Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
The Index below will help you navigate on this page. Each link will take you to the individual presentations. We have marked some particular slide number from each presentation which are particularly interesting. So, here's your shortcut to a full conference!
Index
(Click on the sections below to go directly to their details)
- Security Awareness and Human element
- Hacking and Attack Techniques
- Mobile Security
- Cloud Security
- Incident Response & SOC/SIEM
- CISO
- GRC
- Threat Intelligence
- Software/Application Security and DevOps
- Emerging Areas
- Security Trends
- Others
- Most Innovative Companies - Sandbox
image courtesy: https://www.flickr.com/photos/lupuca/8720604364
1) Top 8 'Security Awareness & Human Element' talks from RSA USA 2016, San Francisco
Security Awareness remains the human part of security, largely contributing to security compromises. Here are some selected talks that delve into the various aspects and behaviours that could help us be save our near and dear ones.
- Securing Today's Online Kids....Go To Presentation
- AppSec Awareness: A Blueprint for Security Culture Change....Go To Presentation
- Proactive Measures to Mitigate Insider Threat....Go To Presentation
- The Art of Hacking a Human....Go To Presentation
- Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?....Go To Presentation
- Using Behavioral Psychology and Science of Habit to Change User Behavior....Go To Presentation
- Securing the “Weakest Link”....Go To Presentation
- People-Centric Security: Transform Culture, Reduce Risk, Drive Success....Go To Presentation
2) Top 15 'Hacking & Attack Technique' talks from RSA USA 2016, San Francisco
The hacks are getting more sophisticated every day. Here we have selected the top hacking trends and techniques from RSA. It covers hacks from IOTs to Drones, everything has a hack.
- Braking the Connected Car: The Future of Vehicle Vulnerabilities....Go To Presentation
- Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities....Go To Presentation
- Autonomous Hacking: The New Frontiers of Attack and Defense....Go To Presentation
- Hacking a Professional Drone....Go To Presentation
- Linguistic Passphrase Cracking....Go To Presentation
- …But Now I See—A Vulnerability Disclosure Maturity Model....Go To Presentation
- Breaking Closed Systems with Code-Signing and Mitigation Techniques....Go To Presentation
- Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil....Go To Presentation
- Hacking Critical Infrastructure Like You’re Not a N00b....Go To Presentation
- The Seven Most Dangerous New Attack Techniques, and What's Coming Next....Go To Presentation
- The Pivot....Go To Presentation
- Sophisticated Attacks vs. Advanced Persistent Security....Go To Presentation
- Hacking Exposed LIVE: Attacking in the Shadows....Go To Presentation
- Hacking Exposed: The Mac Attack....Go To Presentation
- What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016....Go To Presentation
3) Top 8 'Mobile Security' talks from RSA USA 2016, San Francisco
Here are some great talks from 'Mobile Security'. It covers the latest OS hacks and vulnerabilities along with the business side of it. Particular interest is drawn by the Incident Response Process Building.
- Hacking Exposed: The Mac Attack....Go To Presentation
- Android Serialization Vulnerabilities Revisited....Go To Presentation
- The State of End-User Security—Global Data from 30,000+ Websites....Go To Presentation
- Building an Android Scale Incident Response Process....Go To Presentation
- How to Analyze an Android Bot....Go To Presentation
- Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device....Go To Presentation
- Finding Triggered Malice in Android Apps....Go To Presentation
- Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware....Go To Presentation
4) Top 6 'Cloud Security' talks from RSA USA 2016, San Francisco
With all infrastructure, services everything going cloud and becoming more affordable, this is a major section for security. Viability of cloud solutions are gauged here. Our Cloud Partners association as well as our data on the cloud may have some special needs. Below selected slides will help you identify those.
- Aspirin as a Service: Using the Cloud to Cure Security Headaches
- Cloud Security Essentials 2.0 Full Stack Hacking & Recovery
- Security Program Development for the Hipster Company
- Designing Virtual Network Security Architectures
- Cloud Breach – Preparation and Response
- Take It to the Cloud: The Evolution of Security Architecture
5) Top 10 'Incident Response & SIEM' talks from RSA USA 2016, San Francisco
A Quick Incident Response is still one of the savers in many ways. That is where our Red Teaming efforts go into. Here are some great talks from RSA which can help you build,monitor and execute your incident response efforts. The studies will help you optimise your program if already there or build it.
