Podcasts

Showing Podcasts: 5–8 of 136

  • EITC Lessons Learned: Building Our Internal Security Intelligence Capability

    June 13, 2014

    When it comes to APT attacks, security intelligence is the most effective security control that can throttle their effect. The earlier the attack is spotted, the less the impact is and shorter the cleanup can take. This session will explore techniques that can enhance organizations’ security intelligence capabilities to be able to spot APT attacks at the different cyber kill chain phases.

  • Project 2020 - Preparing Your Organization for Future Cyber Threats, Today

    June 11, 2014

    Hear the results of Project 2020, which is an ICSPA initiative, driven by Trend Micro and Europol, that imagines the technology landscape in the year 2020 and tries to predict the cybercriminal opportunities in that new world. Attendees will understand how countries and corporations may be affected by these threats and learn what they can do today to prepare their organizations for the future.

  • Will Your Company Be to Intellectual Property What Mt. Gox Was to Bitcoin?

    June 10, 2014

    The long established virtual currency in Silicon Valley is not Bitcoin, but intellectual property (IP). Just as the Mt. Gox bankruptcy caused a collapse in the price of Bitcoins, the loss of a company’s IP can be disastrous. Securing your organization’s intellectual property requires a strategy unto itself, not just the expectation that an organization’s information security program is enough.

  • Leave the App Alone! - Attack and Defense of Android App Hijack

    June 9, 2014

    It's very risky for an App running in a rooted Android device, as this App is able to be accessed by another so it might be hijacked. After hijacked, this App's actions are monitored by others. You might lose your Facebook account password, or even get your money stolen if a banking App is hijacked. In this session, the threats of App hijack and how to prevent them will be discussed.

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Tue, 02 Sep 2014 17:18:35 -0400.
© 2014 EMC Corporation. All rights reserved.