RSA Conference Greatest Hits: June 2016

Posted on by Jennifer Lawinski

We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. 

What were your favorite RSA Conference blog posts and videos in the month of June this year? 

Top Blog Posts

1. The Dangers of Skimmers and Safes in Hotel Rooms: Part two of Woody Wooden's look at the ways in which business travelers are at risk takes a look at how skimmers can be put into hotel safes to steal your personal information. 

2. Executive Hotel Rooms Are a Hacker’s Treasure Chest: Woody Wooden takes a look at the ways in which malicious hackers can steal your data using simple devices planted in hotel rooms. 

3. Network Intrusion: Methods of Attack: Robert Moskowitz's exploration of network attack vectors continues to be one of your favorite stories on our blog. 

Top Videos

1. The Seven Most Dangerous New Attack Techniques, and What's Coming Next: Which are the most dangerous new attack techniques for 2016/2017? How do they work? How can you stop them? What's coming next and how can you prepare? This fast-paced session provides answers from the three people best positioned know: the head of the Internet Storm Center, the top hacker exploits expert/teacher in the U.S., and the top expert on cyberattacks on industrial control systems.

2. See You in Singapore! Join us 20-22 July, 2016 at the Marina Bay Sands in Singapore! 

3. Webcast: Data Protection and Breach Readiness - How to Stay SecureFor the past eight years the Online Trust Alliance has published guidance on data protection and breach readiness including a broad set of operational and technical best practices to help protect company’s and customers’ personal data. A key to success is moving from a compliance perspective to one of stewardship. In this session you will hear highlights from OTA’s 2016 Data Protection and Breach Readiness Guide with specific advice on actions all organizations should take. 

Jennifer Lawinski

Director of Social Media & Community, Arculus

Blogs posted to the website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.

Share With Your Community

Related Blogs