• Leave the App Alone! - Attack and Defense of Android App Hijack

    June 9, 2014

    It's very risky for an App running in a rooted Android device, as this App is able to be accessed by another so it might be hijacked. After hijacked, this App's actions are monitored by others. You might lose your Facebook account password, or even get your money stolen if a banking App is hijacked. In this session, the threats of App hijack and how to prevent them will be discussed.

  • The Next World War Will be Fought in Silicon Valley

    February 21, 2014

    We are under attack, and we are not allowed to fight back. Everyone has a breaking point. What’s yours?

  • The Cloud – Security Nightmare or Our Next Great Hope?

    February 21, 2014

    Security professionals in general distrust the cloud—losing control, fly-by-night third party solutions, privacy and surveillance. However, the cloud provides a way to address issues such as the vanished perimeter, ubiquitous connected devices and new categories of attack. This keynote addresses how we can turn the cloud in our favor to defend against the increasing security challenges we are…

  • Eight Conflicts Which Changed Cyberspace

    February 21, 2014

    The history of cyber conflict has been long ignored, leading us to make repeated mistakes. Not only does cyberspace have a recognizable 26-year history, it is rich with lessons applicable for policymakers and practitioners today. Eight cyber conflicts in particular have been “wake-up calls.” While history may not repeat, it tends to echo.

RSA Conference Podcasts RSS

This document was retrieved from on Sun, 21 Dec 2014 09:24:27 -0500.
© 2014 EMC Corporation. All rights reserved.