Podcasts

  • 50 Shades of Security: Whipping Your Users Into Submission

    January 20, 2014

    While admittedly the title of this presentation started as a joke, the reality is that there are many parallels between a dominant/submissive relationship and getting users to adhere to security policies. This presentation will highlight the parallels and apply them to creating better security practices among users. Disclaimer: If people are offended by the book, they will be offended by this…

  • Data-Driven Security – Where’s the Data?

    October 24, 2013

    Data drives decisions for business leaders on a daily basis - whether it’s for routine daily tasks, or for the most strategic and impactful actions. But CSOs are typically policy-driven and have few data sources to depend on. This keynote examines the data-driven security model, discussing the latest updates on industry data and how it can help CSOs fend off cyber attacks and keep data secure.

  • Is a Secure Agile SDLC Programme a Possibility?

    October 24, 2013

    All organisations should incorporate security into their agile development processes; however best-practice models typically assume an idealistic model of how software is built. In this session, Chris Eng discusses how Veracode incorporated security into the agile development lifecycle for a product that involves anywhere from two to seven Scrum teams working in concert to ship monthly releases.

  • Playing the Game of Thrones: ensuring the CISO role at the King’s Table

    October 23, 2013

    For too long the CISO role has reported everywhere except to the board. This has resulted in conflicts of interest, poor security management and little enterprise level business risk intelligence. The enterprise should be reliant on this information in order to make better decisions in today’s business environment. How have we got here, and how do we take our rightful place at the King’s table?

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Wed, 17 Sep 2014 03:32:40 -0400.
© 2014 EMC Corporation. All rights reserved.