Top Talks @ RSA Conference USA 2016: Your Complete Guide
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world.
RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)
The Index below will help you navigate on this page. Each link will take you to the individual presentations. We have marked some particular slide number from each presentation which are particularly interesting. So, here's your shortcut to a full conference!
Index: Top Talks Handpicked by CISO Platform Editorial Team
(Click on the sections below to go directly to respective sections)
1) Top 10 'Incident Response & SIEM' talks from RSA Conference 2016 (USA)
A Quick Incident Response is still one of the savers in many ways. That is where our Red Teaming efforts go into. Here are some great talks from RSA which can help you build,monitor and execute your incident response efforts. The studies will help you optimise your program if already there or build it.
- Building a World-Class Proactive Integrated Security and Network Ops Center....Go To Presentation
- The Incident Response Playbook for Android and iOS....Go To Presentation
- Data Breach Litigation How To Avoid and Be Better Prepared....Go To Presentation
- Cloud Breach – Preparation and Response....Go To Presentation
- Demystifying Security Analytics: Data, Methods, Use Cases....Go To Presentation
- Make IR Effective with Risk Evaluation and Reporting....Go To Presentation
- The Rise of the Purple Team....Go To Presentation
- Preserving the Privilege during Breach Response....Go To Presentation
- Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration....Go To Presentation
- Data Science Transforming Security Operations....Go To Presentation
2) Top 8 'Mobile Security' talks from RSA Conference 2016 (USA)
Here are some great talks from 'Mobile Security'. It covers the latest OS hacks and vulnerabilities along with the business side of it. Particular interest is drawn by the Incident Response Process Building.
- Building an Android Scale Incident Response Process....Go To Presentation
- Hacking Exposed: The Mac Attack....Go To Presentation
- Android Serialization Vulnerabilities Revisited....Go To Presentation
- The State of End-User Security—Global Data from 30,000+ Websites....Go To Presentation
- How to Analyze an Android Bot....Go To Presentation
- Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device....Go To Presentation
- Finding Triggered Malice in Android Apps....Go To Presentation
- Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware....Go To Presentation
3) Top 6 'Cloud Security' talks from RSA Conference 2016 (USA)
With all infrastructure, services everything going cloud and becoming more affordable, this is a major section for security. Viability of cloud solutions are gauged here. Our Cloud Partners association as well as our data on the cloud may have some special needs. Below selected slides will help you identify those.
- Cloud Security Essentials 2.0 Full Stack Hacking & Recovery....Go To Presentation
- Cloud Breach – Preparation and Response....Go To Presentation
- Take It to the Cloud: The Evolution of Security Architecture....Go To Presentation
- Security Program Development for the Hipster Company....Go To Presentation
- Designing Virtual Network Security Architectures....Go To Presentation
- Aspirin as a Service: Using the Cloud to Cure Security Headaches....Go To Presentation
4) Top 5 'GRC' talks from RSA Conference 2016 (USA)
Governance, Risk & Compliance remain an intrigued area from our members, where a unified GRC program is still a challenge. Below presentations give you some metrics which can help a smooth communication. Integration with Threat Intelligence and Risk Metrics particularly draw some attention.
- The Measure of Success:Security Metrics to Tell Your Story....Go To Presentation
- Bridging the Gap Between Threat Intelligence and Risk Management....Go To Presentation
- The Newest Element of Risk Metrics: Social Media....Go To Presentation
- Building an Effective Supply Chain Security Program....Go To Presentation
- Integrating Cybersecurity into Supply Chain Risk Management....Go To Presentation
5) Top 4 'Threat Intelligence' talks from RSA Conference 2016 (USA)
Threat Intelligence seems to be under the adoption hood, it's adoption still being speculated carefully. Here are some presentations that can help you decide.
- STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015....Go To Presentation
- IOCs Are Dead—Long Live IOCs!....Go To Presentation
- Bridging the Gap Between Threat Intelligence and Risk Management....Go To Presentation
- Dreaming of IoCs Adding Time Context to Threat Intelligence....Go To Presentation
image courtesy: https://www.flickr.com/photos/purpleslog/2870445260
6) Top 10 talks For 'CISOs & CXOs' from RSA Conference 2016 (USA)
Chief Information Security Officers remain responsible for the safeguard of the digital data, assets etc. Here are some talks specifically for the CISO role of operation. We thought this could be very helpful.
- Super CISO 2020: How to Keep Your Job....Go To Presentation
- The Measure of Success: Security Metrics to Tell Your Story....Go To Presentation
- Vendor Security Practices: Turn the Rocks Over Early and Often....Go To Presentation
- Understanding the Security Vendor Landscape Using the Cyber Defense Matrix....Go To Presentation
- Adjusting Your Security Controls: It’s the New Normal....Go To Presentation
- How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience....Go To Presentation
- Security Program Development for the Hipster Company....Go To Presentation
- Partnership with a CFO: On the Front Line of Cybersecurity....Go To Presentation
- From Cave Man to Business Man, the Evolution of the CISO to CIRO....Go To Presentation
- Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards....Go To Presentation
image courtesy: https://www.flickr.com/photos/lupuca/8720604364
7) Top 8 talks on 'Security Awareness & Human Elements' from RSA Conference 2016 (USA)
Security Awareness remains the human part of security, largely contributing to security compromises. Here are some selected talks that delve into the various aspects and behaviours that could help us be save our near and dear ones.
