09.00 – 09.45 hrs


Advanced Malware and the Cloud: The New Concept of 'Attack Fan-out'
Krishna Narayanaswamy,Chief Scientist, Netskope
The rapid rise in cloud adoption, of which organizations have underestimated the scope of by nearly 10x, has created a new effect: a 'cloud attack fan-out'. Between many connected devices, which increase attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity for and the severity of breaches rise.

Cybercrime Collaboration--The Changing APAC Threat Landscape 
Etay Maor,    Executive Security Advisor, IBM Corporation
The security industry is lagging when it comes to collaboration! Cybercriminals worldwide are constantly sharing data and working together to make a profit. These efforts are manifested in the form of new threats. This session will dive into APAC-specific threats to explore the dark net and will analyze a recent malware campaign to see how criminals collaborate and target Asian entities. 

Cybersecurity Insurance: New Risks and New Challenges--Be Smart 
Mark Weatherford,Chief Cybersecurity Strategist, vArmour
The cybersecurity insurance market is exploding and while underwriters don't completely understand the risks involved, they and their insurance clients are boldly moving forward. This dynamic and interactive talk will explore how cybersecurity insurance could be the catalyst that finally incentivizes private companies to take security seriously by investing in people, process and technology. 

From Strategy to Tactics: Targeting and Protecting Privileged Accounts 
Lavi Lazarovitz,Cybersecurity Researcher, CyberArk Software (Singapore) Pte Ltd 
CyberArk Labs found that 88% of networks are significantly susceptible to compromise through privileged account credential theft or abuse. Neglected privileged passwords and SSH keys open up unnecessary attack surfaces causing vulnerabilities on networks. The high profile Bangladesh heist breach is just one example. Use this information to conceive your defence strategy and deploy best-in-practice tactics.
 

Security Implications of Using Blockchain Technology for More than Money 
Thomas Keenan,Professor, University of Calgary
While cryptocurrencies like Bitcoin are currently the main applications for blockchain technology, enthusiasts believe it can do much more, from keeping land title registries in Honduras to IoT apps like making your washer smarter. But can it do this securely, given cryptocurrency's checkered track record? This session will look at where blockchain technology is going and point out pitfalls to avoid. 

Thingbots: The Future of Botnets in the Internet of Things 
Paul Sabanal,Security Researcher, X-Force Advanced Research Team, IBM Corporation 
The age of the Internet of Things is upon us. With billions of devices connecting to the Internet in the coming years, targeting them has become more attractive. One threat that has started to emerge are botnets consisting of infected IoT devices, aka Thingbots. This talk will discuss the current state of Thingbots, then show how they could evolve and become a significant threat in the future.


10.00 – 10.45 hrs
Data Science for Cybersecurity: How Can We Make It Work? 
Eyal Kolman,Senior Researcher, RSA
Although machine learning tools are commonly used in numerous applications, the big boom of advanced analytics in cybersecurity is yet to come. This session will cover the current paradigm for utilizing machine learning algorithms to solve cybersecurity problems, present some of the promises and challenges, compare different approaches and demonstrate concrete use cases over real data. 

Eastern European Black Market Economy Trends
Alex Holden,Chief Information Security Officer, Hold Security, LLC
Eastern European cybercriminals are evolving. Their new schemes are getting more disruptive and harmful to businesses. This session will analyse the most effective attacks and monetization techniques. It is possible to disrupt these attacks and make your organization an unfeasible target. 

I Am Divergent: EMDIVI's All Kinds of Attacks
Pearl Charlaine Espejo,Sr. Threat Analyst, Trend Micro
Join this session to understand the growing threat of EMDIVI, a Remote Access Trojan (RAT) that targets organizations mostly in Japan. Based on their observations into an EMDIVI campaign, the speakers will reveal insights into how the malware keeps improving, utilizing different ways to infect its targets. Learn the steps you can take to protect your organization from this RAT. 

Is the Tokenisation Framework Really Secure?
Thiago Musa,Director, Trustwave
Tokenisation is not a new concept even when it relates to Cardholder Data (CHD). The release of 'Apple Pay' raised attention to the new standard by EMVCo about Payment Tokenisation. From a security perspective, it removes the CHD not only from the merchants, but also from the acquirer and even from the cardholder, giving a new perspective and including the Token Service Provider. 

OS X Malware: Growth and Maturity
Jason Carpenter,Principal Security Consultant, Cylance
Malware grows in a standardized fashion. It starts off fairly simplistic, adding complexity as the battle between malware authors and endpoint protection grows. OS X malware is following this standard but at a much higher rate than seen before. This session will talk about parallels of malware history, the current state of OS X malware and what is likely to come next. 

The Path to Active Defense by Combining Deception Technologies with Analytics
Daniel Cooper,Head of Advanced Cyber Services, BT
Security analytics technologies are only as effective as the quality of the data that is ingested and the processing applied to it. With a long history of protecting the UK government and other Fortune 500 companies from cyberthreats, BT will share how indicators generated by deception technologies can be used in security analytics to deliver actionable intelligence. 

