All Posts (2199)

Sort by

Threat Modeling Demystified

Threat Modeling Demystified (RSA Conference 2017)

Most organizations require threat models. The industry has recommended threat modeling for years. What holds us back? Master security architect, author and teacher Brook Schoenfield will take participa

Read more…
Views: 203
Comments: 0

The Malware Monetization Machine

The Malware Monetization Machine (RSA Conference 2017)

A new generation of Internet startups is focused on converting malware infections into revenue. Who are these new CEOs, what can we learn from their business models? No longer in the shadows of th

Read more…
Views: 144
Comments: 0

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? (RSA Conference 2017)

Cyber-insurance is quickly becoming one of the hottest selling products on the market and an ever-increasing variety is being offered to businesses. Did you know that a security breach caus

Read more…
Views: 108
Comments: 0

Critical Hygiene for Preventing Major Breaches (RSA Conference 2017)

Microsoft's Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. Microsoft and the

Read more…
Views: 127
Comments: 0

Securing Serverless Applications in the Cloud (RSA Conference 2017)

Serverless applications offer a number of advantages, the biggest one being freedom from a number of standard operational tasks. And while you may not need to do basic ops tasks, you

Read more…
Views: 91
Comments: 0

Cloud Security: Automate or Die

Cloud Security: Automate or Die (RSA Conference)

Much has been said about DevOps and SecDevOps for security automation and integration. However, to many in the security community, this is still a buzzword. There are many practical applications of auto

Read more…
Views: 105
Comments: 0

One hour privacy for security officers

One hour privacy for security officers (RSA Conference 2017)

Information security officers will need to become involved in privacy issues to maintain relevance in the future. This session will provide the fundamentals of information privacy and buildi

Read more…
Views: 89
Comments: 0

Threat Modeling the Trenches to the Clouds (RSA Conference 2017)

What wisdom percolates from building threat modeling practices across four organizations? This presentation will draw from hundreds of students, years of coaching, 100 formal trainings a

Read more…
Views: 88
Comments: 0

How to Transform Developers into Security People (RSA Conference 2017)

Developers should be the first line of security defense. Security teams purchase secure coding classes and claim success. Hours of training does not change the developer mindset. W

Read more…
Views: 69
Comments: 0