Podcasts

  • The Five Most Dangerous New Attack Techniques and What's Coming Next - EXP-W22

    February 18, 2013

    Ed Skoudis , CEO , Counterhack Two attack vectors account for 90%+ of successful intrusions grabbing sensitive information. Both are gaining new sophistication and 3 new vectors are demonstrating how innovative attackers can be. In this session, two people in unique positions to understand the newest attacks will illuminate the 5 most dangerous new attack vectors and describe how attack vectors…

  • Security Leadership - Your Secret Weapon - PROF-M04

    February 18, 2013

    GW Ray Davidson, Professor of Practice, SANS Technology Institute Ronald Woerner, Director, Cybersecurity Studies, Bellevue University GW Ray Davidson received his Ph.D. in engineering from Purdue University, and worked as a pharmaceutical scientist for the first half of his career. This gave him intimate familiarity with the challenges of a regulated industry. After a dozen years in research, …

  • Why Companies Fail with Compliance Initiatives - GRC-W25A

    February 18, 2013

    Seth Wilson, Information Security, Twitter Seth R. Wilson is a senior auditor at Twitter, with over 5 years of audit experience in the Risk Assurance practice at PricewaterhouseCoopers working with companies in the Internet, Software, Semiconductor and Networking industries, including multiple Fortune 500 companies. Wilson has performed business process IT audits, operational audits, ERP systems…

  • Software Defined (In)Security - Virtualization, Cloud & Mobility - EXP-R32

    February 17, 2013

    Christofer Hoff, Chief Security Architect, Juniper Networks New application architectures, programmatic languages and frameworks, the (un)availability of exposed platform security capabilities combined with virtual/physical networking and workload mobility are beginning to stress our "best practices" from a security perspective. What are the real security issues (or hype) of Software Defined…

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Sun, 23 Nov 2014 12:02:01 -0500.
© 2014 EMC Corporation. All rights reserved.