09.00 – 09.45 hrs


Advanced Malware and the Cloud: The New Concept of 'Attack Fan-out'
Krishna Narayanaswamy,Chief Scientist, Netskope
The rapid rise in cloud adoption, of which organizations have underestimated the scope of by nearly 10x, has created a new effect: a 'cloud attack fan-out'. Between many connected devices, which increase attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity for and the severity of breaches rise.

Cybercrime Collaboration--The Changing APAC Threat Landscape 
Etay Maor,    Executive Security Advisor, IBM Corporation
The security industry is lagging when it comes to collaboration! Cybercriminals worldwide are constantly sharing data and working together to make a profit. These efforts are manifested in the form of new threats. This session will dive into APAC-specific threats to explore the dark net and will analyze a recent malware campaign to see how criminals collaborate and target Asian entities. 

Cybersecurity Insurance: New Risks and New Challenges--Be Smart 
Mark Weatherford,Chief Cybersecurity Strategist, vArmour
The cybersecurity insurance market is exploding and while underwriters don't completely understand the risks involved, they and their insurance clients are boldly moving forward. This dynamic and interactive talk will explore how cybersecurity insurance could be the catalyst that finally incentivizes private companies to take security seriously by investing in people, process and technology. 

From Strategy to Tactics: Targeting and Protecting Privileged Accounts 
Lavi Lazarovitz,Cybersecurity Researcher, CyberArk Software (Singapore) Pte Ltd 
CyberArk Labs found that 88% of networks are significantly susceptible to compromise through privileged account credential theft or abuse. Neglected privileged passwords and SSH keys open up unnecessary attack surfaces causing vulnerabilities on networks. The high profile Bangladesh heist breach is just one example. Use this information to conceive your defence strategy and deploy best-in-practice tactics.
 

Security Implications of Using Blockchain Technology for More than Money 
Thomas Keenan,Professor, University of Calgary
While cryptocurrencies like Bitcoin are currently the main applications for blockchain technology, enthusiasts believe it can do much more, from keeping land title registries in Honduras to IoT apps like making your washer smarter. But can it do this securely, given cryptocurrency's checkered track record? This session will look at where blockchain technology is going and point out pitfalls to avoid. 

Thingbots: The Future of Botnets in the Internet of Things 
Paul Sabanal,Security Researcher, X-Force Advanced Research Team, IBM Corporation 
The age of the Internet of Things is upon us. With billions of devices connecting to the Internet in the coming years, targeting them has become more attractive. One threat that has started to emerge are botnets consisting of infected IoT devices, aka Thingbots. This talk will discuss the current state of Thingbots, then show how they could evolve and become a significant threat in the future.


10.00 – 10.45 hrs
Data Science for Cybersecurity: How Can We Make It Work? 
Eyal Kolman,Senior Researcher, RSA
Although machine learning tools are commonly used in numerous applications, the big boom of advanced analytics in cybersecurity is yet to come. This session will cover the current paradigm for utilizing machine learning algorithms to solve cybersecurity problems, present some of the promises and challenges, compare different approaches and demonstrate concrete use cases over real data. 

Eastern European Black Market Economy Trends
Alex Holden,Chief Information Security Officer, Hold Security, LLC
Eastern European cybercriminals are evolving. Their new schemes are getting more disruptive and harmful to businesses. This session will analyse the most effective attacks and monetization techniques. It is possible to disrupt these attacks and make your organization an unfeasible target. 

I Am Divergent: EMDIVI's All Kinds of Attacks
Pearl Charlaine Espejo,Sr. Threat Analyst, Trend Micro
Join this session to understand the growing threat of EMDIVI, a Remote Access Trojan (RAT) that targets organizations mostly in Japan. Based on their observations into an EMDIVI campaign, the speakers will reveal insights into how the malware keeps improving, utilizing different ways to infect its targets. Learn the steps you can take to protect your organization from this RAT. 

Is the Tokenisation Framework Really Secure?
Thiago Musa,Director, Trustwave
Tokenisation is not a new concept even when it relates to Cardholder Data (CHD). The release of 'Apple Pay' raised attention to the new standard by EMVCo about Payment Tokenisation. From a security perspective, it removes the CHD not only from the merchants, but also from the acquirer and even from the cardholder, giving a new perspective and including the Token Service Provider. 

OS X Malware: Growth and Maturity
Jason Carpenter,Principal Security Consultant, Cylance
Malware grows in a standardized fashion. It starts off fairly simplistic, adding complexity as the battle between malware authors and endpoint protection grows. OS X malware is following this standard but at a much higher rate than seen before. This session will talk about parallels of malware history, the current state of OS X malware and what is likely to come next. 

The Path to Active Defense by Combining Deception Technologies with Analytics
Daniel Cooper,Head of Advanced Cyber Services, BT
Security analytics technologies are only as effective as the quality of the data that is ingested and the processing applied to it. With a long history of protecting the UK government and other Fortune 500 companies from cyberthreats, BT will share how indicators generated by deception technologies can be used in security analytics to deliver actionable intelligence. 

