• Cloud Ninja: Catch Me If You Can!

    January 28, 2014

    What happens when computer criminals start using friendly cloud services such as Dropbox, Google Apps, Heroku, Amazon EC2 and Yahoo Pipes for malicious activities? This presentation will explore how to (ab)use the free public cloud for the business of computer crime. Oh! Also we violate the hell out of some terms of service.

  • NSA Surveillance: What We Know, and What to Do about It

    January 27, 2014

    Drawing from Snowden documents and revelations from previous whistleblowers, this talk will cover types of surveillance the NSA conducts and how it conducts it. Emphasis will be on the technical capabilities of the NSA, not the politics or legality of their actions; includes a discussion on countermeasures likely to frustrate any nation-state adversary & raise the cost of wholesale surveillance.

  • Special Message on Continuing Education Credits

    January 24, 2014

    Learn about the various ways to earn continuing education credits during your time at RSA Conference. Jeanne Friedman outlines the details of earning credits with the following organizations: (ISC)2, ISACA, IAPP, GIAC, and ABA. To view the full transcript of this podcast, head over to our blog.

  • Turning Medical Device Hacks into Tools for Defenders

    January 23, 2014

    Much has been done to highlight weaknesses in medical devices in the past years. To help prevent the perpetuated mistakes of the past, we have done research and compiled these threats and vulnerabilities into guidelines for the security community to harden or assess medical devices. Our hope is to help manufacturers, clinicians and practitioners in securing their environments.

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Sat, 19 Apr 2014 07:58:21 -0400.
© 2014 EMC Corporation. All rights reserved.