Menu

Podcasts

Showing Podcasts: 53–56 of 136 tagged Podcast

  • Mine Is Bigger: When Cybercriminals Compare Tools

    October 8, 2013

    Cybercriminals use a growing arsenal of weapons to steal data, remotely control devices and circumvent security systems. This session, based on 100% real and fresh cyber underground discussions and reverse engineering, features two "cybercriminals" battling for the ultimate control of a victim PC.

  • Battle Scars And Friendly Fire: War Stories from a Threat Research Team

    October 3, 2013

    Building a threat research team and making that team an effective part of your organisation is no easy task. In this session you will hear several war stories about how to create a process that will make your team more effective. You'll hear about what we did right, learn from our mistakes and hear how you can get the most impact out of your team's research. Co-speakers: Seth Geftic and Will…

  • Cyber Security Information Exchange

    October 2, 2013

    In this session we will explore the high-level requirements of a Cyber Security Data Exchange and provide a brief description of the work needed to develop it.

  • Top Ten Proactive Software Controls

    October 1, 2013

    In the past, application security professionals thought firewalls, SSL, patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected applications are occurring every day. This session will review the top coding techniques developers need to build websites, web services and mobile solutions in a secure fashion.

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Fri, 19 Dec 2014 19:51:36 -0500.
© 2014 EMC Corporation. All rights reserved.