely new approach to development, and securing these applications also requires new concepts, processes and tools.

>> Go To Presentation

8669809094?profile=original
5) 
Securely Moving Data to the Cloud with Confidence and Customer Focus

Speakers : Michele Lacovone

This session will provide a deep dive of best practices to securely move customer data to the cloud through AWS, while keeping the customers’ interest top of mind. Michele Iacovone, SVP and CISO at Intuit, will illustrate how companies can successfully and securely harness the power of the cloud to ensure the speed of innovation.

>> Go To Presenatation

8669807483?profile=original


6) What is needed in the Next Generation Cloud trusted platform?

Speakers : David B. Cross

The most important engineering pillar in the cloud security ecosystem is how you build a trusted platform. It is more than just 2FA and encrypting all data. We will walk through some next generation thinking in Google’s vNext cloud security pillar and how you should look at the cloud security stack layers to ensure you truly have a trusted platform for next generation applications and data.

>>Go To Presentation

8669813469?profile=original


7) Cloud Security Assessments: You're Doing It Wrong!

Speakers : Cory Scott, Trey Ford, Jim Trovato

Moving to the cloud was supposed to increase the speed of business, but progress grinds to a halt once the risk management team gets involved in vetting cloud service providers. Behind the scenes, customers flood cloud providers with lengthy, bespoke questionnaires trying to quantify business risk—which doesn’t scale. Hear best practices to vet CSPs from three leading cloud providers.

>>Go To Presentation

8669807656?profile=original


8) Transforming security Part 1: Cloud and Virtualization

Speakers : Tom Corn

The biggest obstacle in security may well be an architectural gap between the apps and data we must protect, and the infrastructure in which we place controls. The cloud presents a unique opportunity to architect-in security, rather than bolt it on. Micro-segmentation opened the door—enabling us to see and control the infrastructure through the lens of the application. 

>>Go To Presentation

8669812277?profile=original


9) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


8669814668?profile=original

Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform