Day 3 @ RSA Conference Asia Pacific & Japan (afternoon)

Source: Internet
Author: User
Tags knowledge base malware protection

13.30 hrsKeynote Security in the world-sized WebBruce schneier,chief Technology Officer, resilient, an IBM company, and Security
Information technology permeates all aspects of our lives. The combination of mobile, cloud computing, the IoT, persistent computing and autonomy is resulting in a world-sized Web With great benefits but was vulnerable to a host of new threats. This talk would look at attempts-secure these systems and at technologies, laws, regulations, economic incentives and so cial norms we need to secure them on the future.
attacker Scaredfwe Attackert can do more damage by techattacker is too powerful succedMore security survived attackerHow to design gov to solve those problemsPush Gov involvementcomputer do physical thingsdebate on Auto-driver
14.00 hrsKeynote Business Defence – Managing the insider Threat with Security AnalyticsAlex Taverner,head of Cyber, commercial Solutions-japac, BAE Systems The insider threat is becoming increasingly difficu Lt to detect and manage, as traditional toolsets is rendered largely ineffective. Thinking must evolve from formulaic remediation to a proactive approach considering changes in peoples ' behaviours. How can the convergence of Big Data, threat intelligence and analytics help organizations defend against the insider Threa T? Insider: Insiders, means insiders.

14.20 hrsKeynote maximize the Value of Your Threat IntelligenceJason Rolleston, Vice President of Product Management for Security Analytics, Intel Security issues and threats make you V Igilant in your efforts to keep your company assets safe. This session would explore why gaining better visibility into threats and risks are key to effective protection, and would he LP You understand what an open, adaptive and integrated ecosystem are necessary and how threat intelligence gkfx in REAL-T IME underpins security efficiency and resilience.
Architecture drivers velocity (speed) Consolidation Orchestration Harmony

14.40 hrsKeynote How to Build a world-class Network defence OrganizationChris Coryea,Cyber Intelligence Services Manager, Lockheed Martin
A Lockheed Martin Cybersecurity expert shares practical, real-world tips on tackling the top three myths encountered while Working with Fortune-Cyber-teams. Attendees'll leave with clear direction on what to apply lessons learned from anecdotes shared.outpace over campaign heat ma P Enlightenment Revelation Three dimensions: Technology/framework/people each dimension is analyzed from three aspects: Myth Truth Enlightenment

15:15-16:00TracksGlobal Perspectives A New World, new IT, new Securityjackie chen,chief Product and Marketing Officer, Sangfor technolog ies
New IT and business environments require new security architecture changes. New security is much more complex than just isolating the network with trusted and untrusted zones. Real-time security visibility through detection is the foundation for the new and proactive security. Fast response and adaption is needed when incidents happen, as well as automated and visualized provision and operation M Ethods.



Efraud & Law Enforcement Data and Surveillancebruce Schneier, chief technology Officer, resilient, a IBM company, and Security Technologist
Surveillance is one of the core technologies of the Internet. Corporations and governments use it for profit and control, and they share information with all other or lose it to cyber Criminals in data breaches. We cooperate with corporate surveillance because it promises convenience and submit to government surveillance because it Promises protection. The result is a mass surveillance society.
Cloud, Mobile, & IoT Security Managing Security in Internet of things Using API Management Platformssuhas Desai,vic E president-digital Security, Aujas Networks Pvt Ltd
This session would cover security issues in connected devices (Internet of things), security measures to consider during it s integration with APIs management platforms and security issues with consumer applications and their cloud deployment.
Security Strategy & Data Security operationalizing the three principles of advanced Threat Detectionzulfikar Ramzan , chief technology Officer, RSA
The cybersecurity industry continues to migrate from a focus on prevention to a focus on faster detection and more Compreh Ensive Response. In this session, we'll lay out the three principles of a effective threat detection program that organizations must und Erstand and operationalize to achieve success in the new security paradigm.

Security Strategy & Data Security Security awareness is not Enough:build Security Culture Using Science of Hab itsBikash Barai,co-founder, Cigital India
We know eating French fries is bad for our health, but we still do it. Awareness is not sufficient to change user behaviour or build the right security culture. This session would cover the recent on behavioural psychology, ' habit cycle ' and culture formation. Why is it that hard-to-change culture? How can I use the science of habits to change your IT security culture?

Threats & Threat Actors Threat Intelligence Landscape in Chinafeng Xue,founder, Threatbook
In this session, Feng Xue would talk about the landscape of cyberthreat intelligence in China through case studies and Stor ies. Among others, he'll explore the very recent case of XcodeGhost, a group of hackers who managed to compromise almost all The iPhones in China, totaling on million, and Darkhotel operation 8651, where enterprises in China were targeted B Y attackers through APTs.

16:30-17:15 Tracksefraud & Law enforcement Dark Web globetrotters:differences in Seven underground Marketsryan F Lores,senior Manager, Forward looking Threat Intelligence, Trend Micro
Worldwide Underground is as unique as cultures around the planet. These is directed at individual nations or regions and all specifically targeting certain clientele. This talk would explore the many undergrounds that exist globally, what they sell and offer, and how they differ from each Other.

Threats & Threat Actors Exploit zoo:the Evolution of Exploit Kitsjordan Forssman,director, Proofpoint, Inc.
Exploit Kits (EKs) has evolved to become the very widely used arsenal in the attackers toolbox. This talk would look at a broad spectrum of EKs and their evolution, deconstructs the various components and delivery Metho DS, and uncovers evasive techniques used to make these attacks so devastating. The session would also provide access to a knowledge base and open source tools to help stay ahead of the game.

Global perspectives extending Your security beyond traditional Safe Borders with opendnsdemetris booth,head of security Product Marketing & Evangelism (APJC), Cisco
In today's cloud-connected world, the the-the-changed, but security have not. When over half of the PC's in today's organizations is mobile, you need-protect them everywhere, not just inside the O ffice. This session would discuss how OpenDNS works with Cisco advanced Malware Protection (AMP) to provide advanced intelligence To predict and thwart the future threats.


Cloud, Mobile, & IoT security Eyes everywhere:monitoring Today ' s borderless landscapebill Shinn,principal Security Solutions Architect, Amazon Web Services
Perimeter security is difficult when the Perimeter is no longer clear. Today's IT landscapes often span on-premises data centers as well as public cloud, not to mention direct user interaction From mobile devices. In this session you'll learn about monitoring techniques at unlimited scale and the most importantly how to extract meaning From the data.

Global perspectives govern every Identity. Inspect every packet-become the Department of Yesit ' s time to stop saying No out of fear. It's time for a radically different point of view made possible by adaptive, risk-based security. With it, you can govern every the identity and inspect every packet, achieving better outcomes faster and more securely. So-start pushing beyond traditional boundaries, dive into the cloud, mobility and the Internet of things. It ' s time to become the Department of Yes.

Security Strategy & Data Security The Journey:from right objectives to a measurable GRC SystemLenka Fibikova,head of IT Governance, Risk and Compliance, Marina Bay Sands
We have heard plenty of the times that we cannot manage what we cannot measure. What do I measure to manage effectively? How do much to measure to manage efficiently? This session would introduce a step-by-step approach towards a measurable GRC system from defining the right objectives to Creating pragmatic metrics. The target:to deliver valuable numbers while keeping a eye on the big picture.



From for notes (Wiz)

Day 3 @ RSA Conference Asia Pacific & Japan (afternoon)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.