I will be attending the RSA Conference in San Francisco later on this month.  The various topics all look very interesting, and I have scheduled out the sessions I will be attending while there.  I plan on writing up information on what I learn while I am there.

My Schedule

Monday – April 20, 2015

  • Security Basic Seminar

Tuesday – April 21, 2015

  • Security’s Age of Enlightenment
  • Enhancing Cloud Trust
  • Security on Offense
  • The Cryptographers’ Panel
  • A CISO’s Perspective on Talking to the Board about Cybersecurity
  • Know your adversary: How to Obtain Breach Information Without Being Breached
  • Privileged Account Exploitation – the Point of No Return
  • News Flash: Some Things Actually Do Work in Security!!!
  • Getting a Jump on Hackers
  • Detecting Unknown Malware: Security Analytics & Memory Forensics
  • The Social Network Panel at RSA Conference

Wednesday – April 22, 2015

  • How Secure are Contact-less Payment Systems?
  • Protecting Critical Infrastructure Is Critical
  • The Kelvin Mantra: Implementing Data-Driven Security Practices
  • Don’t Touch That Dial: How Smart Thermostats Have Made Us Vulnerable
  • Fail-safe the Human Psyche to Advance Security and Privacy
  • Never, Ever, Give Up
  • Talking ’bout My Next Generation
  • Welcome to the New School of Cyber Defense
  • The Day My Kids Brought Home Malware
  • The Second Machine Age

Thursday – April 23, 2015

  • More Books You Should Have Read by Now: The Cybersecurity Canon Project
  • Six Things Wireless Security Professionals Need to Know About Wireless
  • Malware Persistence on OS X Yosemite
  • Analogue Network Security
  • The Sound of Metrics
  • Stop Selling and Start Marketing Your Information Security Program
  • Phishing for the Foolish: Why Hackers Love Gilligan’s and Their Best Lures

Friday – April 24, 2015

  • (ISC)2 CISSP-ISSMP CBK Training Preview Seminar
  • Alec Baldwin: One on One

While I may not create a detail blog report on every topic, I do plan on doing so for many of them.  Be sure and check back in May for more information on these interesting security topics.  If you have any questions, feel free to send me an email.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *

eighteen − one =