Menu

Sessions and Events

Tuesday, February 25, 2014

Wednesday, February 26, 2014

Thursday, February 27, 2014

  • Using Automated Cyber Threat Exchange to Turn the Tide against DDOS

    • 8:00am – 9:00am | West | 3022 | ANF-R01

    The FS ISAC, the IT sector and the Federal Government have been working together to detect, prevent and mitigate the impact of DDOS attacks by leveraging the automated exchange of actionable cyber…

    Conference Track:
    Participants:
    Peter Fonash - Chief Technology Officer, Cybersecurity and Communications, Department of Homeland Security
    Eric Sporre - Cyber Division Deputy Assistant Director, FBI
    Mark Clancy - Managing Director, CISO Technology Risk Management, DTCC, CEO, Soltra
    Phyllis Schneck - Deputy Under Secretary, Cybersecurity and Communications, Department of Homeland Security
    Richard Struse - Chief Advanced Technology Officer, Department of Homeland Security
  • Security by and for the People!

    • 9:20am – 10:20am | West | 3022 | ANF-R02

    Security by and for the people! Data protection and security awareness have amped up by enlisting our end users to protect enterprise data and IP. Hadoop-enabled Big Data system sends weekly…

    Conference Track:
    Participants:
    Joshua Davis - Sr Dir, IT, Qualcomm
    Leslie Lambert - Chief Security and Strategy Officer, GuruCul Solutions
  • Hunting for OS X Rootkits in Memory

    • 10:40am – 11:40am | West | 3022 | ANF-R03

    The OS X Kernel has been increasingly targeted by malicious players due to the shrinking attack surface. This presentation will include demonstrations and discuss attacks, such as function inlining, …

    Conference Track:
    Participant:
    Cem Gurkok - Threat Intelligence Research and Development Manager, Verizon Terremark
  • A Human Factor Interface for SIEM

    • 12:00pm – 12:20pm | West | 3022 | ANF-R04A

    By correlating security log data from security devices with other security-related information, SIEM provides means to discover blended threats. But the systems do not provide sensors to observe…

    Conference Track:
    Participants:
    Bettina Wesselmann - Information Security Communications Consultant, Freelancer
    Johannes Wiele - Senior Security Consultant, Trustwave Deutschland GmbH

Friday, February 28, 2014

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions on Wed, 10 Feb 2016 05:46:23 -0500.
© 2016 EMC Corporation. All rights reserved.