- The Incident Response Playbook for Android and iOS
- Demystifying Security Analytics: Data, Methods, Use Cases
- The Rise of the Purple Team
- Building a World-Class Proactive Integrated Security and Network Ops Center
- Make IR Effective with Risk Evaluation and Reporting
- Data Breach Litigation How To Avoid and Be Better Prepared
- Cloud Breach – Preparation and Response
- Preserving the Privilege during Breach Response
- Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
- Data Science Transforming Security Operations
image courtesy: https://www.flickr.com/photos/purpleslog/2870445260
6) Top 10 'CISO' talks from RSA USA 2016, San Francisco
Chief Information Security Officers remain responsible for the safeguard of the digital data, assets etc. Here are some talks specifically for the CISO role of operation. We thought this could be very helpful.
- Super CISO 2020: How to Keep Your Job
- How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
- Security Program Development for the Hipster Company
- Partnership with a CFO: On the Front Line of Cybersecurity
- The Measure of Success: Security Metrics to Tell Your Story
- From Cave Man to Business Man, the Evolution of the CISO to CIRO
- Understanding the Security Vendor Landscape Using the Cyber Defense Matrix
- Vendor Security Practices: Turn the Rocks Over Early and Often
- Adjusting Your Security Controls: It’s the New Normal
- Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards
7) Top 5 'GRC' talks from RSA USA 2016, San Francisco
Governance, Risk & Compliance remain an intrigued area from our members, where a unified GRC program is still a challenge. Below presentations give you some metrics which can help a smooth communication. Integration with Threat Intelligence and Risk Metrics particularly draw some attention.
- Bridging the Gap Between Threat Intelligence and Risk Management
- The Newest Element of Risk Metrics: Social Media
- Building an Effective Supply Chain Security Program
- Integrating Cybersecurity into Supply Chain Risk Management
- The Measure of Success:Security Metrics to Tell Your Story
8) Top 3 'Threat Intelligence' talks from RSA USA 2016, San Francisco
Threat Intelligence seems to be under the adoption hood, it's adoption still being speculated carefully. Here are some presentations that can help you decide.
- Dreaming of IoCs Adding Time Context to Threat Intelligence
- STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
- IOCs Are Dead—Long Live IOCs!
- Bridging the Gap Between Threat Intelligence and Risk Management
9) Top 7 'Software/Application Security & DevOps' talks from
RSA USA 2016, San Francisco
Security needs to be built in. The traditional models don't incorporate this, resulting in later stage security integration which is late and expensive. Here are some great talks which will help you build a program for your organisation. It covers the agile structure, embedded systems and fundamentals from 'Why Security'.
- Embedded Systems Security: Building a More Secure Device
- Introducing a Security Program to Large Scale Legacy Products
- Agile Security—Field of Dreams
- Open-Source Security Management and Vulnerability Impact Assessment
- DevSecOps in Baby Steps
- Estimating Development Security Maturity in About an Hour
- Understanding the “Why” in Enterprise Application Security Strategy
Go Back To The Index
10) Top 14 'Emerging Areas In Security Technology' talks from RSA USA 2016, San Francisco
Great talks and conferences also give us an advantage of identifying areas of security trends. Here we have put together all the Emerging Security Technology Trends presentations in one place for you.
- Transforming Security: Containers, Virtualization and Softwarization
- Embedded Systems Security: Building a More Secure Device
- Bring Your Own Internet of Things: BYO‐IoT
- DevSecOps in Baby Steps
- Lattice Cryptography
- Hardware Attacks and Security
- Integrating Cybersecurity into Supply Chain Risk Management
- Braking the Connected Car: The Future of Vehicle Vulnerabilities
- Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
- A New Security Paradigm for IoT (Internet of Threats)
- What Is Next-Generation Endpoint Security and Why Do You Need It?
- Attacks on Critical Infrastructure: Insights from the “Big Board”
- Security Advantages of Software-Defined Networking
- Smart Megalopolises. How Safe and Reliable Is Your Data?
11) Top 3 'Information Security Trends' from RSA USA 2016, San Francisco
The following takes you through the Information Security Trends. Here are the great presentations we found for you at the conference.
- State of Cybersecurity: 2016 Findings and Implications
- The Seven Most Dangerous New Attack Techniques, and What's Coming Next
- Introduction and a Look at Security Trends
12) Top 6 Blogs On IAM,Artificial Intelligence,datasecurity,crypto & Others
This section has some interesting topics like Artificial Intelligence, IAM etc. Moreno, the talks are innovative and out of the box. You will find this section to be an amazing talk section.
- DON'T Use Two-Factor Authentication...Unless You Need It!
- Rise of the Hacking Machines
- Intelligent Application Security
- Applying Auto-Data Classification Techniques for Large Data Sets
- Realities of Data Security
- Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
- NSTAC Report to the President on the Internet of Things
13) 10 Most Innovative Information Security Companies at RSA USA 2016, San FranciscoInnovative Companies
In keeping with the latest happenings in Information security, this article is on the 10 finalists of RSA innovation sandbox contest held at the RSA Security conference, the world's leading Information security conference.
Comments