Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.
(Source: RSA Conference USA 2017)
1) Diagnosis SOC-Atrophy: What To Do When Your SOC Is Sick
Speaker: Tony Cole
Leaders continue to discover poorly designed security operations centers that struggle to protect the organization against today’s advanced threats. This session will address what you can do when your SOC is sick and how to create a get well plan to balance people, process, technology and budget.
2) Learnings from the Cloud: What to Watch When Watching for Breach
Speaker: Sara Manning Dawson
Protecting against account breach and misuse when using a cloud service can be challenging, as the cloud service decides what tooling is available, and control may be limited. This session will share learnings and best practices from the Office 365 engineering team: from the patterns observed, what are best practices to protect against account breach?
3) What We’ve Learned Building a Cybersecurity Operation Center: du Case Study
Speaker: Tamer El Refaey
The cybersecurity landscape is rapidly evolving, with new threats and threat actors emerging, and traditional security operations centers (SOCs) need to be augmented accordingly. This session will detail the journey of du in building and continually enhancing its SOC, physically and philosophically, to best deal with attack detection (offensively and defensively) and response.
4) Isolating the Ghost in the Machine: Unveiling Post Exploitation Threats
Speaker: Uri Fleyder-Kotler, Rotem Salinas
During the past year IR teams and security researchers around the world witnessed a rise in the use of legitimate tools and common scripts in malware and APT attacks. This talk will explore the presenters’ research that focused on automating the analysis of PowerShell and Macro/VBA/VBS attacks by building a heuristic-based compiler engine that determines whether a script is malicious or not.
5)Deep Impact: Explore the Wide-Reaching Impact of a Cyberattack
Speaker: Mary Galligan, Daniel Soo
The impacts of a cyberattack are long-lasting and extend well beyond technology. In this cyber-wargame, participants will test their assumptions and incident response know-how against a cyberattack scenario with complex business impacts that unfolds over a simulated year.
6) Can I Get A Witness? Technical Witness Bootcamp
Speaker: Eric Hibbard, Eriz Liebermann, Michael Stortz
As the stakes rise in data breach litigation, more and more information security professionals will be called upon to testify on behalf of their organization. This boot camp will teach participants the basics of providing solid, credible testimony, and point out traps for the unwary first time witness.
7) A Fully Automated SOC: Fact or Fiction
Speaker: Jesse Emerson
Organizations continuously look to drive more value with less resources for their security operations. The deluge of data and lack of skilled security professionals highlight the critical need for automation to help manage today’s sophisticated attacks, but is it feasible to automate everything? HPE Security will discuss the potential for security automation and where a human can’t be replaced.
Comments