• The Next World War Will be Fought in Silicon Valley

    February 21, 2014

    We are under attack, and we are not allowed to fight back. Everyone has a breaking point. What’s yours?

  • Cloud Computing in China: Opportunities, Challenges and Risks

    February 20, 2014

    This presentation will outline the cloud computing landscape in China. It will describe the opportunities, how China is pursuing cloud computing and how China is addressing the security challenges and risks. The presentation will also describe some of the ongoing work in formal and informal external organizations such as ISO, ITU and the Cloud Security Alliance and within China.

  • Bitcoin Is Here: How to Become a Successful Bitcoin Thief!!!

    February 20, 2014

    OK folks. You’ve all been hearing about Bitcoin—and now it’s time to leverage this amazing once-in-a-lifetime opportunity to make lots of money! Learn how to become a successful Bitcoin thief, and rob Bitcoins from the comfort of your home. See why Bitcoin exchanges are sitting ducks and what your fellow fraudsters say about Bitcoin. Live Demo Included!!!

  • How Joshua DoSed Jericho: Cybersecrets of the Bible

    February 20, 2014

    “There is nothing new under the sun”— Ecclesiastes. Who knew the Bible is a security guide covering: • Trust models (Eve, the apple, and the serpent) • Insider threats (Samson and Delilah) • Decipherment (the writing on the wall of Babylon) ...and more? A light-hearted look at how Biblical wisdom can help you find the security Promised Land, raise bits from the dead and avoid Armageddon.

RSA Conference Podcasts RSS

This document was retrieved from on Sun, 21 Dec 2014 18:55:49 -0500.
© 2014 EMC Corporation. All rights reserved.