11.15 – 12.00 hrs
Behavioural Analytics--A Closer Look
Mike Huckaby,Vice President of Global Presales, RSA
User behaviour, entity and other variants of analytics are the hot topics in security today. With every new emerging technology comes the usual hype, and false hopes. This session will take a closer look at what behavioural analytics really is: how it came about, how it really works, the problems it can realistically solve and what the future holds.


Encryption, Apple and Global Implications
Jeffrey Blatt,Of Counsel, Tilleke & Gibbins International
The attempt by the FBI to require Apple to hack its own iPhone is the latest attempt by a government to require access to encrypted data residing on a device and in the cloud. The Apple case, when considered with the U.S. v. Microsoft 'Outlook.com' appeal, represents a perfect storm that will determine the future of our businesses and expectations of privacy. 

Fighting 'Sophisticated' Attacks with Advanced Persistent Security 
Ira Winkler ,President, Secure Mentem
Any attack against significant organizations is labeled 'sophisticated' by default. The reality is that most of these attacks result from inadequate security programs. This review of recent notable incidents will highlight the root vulnerabilities and define an adaptive security strategy to prevent incidents, but more importantly to detect and respond to such incidents before loss can be realized. 
这个思路比较认可。APT硬是被现在的商家炒成了新概念,搞的好像是全新技术。对于一般企业来说,花80%成本解决1%不到的攻击,不值得。况且如作者所说,大部分的APT都是因为企业内部一些基本安全没做好,比如弱口令、通用密码等,解决这些问题才是根本。何况,当前的APT工具也都是事后很久才能发现异常,等发现时数据已经泄露,意义就更不明显了。

The Need for Speed: Application Security in a DevOps World
John Dickson,Principal, Denim Group
This session will cover how organizations are applying application security in continuous integration / continuous deployment environments. With competitive forces driving faster software deployment schedules, security architects are implementing end-to-end automation and other strategies to ensure rapid software deployment does not leave security behind. 

Web Attacks of Past, Present and Future
Michael Smith,Security CTO, Asia Pacific & Japan, Akamai Technology
As a service provider delivering and protecting roughly 30% of the world's web traffic, Akamai receives and responds to a huge amount of attacks. This session will share analysis of attack campaigns, tools and techniques that Akamai has seen--account takeover, watering-hole attacks, site scraping, vulnerability scanning and hijacking--and discuss basic protections that website owners can implement. 

What Can We Do to Mitigate the Risk of Falling Victim to Ransomware? 
Masayoshi Someya,Senior Security Evangelist, Trend Micro
Whilst ransomware has been so successful in compromising businesses of all sizes, it is becoming more and more sophisticated. How are cybercriminals attacking businesses with ransomware? What can businesses do to mitigate the risk of falling victim? This session will look at ransomware's attack vectors and characteristics, and countermeasures that businesses can adopt. 

14.15 hrs
Beyond Traditional Security: The Latest Internet Security Practices of Alibaba 
Fang Chao,Director of Alibaba JAQ Security, Alibaba Inc.
With the tremendous development of mobile Internet, services such as e-business, e-bank, e-taxi, etc., are deeply steeped in our daily lives. This change has caused new security problems to emerge prominently, including false credit, false orders, etc., which cannot be dealt with using traditional security solutions. This session will share the best practice approaches toward Internet security at Alibaba.
阿里巴巴聚安全产品化输出
目前5.0版本提供了诸多功能,并针对金融、游戏等行业提供全套解决方案


Are You Ready for a Breach?
Glenn Gunara-Chen,Executive Director - Fraud Investigation & Dispute Services, EY 
Cybercrime is a growth industry where the returns are great and the risks are low. As such, cybercrime has become the 'new normal' where EY have observed that the 'protect and control' mentality is no longer sufficient. In order to adequately address cyber-breaches, it is necessary for organizations to develop a strong, centralized response framework as part of the enterprise risk management strategy. 
假设企业已经被攻陷,怎么办?
作者认为组织应该建立更强大的中央响应框架(centralized response framework)


The Effects of the Digital Age
Sir Bob Geldof,Musician, Businessman
Sir Bob Geldof, winner of the Nobel Man of Peace Award, will discuss the intersection of our digital world with sustainability, resources and political instability. Learn how social media is being used to gain rebel support, how high-frequency commodities trading impacts the world and how young people live in a highly connected but non-physical world as well as global security and current geopolitical threats. 








附件列表

Day 4 @ RSA Conference Asia Pacific & Japan 2016的更多相关文章

  1. Day 3 @ RSA Conference Asia Pacific & Japan 2016 (morning)

    09.00 – 09.45 hrs Tracks Cloud, Mobile, & IoT Security    A New Security Paradigm for IoT (Inter ...

  2. Day 2 @ RSA Conference Asia Pacific & Japan 2016

    上午有两场summits,议题分别是: sum-w01: G2B: Cyber-Business in Myanmar, Indonesia and Thailand sum-w02: Achievi ...

