Crowdsourced Submissions

Congratulations to the top 17 finishers!

Congratulations to the following presenters, selected by public vote to present at RSA Conference 2016. You can add them to your session schedule now by clicking on the sessions of interest and selecting “Add to My Schedule". Remember, Full Conference and Discover badge holders can attend the crowdsourced sessions in Moscone North. See you at RSA Conference 2016!

Artificial intelligence for InfoSec: Actively learning to mimic an analyst Kalyan Veeramachaneni MIT
Bank the Unbanked With One of the Largest PKIs Ever Built Adam Ross cv cryptovision GmbH
Breach Fixation. How Breaches Distort Reality and How Should we Respond? John Dickson Denim Group, Ltd.
Security Tools: An Attacker's Dream Come True Roy Katmor EnSilo
CROWDPATCHING it's time to take vulnerability fixing in our own hands Mitja Kolsek ACROS d.o.o.
Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford vArmour
Data-Driven App Sec Joel Scambray Cigital
Does The Risk of Criminal Activity Justify a Ban of Strong Encryption? Klaus Schmeh cryptovision
From pigtails, to prom, to a cyber career: what about your daughter? Deidre Diamond Cyber Security Network
Getting Scammed: A Security CEO's Firsthand Encounter Tom Kemp Centrify
Hacker Marketing Strategy: How Cybercriminals Promote for Press and Profit Jennifer Leggio Digital Shadows
Hide and Seek: How Threat Actors Respond in the Face of Public Exposure Kristen Dennesen FireEye, Inc.
The Air Up There: Wireless Beyond Wi-Fi, IoT from DC  to 10GhZ Chris Rouland Bastille Networks
The Gamification of Data Loss Prevention Mark Stevens Digital Guardian
The Secrets of Malware Success on Google Play Store Rowland Yu SOPHOS
Top 10 Security Hardening settings for Windows Servers and Active Directory Derek Melber Manage Engine - A division of Zoho Corp.
Using deception and forensics to detect threats from within Joseph Salazar Attivo Networks


Behind hacker's keyboard - a candid look at their tools of trade Alex Holden Hold Security, LLC
Security Tools: An Attacker's Dream Come True Roy Katmor enSilo
What lurks in your cloud:  studying breaches in virtualised infrastructure Seth Chromick vArmour

This document was retrieved from on Thu, 27 Oct 2016 22:34:08 -0400.
© 2016 EMC Corporation. All rights reserved.