Menu

Sessions & Workshops

Monday, October 8, 2012

Tuesday, October 9, 2012

Wednesday, October 10, 2012

Thursday, October 11, 2012

  • Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition

    • 9:30 – 10:00 | Crypto Commons Theatre | AUTH-300

    A fully updated edition of Hacking Exposed is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats;…

    Conference Track:
    Participants:
    Stuart McClure - Chief Executive Officer, Cylance
    Wendy Nather - Research Director, Information Security, Retail Cyber Intelligence Sharing Center (R-CISC)
  • Rock Your Communications with HTML5 WebSocket – Secure!

    • 12:00 – 12:30 | Crypto Commons Theatre | LLK-305

    Ensuring secure communication via the internet is key to all companies. New technologies offer interactive communication possibilities, having the power to rock your web experience. But are they still…

    Conference Track:
    Participant:
    Aidan Gogarty - HOB Technology Evangelist, HOB Inc.
  • De-identification: Entitlement or Identity?

    • 12:10 – 12:50 | Discussion Group Area A | DSG-300A

    "If I'm not doing anything wrong, why do you need to know who I am?" There are many times when "identity" is not actually required; instead "entitlement" is what is actually needed to control access…

    Conference Track:
    Participant:
    Andrew Yeomans - Head of Sec. Engineering, Commerzbank
  • Social Media: Whose Data is it Anyway?

    • 12:10 – 12:50 | Discussion Group Area B | DSG-300B

    The use by businesses of social media is growing as a marketing tool, and employees are using social media both for personal and business use. But what happens when employment terminates? Are there…

    Conference Track:
    Participant:
    Dai Davis - Partner, Percy Crow Davis & Co
  • Cloud Provider Auditing and Assurance

    • 12:10 – 12:50 | Discussion Group Area C | DSG-300C

    Many organisations have invested heavily to achieve compliance – so how can this investment be protected when adopting cloud services? What are the assurance frameworks and which can really help cloud…

    Conference Track:
    Participant:
    Mike Small - Senior Analyst, KuppingerCole
  • How Can You Configure the Human Firewall?

    • 12:10 – 12:50 | Discussion Group Area D | DSG-300D

    People are an organisation's biggest asset. But as cybercriminals target employees to instigate an APT, they are increasingly cited as the biggest risk. How do you train your employees to recognise…

    Conference Track:
    Participant:
    Rashmi Knowles - Chief Security Architect, RSA, The Security Division of EMC
  • The Rise of Creativity in Cyber Security

    • 12:30 – 13:00 | Crypto Commons Theatre | LLK-306

    As cyber attackers have gotten more creative, most security vendors still lack understanding of the behavior of people or machines to monitor for activities that circumvent traditional cyber defenses. …

    Conference Track:
    Participant:
    Mark Seward - Senior Director Security and Compliance, Splunk Inc.
  • Testing Darwinism: The History and Evolution of Network Resiliency

    • 13:00 – 13:30 | Crypto Commons Theatre | LLK-307

    Ensuring network security, performance, and reliability must be a key corporate objective. The history of resiliency testing is explored in an effort to understand how network security has evolved…

    Conference Track:
    Participant:
    Michael Hamilton - Director, Global Systems Engineering, BreakingPoint Systems, Inc.

This document was retrieved from http://www.rsaconference.com/events/eu12/agenda/sessions on Sat, 01 Aug 2015 07:48:23 -0400.
© 2015 EMC Corporation. All rights reserved.