Best of the World Keynotes
- How I discovered Heartbleed ? -by Antii Karjalainen
- Bitcoin Maleability - by Daniel Chechik
- A Journey to protect POS -by Nir Valtman
- ----- -by Moshe Ferber
- BSIM -by cigital
- defcon talk -by Shane Macaulay
- More Shadow Walker:The progression of TLB Splitting on x86 -by Jacob Torrey
- 5 Real Ways to destroy business by breaking SAP Applications -by Alexander Polyakov
- Intrinsic Leadership -by Deb Maes
15Mins Ted-style Turbo Talks
- Ants and Elephants in the CISOs Office -by Paul Raines
- Top Attacks on IOT -by Beau Woods
- Using Security Information & Analytics -As Actionable Intelligence -by Ahmed Qurram Baig
- Embedding Risk Assessment into Your Project Workstream -by Michael Calderin
- Actionable Security Intelligence -by Derek Manky
- ----by Yuval Idan
15Mins Ted-style Test
Hands on knowledge Workshops
- Discovering Zero Days -by Antii Karjalainen
- -----by Daniel Chechik
- ----by Deb Maes
- Implementing SAP Security in 5 Steps -by Alexander Polyakov
- Defending Online Attacks -by Nir Valtman & Moshe Ferber
- Building An Incident Management Program -by Paul Raines
- All that you need to know to build an Organization's Forensics Program -by Shane Macaulay
- Overview of Hardware Level Security -by Jacob Torrey
Turbo Tracks
Here are some of the other great talks in their tracks
- track1
- track2
Security Checklists Round Table
Every Round Table will involve jamming sessions and deal with 11 infosec chapters and some others. Here are some of them:
- BYOD Security
- DLP/Data Security
- DDOS/DOS Security
- End Point Security
- Identity and Access Management
- IDS/IPS
- IT GRC Management Tools
- Secure email/Web Gateway, Content Filtering/UTM
- SIEM
- Security Testing/Audit-Application
- Security Testing/Audit-Network
- Strong Authentication
Vote for it Live Poll
CISO Platform Index rates products purely based on CISO/user satisfaction. Participate and see the numbers rising and falling real-time at the event and quickly decide the solution you need to opt for your SIEM or anything else, no more RFPs!
Knowledge Donation
Whether you are there or not, everyone can contribute to the common cause of sharing knowledge and empowering the CISO community. Start scribbling here or rate any security products you have used here.
If you need any help from the editorial team, drop us an email at pritha.aash@cisoplatform.com
Don't forget to spread the word, just share and help the infosec world.
Comments