- AppSec Awareness: A Blueprint for Security Culture Change....Go To Presentation
- Using Behavioral Psychology and Science of Habit to Change User Behavior....Go To Presentation
- Securing the “Weakest Link”....Go To Presentation
- Securing Today's Online Kids....Go To Presentation
- People-Centric Security: Transform Culture, Reduce Risk, Drive Success....Go To Presentation
- Proactive Measures to Mitigate Insider Threat....Go To Presentation
- The Art of Hacking a Human....Go To Presentation
- Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?....Go To Presentation
8) Top 15 'Hacking & Attack Technique' talks from RSA Conference 2016 (USA)
The hacks are getting more sophisticated every day. Here we have selected the top hacking trends and techniques from RSA. It covers hacks from IOTs to Drones, everything has a hack.
- Braking the Connected Car: The Future of Vehicle Vulnerabilities....Go To Presentation
- Autonomous Hacking: The New Frontiers of Attack and Defense....Go To Presentation
- Hacking a Professional Drone....Go To Presentation
- Linguistic Passphrase Cracking....Go To Presentation
- …But Now I See—A Vulnerability Disclosure Maturity Model....Go To Presentation
- Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil....Go To Presentation
- Breaking Closed Systems with Code-Signing and Mitigation Techniques....Go To Presentation
- Hacking Critical Infrastructure Like You’re Not a N00b....Go To Presentation
- The Seven Most Dangerous New Attack Techniques, and What's Coming Next....Go To Presentation
- The Pivot....Go To Presentation
- Sophisticated Attacks vs. Advanced Persistent Security....Go To Presentation
- Hacking Exposed LIVE: Attacking in the Shadows....Go To Presentation
- Hacking Exposed: The Mac Attack....Go To Presentation
- What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016....Go To Presentation
- Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities....Go To Presentation
9) Top 7 'Software/Application Security & DevOps' talks from RSA Conference 2016 (USA)
Security needs to be built in. The traditional models don't incorporate this, resulting in later stage security integration which is late and expensive. Here are some great talks which will help you build a program for your organisation. It covers the agile structure, embedded systems and fundamentals from 'Why Security'.
- Embedded Systems Security: Building a More Secure Device....Go To Presentation
- Introducing a Security Program to Large Scale Legacy Products....Go To Presentation
- Agile Security—Field of Dreams....Go To Presentation
- Open-Source Security Management and Vulnerability Impact Assessment....Go To Presentation
- DevSecOps in Baby Steps....Go To Presentation
- Estimating Development Security Maturity in About an Hour....Go To Presentation
- Understanding the “Why” in Enterprise Application Security Strategy....Go To Presentation
10) Top 14 talks on 'Emerging Areas In Security Technology' from RSA Conference 2016 (USA)
Great talks and conferences also give us an advantage of identifying areas of security trends. Here we have put together all the Emerging Security Technology Trends presentations in one place for you.
- Bring Your Own Internet of Things: BYO‐IoT....Go To Presentation
- Lattice Cryptography....Go To Presentation
- Transforming Security: Containers, Virtualization and Softwarization....Go To Presentation
- Embedded Systems Security: Building a More Secure Device....Go To Presentation
- Integrating Cybersecurity into Supply Chain Risk Management....Go To Presentation
- Braking the Connected Car: The Future of Vehicle Vulnerabilities....Go To Presentation
- Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device....Go To Presentation
- A New Security Paradigm for IoT (Internet of Threats)....Go To Presentation
- What Is Next-Generation Endpoint Security and Why Do You Need It?....Go To Presentation
- Attacks on Critical Infrastructure: Insights from the “Big Board”....Go To Presentation
- Security Advantages of Software-Defined Networking....Go To Presentation
- Smart Megalopolises. How Safe and Reliable Is Your Data?....Go To Presentation
- DevSecOps in Baby Steps....Go To Presentation
- Hardware Attacks and Security....Go To Presentation
11) Top 3 talks on 'Information Security Trends' from RSA Conference 2016 (USA)
The following takes you through the Information Security Trends. Here are the great presentations we found for you at the conference.
- State of Cybersecurity: 2016 Findings and Implications....Go To Presentation
- The Seven Most Dangerous New Attack Techniques, and What's Coming Next....Go To Presentation
- Introduction and a Look at Security Trends....Go To Presentation
12) Top 6 talks On IAM,Artificial Intelligence,datasecurity,crypto & Others from RSA Conference 2016 (USA)
This section has some interesting topics like Artificial Intelligence, IAM etc. Moreno, the talks are innovative and out of the box. You will find this section to be an amazing talk section.
- DON'T Use Two-Factor Authentication...Unless You Need It!....Go To Presentation
- Rise of the Hacking Machines....Go To Presentation
- Intelligent Application Security....Go To Presentation
- Applying Auto-Data Classification Techniques for Large Data Sets....Go To Presentation
- Realities of Data Security....Go To Presentation
- Crypto 101: Encryption, Codebreaking, SSL and Bitcoin....Go To Presentation
13) 10 Most Innovative Information Security Companies at RSA Conference USA (2016)
In keeping with the latest happenings in Information security, this article is on the 10 finalists of RSA innovation sandbox contest held at the RSA Security conference, the world's leading Information security conference.
Comments