logo

2022-06-06 ~ 2022-06-09

Presentations (with video): 342 (303)

RSA® Conference, the world’s leading information security conferences and expositions, today concluded its 31st annual event at the Moscone Center in San Francisco. The year’s event attracted over 26,000 attendees, including 600+ speakers, 400+ exhibitors, and over 400 members of the media. Throughout the week, attendees networked on the expo floor and participated in keynote presentations, track sessions, tutorials, seminars, and special events. Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and cybersecurity-focused innovations across crypto and blockchain.

Sort by:  

Conference:  RSA Conference 2022
Authors:
2022-06-06

We are in a crisis of trust and truth, one of our own making. Every day brings new examples and uncertainties: vaccines, elections, “fake news”, and on it goes. The slope of discord is getting exponentially steeper and the prices higher across society. What role does government, private sector, and each of us play in creating information disorder? Join Hugh Thompson and esteemed guests from the Aspen Institute’s Commission on Information Disorder to delve into one of the most important problems of our time. Don’t miss this compelling close to RSAC 2022.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

In exchange for market access, organizations are increasingly obliged to turn over data to foreign governments who increasingly perceive private sector data as a national asset; something to be controlled and accessed within their sovereign borders. This presentation will explore a new global index that evaluates and ranks countries based on their government-mandated data access requirements.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

Security has a design problem. Our security programs are unusable, causing people to opt-out. Our security tools are unmanageable, leading to staffing shortages and shelfware. The result is not defensible. This session details a framework combining path finding and choice architecture. The industry needs to get people to follow secure practices, to opt in, to transform security. The solution is design.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

To protect the supply chain, new technologies and capabilities are required. The U.S. released the NIST PFR Guidelines to define cyber resilient systems using “dynamic trust” to secure firmware from unauthorized access. The Trusted Computing Group (TCG) is taking these guidelines toward an industry standard. This presentation will cover the implications of this to embedded system security.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

Social engineering scams affect everyone—it is something we all navigate as part everyday life. This presentation will explore the science behind these scams, both from a technical and psychological perspective. Additionally, we will step through actual case examples, market trends and specific techniques to protect end customers from becoming victims.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

Pervasive digital transformation, hybrid work, and multicloud reshaped access security. Millions of access decisions happen every second between people, machines, and apps. In this hyper-connected world how can we be confident that access is really secure? Join us to explore how these trends mandate reinvention of identity and dive into real-life strategies for protecting access.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

Cyber insurance premiums, and the barriers to entry for businesses to get coverage, are rising as high-profile breaches continue and insurers try to stay ahead of spiraling payouts. Join this panel discussion with cybersecurity insurance leaders to learn about the origins of cyber insurance, where it is today, and how this sector will evolve amid growing pressure to stop ransomware payments.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

This talk will focus on Mitsubishi ICS ecosystem’s communication protocol and show how researchers successfully uncovered flaws in its identity authentication function and can take over any asset within the entire series of Mitsubishi PLCs, revealing that such an attack can cause physical damage in critical sectors. Presenters will share workable detection and mitigation strategies for those protocols.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

Although cybercrime is now a national security threat, our understanding of the cybercriminal ecosystem remains limited. The industry needs a holistic map to conduct effective disruption, allocate resources efficiently, and impose meaningful costs on criminal actors. The WEF has initiated a project to develop this map. This panel will discuss the mapping project’s results to date and where it is going.
Tags:
Conference:  RSA Conference 2022
Authors:
2022-06-06

"Is It Secure?” (No.) For almost 60 years, recurring questions have beset our industry: “How do we secure it” (Can’t.) “Are We Secure?” (No.) They all assume that a deterministic answer is possible. (It isn’t.) The real question should be, “How does the Trust Factor of my current security posture change over time?” Now, that’s answerable. Probabilistically. C’mon down and learn how. (No product pitches. Just knowledge.)
Tags: