Top Talks @ RSA Conference USA 2018: Your Complete Guide
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2018.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more. (Source: RSA Conference USA 2018)
The Index below will help you navigate on this page. Each link will take you to the individual presentations. We have marked some particular slide number from each presentation which are particularly interesting. So, here's your shortcut to a full conference!
Index: Top Talks Handpicked by CISO Platform Editorial Team
(Click on the sections below to go directly to respective sections)
- Cloud Security & Virtualization
- Analytics, Intelligence & Response
- Application Security
- Cryptography
- DevOps
- Governance, Risk & Compliance
- Identity & Access Management
- Machine Learning
- Mobile & IoT Security
- Technology Infrastructure & Operations
1) Top 10 talks on Cloud Security & Virtualization from RSA Conference USA 2018
With all infrastructure, services everything going cloud and becoming more affordable, this is a major section for security. Viability of cloud solutions are gauged here.
- Building and Adopting a Cloud-Native Security Program...Go To Presentation
- ChaoSlingr: Introducing Security-Based Chaos Testing...Go To Presentation
- Corpsec: “What Happened to Corpses A and B?”...Go To Presentation
- Ephemeral DevOps: Adventures in Managing Short-Lived Systems...Go To Presentation
- FIM and System Call Auditing at Scale in a Large Container Deployment...Go To Presentation
- Humans and Data Don’t Mix: Best Practices to Secure Your Cloud...Go To Presentation
- Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond...Go To Presentation
- Pragmatic Security Automation for Cloud...Go To Presentation
- Red Team vs. Blue Team on AWS...Go To Presentation
- Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud Defense...Go To Presentation
2) Top 7 talks for Analytical Intelligence & Response from RSA Conference USA 2018
Analytics, Intelligence, & Response covers the application of investigative and analytic techniques that help organizations identify, contain, investigate, and resolve incidents in the enterprise. Following talks cover the latest trends in this field.
- Incident Response in the Cloud...Go To Presentation
- Insights from NSA’s Cybersecurity Threat Operations Center...Go To Presentation
- Playing Games in the Sandbox—Dynamic Analysis and Modern Evasion Tactics...Go To Presentation
- Predicting Exploitability—Forecasts for Vulnerability Management...Go To Presentation
- Pulling Our SOCs Up...Go To Presentation
- SOC 2030—SOCs Are Broken. Let’s Fix Them....Go To Presentation
- Threat Intel and Content Curation Organizing the Path to Successful Detection...Go To Presentation
3) Top 10 Talks on Application Security from RSA Conference USA 2018
Here are some great talks from RSA which can help you understand how diverse the field of Application Security is and a holistic view of the advancements.
- Efficacy of Layered Application Security through the Lens of Hacker...Go To Presentation
- Realizing Software Security Maturity: The Growing Pains and Gains...Go To Presentation
- Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future...Go To Presentation
- Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence...Go To Presentation
- The Unexpected Attack Vector: Software Updaters...Go To Presentation
- CCleaner APT Attack: A Technical Look Inside...Go To Presentation
- Common Infrastructure Exploits in AWS/GCP/Azure Servers and Containers...Go To Presentation
- Early Detection of Malicious Activity—How Well Do You Know Your DNS?...Go To Presentation
- Exfiltrating Data through IoT...Go To Presentation
- Poison Pixels—Combatting Image Steganography in Cybercrime...Go To Presentation
4) Top 5 Talks on Cryptography from RSA Conference USA 2018
Here are are few great talks which have been selected talks about Cryptography for concealing data, and encryption for protecting the data and network.
- Codes and Isogenies...Go To Presentation
- Cryptographic Protocols: Practical revocation and key rotation...Go To Presentation
- General Cryptography : Why Johnny The Developer Can’t Work With Public Key Certificates...Go To Presentation
- Cryptanalysis Against Symmetrickey Schemes with Online Classical Queries and Offline Quantum Computations...Go To Presentation
- Secure Storage: Composable and Robust Outsourced Storage...Go To Presentation
5) Top 4 Talks on DevOps from RSA Conference USA 2018
Following are the top talks on DevOps that cover the intersection of secure development and security operations, sharing real-world, enterprise-level experience on this transformation process.
- DevOps and the Future of Enterprise Security...Go To Presentation
- Dos and Don'ts of DevSecOps...Go To Presentation
- Open Source in Security-Critical Environments...Go To Presentation
- The Emerging Product Security Leader Discipline...Go To Presentation
6) Top 5 Talks on Governance, Risk & Compliance from RSA Conference USA 2018
Governance, Risk & Compliance will remain as some of the most important topics discussed in industry. The presentations listed below give you some insights that can help in understanding the latest developments in the field.
- Creating Order from Chaos: Metrics That Matter...Go To Presentation
- Debunking Myths for Cyber-Insurance...Go To Presentation
- Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow...Go To Presentation
- Security Automation Simplified via NIST OSCAL: We’re Not in Kansas Anymore...Go To Presentation
- There’s No Such Thing as a Cyber-Risk...Go To Presentation
7) Top 7 Talks on Identity & Access Management from RSA Conference USA 2018
Here are some talks that cover the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.
- Adventures in Open Banking: Understanding OAuth and OpenID Client Ecosystems...Go To Presentation
- Can Blockchain Enable Identity Management?...Go To Presentation
- Fool Proof: Protecting Digital Identity in the Age of the Data Breach...Go To Presentation
- Identity-Based Security and Privacy for the Internet of Things...Go To Presentation
- OAuth 2.0 Threat Landscapes...Go To Presentation
- Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication...Go To Presentation
- Risk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank...Go To Presentation
8) Top 3 Talks on Machine Learning from RSA Conference USA 2018
Following are the top talks on Machine Learning that discuss the applications and limitations of machine learning in cybersecurity, exploring fundamentals, applications, potential to address workforce shortages, and future evolution of capabilities.
- Evolution of AI Bots for Real-Time Adaptive Security...Go To Presentation
- Fighting Malware with Graph Analytics: An End-to-End Case Study...Go To Presentation
- Security and Privacy of Machine Learning...Go To Presentation
9) Top 4 Talks on Mobile & IoT Security from RSA Conference USA 2018
Here are some great talks that will provide information about the trending topics in Mobile & IOT Security.
- From IT to IoT: Bridging the Growing Cybersecurity Divide...Go To Presentation
- The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem...Go To Presentation
- The New Landscape of Airborne Cyberattacks...Go To Presentation
- Within 10 Years, Autonomous Vehicles Will Change Every CISO’s Job...Go To Presentation
10) Top 5 Talks on Technology Infrastructure & Operations from RSA Conference USA 2018
Following talks focus on the most interesting and challenging elements of current and emerging security infrastructure.
- Evidence-Based Security: The New Top Five Controls...Go To Presentation
- Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Management...Go To Presentation
- From SIEM to SOC: Crossing the Cybersecurity Chasm...Go To Presentation
- SDN and Security: A Marriage Made in Heaven. Or Not....Go To Presentation
- Stop Translating, Start Defending: Common Language for Managing Cyber-Risk...Go To Presentation
Comments