Podcasts

  • Battle Scars And Friendly Fire: War Stories from a Threat Research Team

    October 3, 2013

    Building a threat research team and making that team an effective part of your organisation is no easy task. In this session you will hear several war stories about how to create a process that will make your team more effective. You'll hear about what we did right, learn from our mistakes and hear how you can get the most impact out of your team's research. Co-speakers: Seth Geftic and Will…

  • Cyber Security Information Exchange

    October 2, 2013

    In this session we will explore the high-level requirements of a Cyber Security Data Exchange and provide a brief description of the work needed to develop it.

  • Top Ten Proactive Software Controls

    October 1, 2013

    In the past, application security professionals thought firewalls, SSL, patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected applications are occurring every day. This session will review the top coding techniques developers need to build websites, web services and mobile solutions in a secure fashion.

  • The Threat Horizon: The 2013 Global Information Security Workforce Study - PROF-M01

    February 22, 2013

    Julie Peeler, Foundation Director, (ISC)² As Foundation Director, Julie Peeler is responsible for building, leading and managing the (ISC)² Foundation to ensure it becomes a vibrant, wide-reaching and effective organization for the benefit of everyone who interacts with data and the Internet in their daily lives. Peeler is an accomplished market researcher and business strategist with nearly three…

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Tue, 21 Oct 2014 07:58:14 -0400.
© 2014 EMC Corporation. All rights reserved.