  3. Day 3 @ RSA Conference Asia Pacific & Japan 2016 (afternoon)

    13.30 hrs Keynote    Security in the World-Sized Web Bruce Schneier,Chief Technology Officer, Resili ...

  4. Day 1 @ RSA Conference Asia Pacific & Japan 2016

    # 国内出发 早上8:45的航班,首次从深圳机场乘坐国际航班(先前去日本.欧洲都从香港走),就提前了3个小时出发. 乘taxi到机场30分钟不到,135元.到了T3 4号出发口,发现check-in的 ...

  5. 大数据技术人年度盛事! BDTC 2016将于12月8-10日在京举行

    2016年12月8日-10日,由中国计算机学会(CCF)主办,CCF大数据专家委员会承办,中国科学院计算技术研究所和CSDN共同协办的2016中国大数据技术大会(Big Data Technology ...

  6. RSA 2019安全大会:企业资产管理成行业新风向标,云上安全占优势

    美国时间3月4-8日,国际知名信息安全峰会RSA Conference在美国旧金山开幕,云安全及云可以为企业提供更可靠的资产管理方式成为大会热点. 此次峰会共吸引全球700多家机构参展,其中近42%为 ...

  7. 中国计算机学会CCF推荐国际学术会议

    中国计算机学会推荐国际学术会议 (计算机系统与高性能计算) 一.A类 序号 会议简称 会议全称 出版社 网址 1 ASPLOS Architectural Support for Programmin ...

  8. CCF推荐国际学术会议

    类别如下计算机系统与高性能计算,计算机网络,网络与信息安全,软件工程,系统软件与程序设计语言,数据库.数据挖掘与内容检索,计算机科学理论,计算机图形学与多媒体,人工智能与模式识别,人机交互与普适计算, ...

  9. SCI&EI 英文PAPER投稿经验【转】

    英文投稿的一点经验[转载] From: http://chl033.woku.com/article/2893317.html 1. 首先一定要注意杂志的发表范围, 超出范围的千万别投,要不就是浪费时 ...

随机推荐

  1. a标签拨打电话、发短信、发邮件

    1.<a href=”tel:xxxx”>拨打电话</a> 2.<a href=”sms:xxxx”>发短信</a> 3.<a href=”mai ...

  2. 有两个数组a,b,大小都为n;通过交换a,b中的元素,使sum(a)-sum(b)最小。

    今天在浏览网页的时候,发现了一个叫做  华为面试题(8分钟写出代码) 的链接,不确定真实性,纯属好奇,就点进去看看 这个可能是很老的题目吧,因为我看到这题目时,底下有好多评论了.提到XX排序,内存占用 ...

  3. react + iscroll5

    react + iscroll5 经过几天的反复折腾,总算做出一个体验还不错的列表页了,主要支持了下拉刷新,上拉加载两个功能. 一开始直接采用了react-iscroll插件,它是基于iscroll插 ...

  4. C# 合并DLL, 合并DLL进入EXE 【转】

    使用方法非常简单 在项目属性窗口中,选择"生成事件",在"生成后事件命令行"下的文本框中输入 ilmerge /ndebug /t:dll /log c:/1/ ...

  5. Cocos2d-x 3.0 beta 中加入附加项目,解决无法打开包括文件:“extensions/ExtensionMacros.h”: No such file or directory”

    Cocos2d-x 3.0 Alpha 1开始 对目录结构进行了整合.结果有些附加项目也被在项目中被精简出去. 比如说如果你需要使用CocoStdio导出的JSON.或使用Extensions扩展库, ...

  6. IEEE二进制浮点数算术标准(IEEE 754)

    整理自IEEE 754 IEEE二进制浮点数算术标准(IEEE 754)是20世纪80年代以来最广泛使用的浮点数运算标准,为许多CPU与浮点运算器所采用.这个标准定义了表示浮点数的格式(包括负零-0) ...

  7. phpstorm 强大的活动模板 可以自定义注释,代码段,根据cms订制自动提示

    http://jingyan.baidu.com/article/8275fc86badd6346a03cf6aa.html [PHP] phpstorm的使用(1) http://v.youku.c ...

  8. Java 声明和访问控制(三) finalize方法 成员访问修饰符

    finalize()方法是Object类的一个方法,在垃圾回收器执行的时候,会调用被回收对象的此方法,可以覆盖此方法提供垃圾收集时的其他资源的回收,例如文件关闭等. 成员访问修饰符: 默认访问:包访问 ...

  9. The APR based Apache Tomcat Native library

    Tomcat启动的时候出现下面这样的提示: 2015-11-06 14:24:12 org.apache.catalina.core.AprLifecycleListener init 信息: The ...

  10. 李洪强iOS开发Swift篇—05_元组类型

    李洪强iOS开发Swift篇—05_元组类型 一.元组类型介绍 1.什么是元组类型 元组类型由 N个 任意类型的数据组成(N >= 0),组成元组类型的数据可以称为“元素” 示例: let po ...