• Eight Conflicts Which Changed Cyberspace

    February 21, 2014

    The history of cyber conflict has been long ignored, leading us to make repeated mistakes. Not only does cyberspace have a recognizable 26-year history, it is rich with lessons applicable for policymakers and practitioners today. Eight cyber conflicts in particular have been “wake-up calls.” While history may not repeat, it tends to echo.

  • Hacking Exposed: Day of Destruction

    February 21, 2014

    Destructive attacks remain a relatively rare occurrence; however, there is a growing interest among attackers towards strategic digital armageddon. This session will demonstrate cutting edge destructive capabilities that may soon be adopted by nation-state attackers. In the typical raw Hacking Exposed style, we demo these known & proof of concept tools as well as provide relevant countermeasures.

  • The Cloud – Security Nightmare or Our Next Great Hope?

    February 21, 2014

    Security professionals in general distrust the cloud—losing control, fly-by-night third party solutions, privacy and surveillance. However, the cloud provides a way to address issues such as the vanished perimeter, ubiquitous connected devices and new categories of attack. This keynote addresses how we can turn the cloud in our favor to defend against the increasing security challenges we are…

  • How Joshua DoSed Jericho: Cybersecrets of the Bible

    February 20, 2014

    “There is nothing new under the sun”— Ecclesiastes. Who knew the Bible is a security guide covering: • Trust models (Eve, the apple, and the serpent) • Insider threats (Samson and Delilah) • Decipherment (the writing on the wall of Babylon) ...and more? A light-hearted look at how Biblical wisdom can help you find the security Promised Land, raise bits from the dead and avoid Armageddon.

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Sat, 19 Apr 2014 08:29:36 -0400.
© 2014 EMC Corporation. All rights reserved.