Menu

RSA Conference Path: Technical

In 2016, we introduced Conference Paths, a curated collection of sessions and events designed to help professionals discover exactly the right content for their particular job function or industry.

Bill image

While we work on 2017 Conference Paths, here’s a look back at some of the best Technical content from last year, curated by Bill Burns, chief trust officer at Informatica.

Hacking Exposed image

Hacking Exposed LIVE: Attacking in the Shadows
Stuart McClure, CEO, Cylance Attackers bypass security controls and products almost at will. See how to defend against these “next generation” attacks.

Watch Video


Machine Learning image

Machine Learning and the Cloud: Disrupting Threat Detection and Prevention
Mark Russinovich, Chief Technology Officer, Microsoft Azure, Microsoft Learn how Microsoft uses the agility and scale of the cloud to protect its infrastructure and customers by applying data mining and machine learning algorithms and security domain learnings to the vast amounts of data and telemetry gathered by its many different systems and services.

Watch Video

case study

The Shadowy Cyberattack—State Sponsors of Terror and Cyberterrorists Andre McGregor, Director of Security, Tanium Real-world case study on state-sponsored cyberterrorism and jihadi extremists attacking computer systems.

View Presentation

 case study

Dissecting Bitcoin Security Cassio Goldschmidt, Principal Information Security Leader, NCR Review and dissection of Bitcoin’s core components and their security controls. Analysis of control’s strengths and weakness and how they could be used in other domains.

View Presentation

This document was retrieved from http://www.rsaconference.com/events/us17/agenda/rsa-conference-path-technical on Wed, 18 Jan 2017 17:15:42 -0500.
© 2017 EMC Corporation. All rights reserved.