11.15 – 12.00 hrs
Behavioural Analytics--A Closer Look
Mike Huckaby,Vice President of Global Presales, RSA
User behaviour, entity and other variants of analytics are the hot topics in security today. With every new emerging technology comes the usual hype, and false hopes. This session will take a closer look at what behavioural analytics really is: how it came about, how it really works, the problems it can realistically solve and what the future holds.


Encryption, Apple and Global Implications
Jeffrey Blatt,Of Counsel, Tilleke & Gibbins International
The attempt by the FBI to require Apple to hack its own iPhone is the latest attempt by a government to require access to encrypted data residing on a device and in the cloud. The Apple case, when considered with the U.S. v. Microsoft 'Outlook.com' appeal, represents a perfect storm that will determine the future of our businesses and expectations of privacy. 

Fighting 'Sophisticated' Attacks with Advanced Persistent Security 
Ira Winkler ,President, Secure Mentem
Any attack against significant organizations is labeled 'sophisticated' by default. The reality is that most of these attacks result from inadequate security programs. This review of recent notable incidents will highlight the root vulnerabilities and define an adaptive security strategy to prevent incidents, but more importantly to detect and respond to such incidents before loss can be realized. 
这个思路比较认可。APT硬是被现在的商家炒成了新概念,搞的好像是全新技术。对于一般企业来说,花80%成本解决1%不到的攻击,不值得。况且如作者所说,大部分的APT都是因为企业内部一些基本安全没做好,比如弱口令、通用密码等,解决这些问题才是根本。何况,当前的APT工具也都是事后很久才能发现异常,等发现时数据已经泄露,意义就更不明显了。

The Need for Speed: Application Security in a DevOps World
John Dickson,Principal, Denim Group
This session will cover how organizations are applying application security in continuous integration / continuous deployment environments. With competitive forces driving faster software deployment schedules, security architects are implementing end-to-end automation and other strategies to ensure rapid software deployment does not leave security behind. 

Web Attacks of Past, Present and Future
Michael Smith,Security CTO, Asia Pacific & Japan, Akamai Technology
As a service provider delivering and protecting roughly 30% of the world's web traffic, Akamai receives and responds to a huge amount of attacks. This session will share analysis of attack campaigns, tools and techniques that Akamai has seen--account takeover, watering-hole attacks, site scraping, vulnerability scanning and hijacking--and discuss basic protections that website owners can implement. 

What Can We Do to Mitigate the Risk of Falling Victim to Ransomware? 
Masayoshi Someya,Senior Security Evangelist, Trend Micro
Whilst ransomware has been so successful in compromising businesses of all sizes, it is becoming more and more sophisticated. How are cybercriminals attacking businesses with ransomware? What can businesses do to mitigate the risk of falling victim? This session will look at ransomware's attack vectors and characteristics, and countermeasures that businesses can adopt. 

14.15 hrs
Beyond Traditional Security: The Latest Internet Security Practices of Alibaba 
Fang Chao,Director of Alibaba JAQ Security, Alibaba Inc.
With the tremendous development of mobile Internet, services such as e-business, e-bank, e-taxi, etc., are deeply steeped in our daily lives. This change has caused new security problems to emerge prominently, including false credit, false orders, etc., which cannot be dealt with using traditional security solutions. This session will share the best practice approaches toward Internet security at Alibaba.
阿里巴巴聚安全产品化输出
目前5.0版本提供了诸多功能,并针对金融、游戏等行业提供全套解决方案


Are You Ready for a Breach?
Glenn Gunara-Chen,Executive Director - Fraud Investigation & Dispute Services, EY 
Cybercrime is a growth industry where the returns are great and the risks are low. As such, cybercrime has become the 'new normal' where EY have observed that the 'protect and control' mentality is no longer sufficient. In order to adequately address cyber-breaches, it is necessary for organizations to develop a strong, centralized response framework as part of the enterprise risk management strategy. 
假设企业已经被攻陷,怎么办?
作者认为组织应该建立更强大的中央响应框架(centralized response framework)


The Effects of the Digital Age
Sir Bob Geldof,Musician, Businessman
Sir Bob Geldof, winner of the Nobel Man of Peace Award, will discuss the intersection of our digital world with sustainability, resources and political instability. Learn how social media is being used to gain rebel support, how high-frequency commodities trading impacts the world and how young people live in a highly connected but non-physical world as well as global security and current geopolitical threats. 








附件列表

Day 4 @ RSA Conference Asia Pacific & Japan 2016的更多相关文章

  1. Day 3 @ RSA Conference Asia Pacific & Japan 2016 (morning)

    09.00 – 09.45 hrs Tracks Cloud, Mobile, & IoT Security    A New Security Paradigm for IoT (Inter ...

  2. Day 2 @ RSA Conference Asia Pacific & Japan 2016

    上午有两场summits,议题分别是: sum-w01: G2B: Cyber-Business in Myanmar, Indonesia and Thailand sum-w02: Achievi ...

  3. Day 3 @ RSA Conference Asia Pacific & Japan 2016 (afternoon)

    13.30 hrs Keynote    Security in the World-Sized Web Bruce Schneier,Chief Technology Officer, Resili ...

  4. Day 1 @ RSA Conference Asia Pacific & Japan 2016

    # 国内出发 早上8:45的航班,首次从深圳机场乘坐国际航班(先前去日本.欧洲都从香港走),就提前了3个小时出发. 乘taxi到机场30分钟不到,135元.到了T3 4号出发口,发现check-in的 ...

  5. 大数据技术人年度盛事! BDTC 2016将于12月8-10日在京举行

    2016年12月8日-10日,由中国计算机学会(CCF)主办,CCF大数据专家委员会承办,中国科学院计算技术研究所和CSDN共同协办的2016中国大数据技术大会(Big Data Technology ...

  6. RSA 2019安全大会:企业资产管理成行业新风向标,云上安全占优势

    美国时间3月4-8日,国际知名信息安全峰会RSA Conference在美国旧金山开幕,云安全及云可以为企业提供更可靠的资产管理方式成为大会热点. 此次峰会共吸引全球700多家机构参展,其中近42%为 ...

  7. 中国计算机学会CCF推荐国际学术会议

    中国计算机学会推荐国际学术会议 (计算机系统与高性能计算) 一.A类 序号 会议简称 会议全称 出版社 网址 1 ASPLOS Architectural Support for Programmin ...

  8. CCF推荐国际学术会议

    类别如下计算机系统与高性能计算,计算机网络,网络与信息安全,软件工程,系统软件与程序设计语言,数据库.数据挖掘与内容检索,计算机科学理论,计算机图形学与多媒体,人工智能与模式识别,人机交互与普适计算, ...

  9. SCI&EI 英文PAPER投稿经验【转】

    英文投稿的一点经验[转载] From: http://chl033.woku.com/article/2893317.html 1. 首先一定要注意杂志的发表范围, 超出范围的千万别投,要不就是浪费时 ...

随机推荐

  1. 如何在windows上安装部署设置SVN服务器

    1   一.准备工作 1.SVN服务器:解压缩包,可以从官方网站下载最新版本. 2.SVN客户端:TortoiseSVN,即常说的小乌龟,是一个客户端程序,用来与服务器端通讯. 2 二.安装服务器和客 ...

  2. [About me] 关于Alima博主

    大家好,欢迎来到我的博客,我是博主Alima. 关于我,一个从岛国工作刚刚失望回国的90后男孩子,被日企伤的很难过. 迫切的想改变现在的一切,想换个城市换个工作方向,重新开始. 如果你,觉得我的博客写 ...

  3. VHDL程序的库

    VHDL库存储和放置了可被其他VHDL程序调用的数据定义.器件说明.程序包等资源.VHDL库的种类有很多,但最常见的库有IEEE标准库.WORK库.IEEE标准库主要包括STD_LOGIC_1164. ...

  4. POJ 2442 Sequence 优先队列

    题目: http://poj.org/problem?id=2442 #include <stdio.h> #include <string.h> #include <q ...

  5. 【XCode7+iOS9】http网路连接请求、MKPinAnnotationView自定义图片和BitCode相关错误--备用

    更新了iOS9和XCode7,之后,Swift变成了2.0,有了新的语法习惯,iOS也加强了安全方面的限制.我们原本的项目就会出现不少问题.先来看我之前的项目中出现的3个错误吧和相关的解决办法吧. 1 ...

  6. Visual Studio快捷键小结

    工欲善其事必先利其器,这句话相信大家都听说过.利其器,就是我们先得有个神器,神器就是VS(号称宇宙第一IDE),有了神奇不会用也是白搭,就像你有了倚天剑和屠龙刀你不会使,它也就是废铁(假设它们是铁做的 ...

  7. HTML5解决跨域问题

    HTML5解决跨域问题 由于浏览器的同源策略,网络连接的跨域访问是不被允许的,XHR对象不能直接与非同源的网站处理数据交互.而同源指的是什么呢?同源的范畴包括:规则(协议),主机号(域名.ip等),端 ...

  8. VCC,VDD,VEE,VSS,VPP 表示的意义

    转自VCC,VDD,VEE,VSS,VPP 表示的意义 VCC,VDD,VEE,VSS,VPP 表示的意义 版本一: 简单说来,可以这样理解: 一.解释 VCC:C=circuit 表示电路的意思, ...

  9. POJ 1286 Necklace of Beads(Polya定理)

    点我看题目 题意 :给你3个颜色的n个珠子,能组成多少不同形式的项链. 思路 :这个题分类就是polya定理,这个定理看起来真的是很麻烦啊T_T.......看了有个人写的不错: Polya定理: ( ...

  10. 【网络流24题】 No.22~24

    接下来几题就写写题解吧.不是很想打了. 22. 输入文件示例input.txt4 21 2 7 36 5 8 37 8 10 59 6 13 9 输出文件示例output.txt17 最长不相交路径. ...