Showing Podcasts: 1–4 of 136 tagged Podcast

  • A Strategic Approach to Threat Intelligence

    July 1, 2014

    Threat Intelligence is the new buzzword with every security product claiming to generate it and many commercial intelligence feeds available. But how much of it is really intelligence and how much of it is just information? We will discuss how to put in place a successful intelligence strategy which focuses on what intelligence is required and how it is utilized.

  • Software Defined Perimeter: Securing the Cloud to the Internet of Things

    June 26, 2014

    CSA's Software Defined Perimeter (SDP), a next generation security architecture for virtual private clouds, hardened SaaS, BYOD and Internet of Things, is explained. CSA is disrupting network security by making networks dark and adapting innovations from top secret systems. We will dive in to the reference architecture, review enterprise implementations and discuss the future of SDP.

  • EAS-SEC Project: Securing Enterprise Business Applications

    June 24, 2014

    Seven years of research and security assessment focused on enterprise business applications such as ERP, SRM, CRM, and others of top vendors such as SAP, Oracle and Microsoft realize that none of the current guidelines and projects perfectly cover those systems. It pushes us into creating a project started from OWASP chapter and later moved to separate project EAS-SEC results of which we will…

  • Is Your Fridge Conspiring Against You? IoT Attacks and Embedded Defenses

    June 16, 2014

    HVAC systems are being hacked! Surveillance cameras are being co-opted! Refrigerators are sending spam! The Internet of Things (IoT) and control systems deliver tremendous convenience, but at a cost. Does your organization know how to assess the risks introduced by IoT and control systems? Do you have the correct methodology? The right tools?

RSA Conference Podcasts RSS

This document was retrieved from on Sat, 20 Dec 2014 14:26:46 -0500.
© 2014 EMC Corporation. All rights reserved.