Podcasts

Showing Podcasts: 73–76 of 136

  • Awareness Doesn't Matter: A Behavior Design Approach to Securing Users - HUM-W21

    February 19, 2013

    Katrina Rodzon, Manager of Security Behavior Design, MAD Security Her last 9 years have been spent studying psychology and ways to modify and study human behavior. From learning about the power of social pressure on group behavior to how subtle changes in reinforcement can drastically change individual behavior, Katrina has spent the better part of a decade learning how humans work and now applies…

  • Is it Whack to Hack Back a Persistent Attack? - SECT-F42

    February 19, 2013

    Dave Asprey, Vice President of Cloud Security, Trend Micro As Vice President of Cloud Security at Trend Micro, Dave Asprey is responsible for thought leadership and technology evangelism for Trend Micro’s cloud computing and virtualization businesses. He is the author of the upcoming book Cloud Networking Simplified (Prentice Hall 2013). Dave created and launched two early cloud computing service…

  • Data Analysis and Visualization for Security Professionals - GRC-T18

    February 19, 2013

    Jay Jacobs, Principal, Verizon Business Bob Rudis, Director of Enterprise Security & IT Risk Management, Liberty Mutual Insurance Jay Jacobs is an author of the Verizon Data Breach Investigations Report and Principal at Verizon Business specializing in information security data analysis. Prior to joining Verizon, he focused on risk management and analysis and designed and implemented cryptographic…

  • The Hyperconnected World of Intelligent Devices: A New Era for Security - KEY-W27

    February 19, 2013

    Philippe Courtot, Chairman and Chief Executive Officer, Qualys The hyperconnected world of intelligent devices is now today's reality. We live in a new era where everyone and everything is powered by devices that collect and process information with context from multiple areas to make decisions. This keynote examines the disruptions intelligent devices are having on the current security model…

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Mon, 01 Sep 2014 19:33:59 -0400.
© 2014 EMC Corporation. All rights reserved.