PechaKucha Happy Hour
The line-up of PK presenters and the schedule is:
|5:37 p.m.||Introduction (Linda Lynch, RSA Conference)|
||Herbert “Hugh” Thompson, Ph.D, Chief Security Strategist, People Security
Title: Cloudlusion: Elf flash mobs and the new threat of rapid subversive collaboration
Abstract: On Sunday January 9th, 2011, 3500 people rode the New York City subways without pants. It was a flash mob of sorts, mobilized through the web, bringing like-minded free spirits together. The world is full of people with fringe ideas, and now thanks to social media, they can find each other quickly. Beyond a Denial of Pants attack (DoP), what if those ideas were subversive, what if their goal is hacktivism, terrorism, or destruction. This PK session take an irreverent (and all too quick) look at the new threat of rapid subversive collaboration (cloudlusion) and how it will impact enterprise information security.
||Joshua Corman, Research Director, Enterprise Security Practice, The 451 Group
Title: Why Zombies Love PCI
Abstract: For better or worse, PCI has become the most central and dominant force in information security. While it raised the bar for the negligent, it has not come without unintended consequences. In the coming Zombie Apocalypse, will compliance save you? Let's take a different look at survival. Zombies are not your friends. Aim for the head!
||Jeff Bardin, VP, Chief Security Strategist, XA Systems
Title: What's FUD Got to Do, Got to Do with It?
Abstract: Over the past several years, fear, uncertainty and doubt (FUD) has become a term that is reviled in the world of information security. Anyone who uses it is seen as someone who doesn't know what they’re doing; someone who can't measure and therefore doesn’t know what’s going on in their security realm. Books have come out against it and talks have been given where FUD is the pariah, the elephant in the room. Contrary to the outpouring of negativity towards FUD, this PK will cover the use of FUD all over the world and the need for FUD as a standard tool in the CISO's toolbox.
||Uri Rivner, Head of New Technologies, Identity Protection, RSA, The Security Division of EMC
Abstract:WikiLeaks, the largest leak of data the world has seen? Nonsense! Trojans like Zeus lurk on millions of personal, corporate and government PCs, stealing data 24 by 7. So get ready for ZeusiLeaks, the nerve wracking archive of information already in the wrong hands.
||Ben Rothke, Senior Security Consultant, British Telecom
Title: Tales of plagiarism, copyists and some really good books from the Security Reading Room
Abstract: 2010 was an interesting year in the security reading room. From hacker books plagiarized by convicted felons, to PhD’s copying security policy, and a mystery man writing certification guides. Along the way, there were a number of excellent information security books that were published. Come and hear about them from Ben Rothke, editor of the RSA Security Reading Room blog.
||William Cheswick, Lead Member of the Technical Staff, AT&T Labs Research
Title: Stop Blaming Grandma!
Abstract: The solution to cyber security is not more education. This isn't grandma's fault: her ignorance is not the problem. The problem is poor engineering and design. Why should her computer have any vulnerabilities that are exposed by clicking or typing the wrong things?
||Todd Inskeep, SVP, Emerging Channel Capabilities, Bank of America
Title: Halt! Who Goes There
Abstract:This PK special takes a hilarious and thought-provoking look backwards and forwards at identity and authentication on the Internet.