Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

8669808873?profile=original


1) Diagnosis SOC-Atrophy: What To Do  When Your SOC Is Sick

Speaker: Tony Cole

Leaders continue to discover poorly designed security operations centers that struggle to protect the organization against today’s advanced threats. This session will address what you can do when your SOC is sick and how to create a get well plan to balance people, process, technology and budget.

>> Go to presentation

8669807483?profile=original

2) Learnings from the Cloud:  What to Watch When Watching for Breach

Speaker: Sara Manning Dawson

Protecting against account breach and misuse when using a cloud service can be challenging, as the cloud service decides what tooling is available, and control may be limited. This session will share learnings and best practices from the Office 365 engineering team: from the patterns observed, what are best practices to protect against account breach?

>> Go to presentation

8669810084?profile=original

3) What We’ve Learned Building a Cybersecurity Operation Center: du Case Study

Speaker: Tamer El Refaey

The cybersecurity landscape is rapidly evolving, with new threats and threat actors emerging, and traditional security operations centers (SOCs) need to be augmented accordingly. This session will detail the journey of du in building and continually enhancing its SOC, physically and philosophically, to best deal with attack detection (offensively and defensively) and response.

>> Go to presentation

8669807256?profile=original

4) Isolating the Ghost in the Machine: Unveiling Post Exploitation Threats

Speaker: Uri Fleyder-Kotler, Rotem Salinas

During the past year IR teams and security researchers around the world witnessed a rise in the use of legitimate tools and common scripts in malware and APT attacks. This talk will explore the presenters’ research that focused on automating the analysis of PowerShell and Macro/VBA/VBS attacks by building a heuristic-based compiler engine that determines whether a script is malicious or not.

>> Go to presentation

8669806685?profile=original

5)Deep Impact: Explore the Wide-Reaching Impact of a Cyberattack

Speaker: Mary Galligan, Daniel Soo

The impacts of a cyberattack are long-lasting and extend well beyond technology. In this cyber-wargame, participants will test their assumptions and incident response know-how against a cyberattack scenario with complex business impacts that unfolds over a simulated year.

>> Go to presentation

8669806491?profile=original

6) Can I Get A Witness?  Technical Witness Bootcamp

Speaker: Eric Hibbard, Eriz Liebermann, Michael Stortz

As the stakes rise in data breach litigation, more and more information security professionals will be called upon to testify on behalf of their organization. This boot camp will teach participants the basics of providing solid, credible testimony, and point out traps for the unwary first time witness.

>> Go to presentation

8669805679?profile=original

7) A Fully Automated SOC: Fact or Fiction

Speaker: Jesse Emerson

Organizations continuously look to drive more value with less resources for their security operations. The deluge of data and lack of skilled security professionals highlight the critical need for automation to help manage today’s sophisticated attacks, but is it feasible to automate everything? HPE Security will discuss the potential for security automation and where a human can’t be replaced.

>> Go to presentation

8669803085?profile=original

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform