上午有两场summits,议题分别是:

sum-w01: G2B: Cyber-Business in Myanmar, Indonesia and Thailand
sum-w02: Achieving e-Commerce Success through Effective Internet Security: A Primer for SMEs

Myanmar是东南亚第二大国家,按照speaker的说法,人口多,发展快,市场很有潜力。不过business不是我们关心的,听了10分钟换场。

sum-w02主要讲中小企业如何从头构建有效的互联网安全体系。

Asia Pacific is the largest e-commerce region in the world. With 60% of the world's population, exploding smartphone usage and a growing consumer base that is twice as likely to buy online than any other group in the world, Asia is setting the agenda for global online retail. Such growth demands many things, chief among them building trust with consumers, who need to know their online payment transactions are secure. In a 2014 study by Mastercard, 31% of respondents cited security of transactions as a barrier to e-commerce uptake. If you consider that $567 billion was transacted online in the region in 2014, that translates to almost $176 billion in online sales impacted by security concerns. How can SMEs best address security concerns? Where should focus be placed to have maximum impact, both in security measures implemented and in success achieved? How do you even get started? This summit will explore security ramifications and provide critical guidance to SMEs looking to engage in e-commerce securely.

AGENDA ITEMS


下午有6场keynotes,分别是:


详细信息如下:

key-w04 Keynote Speaker, Minister for Home Affairs & Minister for Law, Singapore  (内务)外交部长
Mr K Shanmugam. 
缺少description信息。cyber-crime 造成的损失, cyber-space
train our people work better in the syber space
2045, reach out 
second, agency, meet & deal challege. command cyber criminals, shape prevention, CRDs. legislation
patner work with industry malware. late this year.
commit to fight cyber . China gov what?


key-w05 Business-Driven Perspectives . Amit Yoran, President, RSA
Today's security challenges can seem too large, too broad and too numerous for even the most talented teams to tackle. But what is lacking is a sharper perspective, viewing the problems from a diverse point of view and with technologies that can deliver at scale. This talk will challenge your perspective and discuss how advanced organizations are tackling cyber. 
当前的安全挑战太大,范围太广,数量无穷,即使是最厉害的团队都很难处理。我们缺少的是什么呢?一种更犀利的视角,通过发散思维、利用可以大规模部署的技术手段来看待问题。本次演讲将挑战你的视角并讨论如何提高组织的电子化处理水平。
over 5000 attenders
talk about perspective
perspective design  action
Dick Fosbury, high jumper. example, 1936. Why not change the way you jump. A new way to jump. shock people's eye.
World wide cybersecurity spend 7.5Billion
Perspective is everything.
what you do matters. preciate the difference.


key-w06 The Transformation Equation: Defining a New Security Roadmap. Matthew Alderman, VP, Global strategy, Tenable Network security.
The security industry is robust and growing rapidly, with hundreds of technologies to address new challenges and attack vectors. But even companies heavily invested in leading solutions are still being breached. No matter what security solutions you deploy, if they don't work together, your organization is at risk. How do you change your approach? It's time to define a new security roadmap.
就算是重金投入了顶级解决方案的企业,也依然被攻陷。不管你部署了怎样的安全方案,如果它们不能协同工作,你的组织就还是处在风险之中。如何改变方法呢?是时候来重新定义新的security roadmap了。 (安全路线图)
waves of change 
IT infrastructure migrateds to the Cloud
52% GE move to amazon
Applications are the Future, Security are behind
Traditional Endpoints are Dead
layered security creates Gaps: time for a new approach
Transforming SecurityBridging the Gaps
 


key-w07: The Pyramid of Protection: Rethinking Layered Security. Ben Johnson, Co-Founder & Chief Security Strategist, Carbon Black.
With the current cybersecurity climate, organizations are rebuilding or upgrading their security programs. But what should they be doing, and what have the successful teams done? This session will discuss architecting your cyberstrategy around a pyramid of capabilities versus categories of technologies. The discussion will focus on uniting man and machine, and on doing more with less. 
防护金字塔:重新思考分层安全
企业应该做什么?成功的团队已经做了什么?本session将谈谈如何构建你的网络策略,能力金字塔VS技术分类。讨论内容将关注与如何将人与机器组合起来,以及事半功倍。
NSA 前雇员  
Capability no category
时间都去哪儿了?(一张文字云图)
team of man-machine:
you cannot know everything ahead of time
Orchestration ?(P)  和谐的结合
collaborate, share, learn, evolve.
let engineer be more creative
how are we/ our team spending time.
What's essential?


key-w08: Security in the Age of Ransom, Chris Carlson, VP of Product Management, Qualys
This is the Age of Ransom! An age where global enterprises are brought to their knees by sophisticated, unrelenting attacks by criminal elements. Chris Carlson will expose the fatal flaws in today's antiquated systems, while investigating how risk and security professionals can take action. He'll make the urgent case for rapid migration to a new paradigm of continuous monitoring, visibility and response. 
勒索时代的安全。复杂的、精细的、无情的犯罪分子袭击。 CC将曝光当前过时系统的致命弱点。
BBC:university pays $20,000 to ransomware hackers
Wired: Why Hospitals are the perfect Targets for ransomware.
DNA(Digital News Asis) Ransomware Back with a vengeance, Singapore is a target
Solution: Prevent / Restore / Protect
Stripe:条纹,种类。
Gartner TOP 10 Strategic technology trends 2016
Continuous Security Solutions: Visibility/ Monitoring / Response 


key-w09: Remarks by Christopher K. Stangl, Christopher K. Stangl, Section Chief, Federal Bureau of Investigation, Cyber Division, Cyber Operations Section V.  联邦调查局(FBI)网络部门,网络运维5部,主管。
remark:评论,摘要,附注。
confronting 
跟国内的某大会常见网警类似,干货没有,聊聊法规和段子而已。
插曲:这哥们的议题是临时安排的,会议材料有张A4纸单独进行了update说明。看来都喜欢找FBI糊人。





Day 2 @ RSA Conference Asia Pacific & Japan 2016的更多相关文章

  1. Day 3 @ RSA Conference Asia Pacific & Japan 2016 (morning)

    09.00 – 09.45 hrs Tracks Cloud, Mobile, & IoT Security    A New Security Paradigm for IoT (Inter ...

  2. Day 4 @ RSA Conference Asia Pacific & Japan 2016

    09.00 – 09.45 hrs Advanced Malware and the Cloud: The New Concept of 'Attack Fan-out' Krishna Naraya ...

  3. Day 3 @ RSA Conference Asia Pacific & Japan 2016 (afternoon)

    13.30 hrs Keynote    Security in the World-Sized Web Bruce Schneier,Chief Technology Officer, Resili ...

  4. Day 1 @ RSA Conference Asia Pacific & Japan 2016

    # 国内出发 早上8:45的航班,首次从深圳机场乘坐国际航班(先前去日本.欧洲都从香港走),就提前了3个小时出发. 乘taxi到机场30分钟不到,135元.到了T3 4号出发口,发现check-in的 ...

  5. 大数据技术人年度盛事! BDTC 2016将于12月8-10日在京举行

    2016年12月8日-10日,由中国计算机学会(CCF)主办,CCF大数据专家委员会承办,中国科学院计算技术研究所和CSDN共同协办的2016中国大数据技术大会(Big Data Technology ...

  6. RSA 2019安全大会:企业资产管理成行业新风向标,云上安全占优势

    美国时间3月4-8日,国际知名信息安全峰会RSA Conference在美国旧金山开幕,云安全及云可以为企业提供更可靠的资产管理方式成为大会热点. 此次峰会共吸引全球700多家机构参展,其中近42%为 ...

  7. 中国计算机学会CCF推荐国际学术会议

    中国计算机学会推荐国际学术会议 (计算机系统与高性能计算) 一.A类 序号 会议简称 会议全称 出版社 网址 1 ASPLOS Architectural Support for Programmin ...

  8. CCF推荐国际学术会议

    类别如下计算机系统与高性能计算,计算机网络,网络与信息安全,软件工程,系统软件与程序设计语言,数据库.数据挖掘与内容检索,计算机科学理论,计算机图形学与多媒体,人工智能与模式识别,人机交互与普适计算, ...

  9. SCI&EI 英文PAPER投稿经验【转】

    英文投稿的一点经验[转载] From: http://chl033.woku.com/article/2893317.html 1. 首先一定要注意杂志的发表范围, 超出范围的千万别投,要不就是浪费时 ...

随机推荐

  1. 【 java版坦克大战--绘图技术】 绘制坦克

    通过上一节,我们学会的用java绘图.那现在就用java绘制自己坦克. 首先通过分析坦克由这几部分组成.如图 各个部件的长宽如图.15,10为圆心. /** * 坦克游戏的1.0版 * 1.画出坦克 ...

  2. 学习python网络数据采集笔记-1、2章

    英文不好只能看中文版的.邮电出版社翻译的真很烂. 以上是吐槽,以下是正文. 书中用的pthon 3.X版本,建议安装python3.4以上的版本,低版本的没有自带pip安装插件会比较麻烦. 下载地址: ...

  3. odoo 的 拉式 和 推式 库链

    推式链的数据定义在  stock.location.path 表,视图定义在 “路线” 界面的 “push rules” 具体可参考  入库设置为  Receipt in 2 steps . push ...

  4. 十分钟了解MVVMLight

    十分钟了解MVVMLight   前言: 最近看了看开源框架MVVMLight,一直想写一点笔记,但是文笔欠佳,索性就放弃了.那就来翻译一点文章吧. 由于英文水平和技术水平有限,凡是不妥之处,请大家指 ...

  5. 1500: [NOI2005]维修数列

    Description Input 输入的第1 行包含两个数N 和M(M ≤20 000),N 表示初始时数列中数的个数,M表示要进行的操作数目.第2行包含N个数字,描述初始时的数列.以下M行,每行一 ...

  6. iOS oc 中的闭包

    //闭包 NSString* s =@"123"; void (^block)() = ^() { NSLog(@"%@",s); }; block();// ...

  7. Google java编程技术规范

    不遵循规范的程序猿,不是好的coder. 学习java有一段时间了,一直想找java编程技术规范来学习一下,幸而网络资源丰富,各路玩家乐于分享,省去了好多麻烦,姑且算站在网友的肩上,砥砺前行. /** ...

  8. maven安装和环境变量配置

    maven安装和环境变量配置 myeclipse自带maven(Maven4MyEclipse)创建项目:新建Web Projects项目,在新建的页面上打上maven的勾.新建的项目里会多出个pom ...

  9. Hicharts弄个样例

    前端的事情,但最好自己要了解一下,能作个最简单的东东出来... 样例,需要的时候,用用,就喟给它一样模板数据即可. PYTHON,把字典的键值和KEY值匹配成列表即可. $(function () { ...

  10. iOS开发UI篇—UITableviewcell的性能问题

    iOS开发UI篇—UITableviewcell的性能问题 一.UITableviewcell的一些介绍 UITableView的每一行都是一个UITableViewCell,通过dataSource ...