RSA Conference US Podcast show

RSA Conference US Podcast

Summary: RSA Conference offers information security professionals around the world an unparalleled opportunity for networking and knowledge-sharing.

Join Now to Subscribe to this Podcast

Podcasts:

 RSAC2013 Podcast: EXP-W21 - Hacking Exposed - Embedded | File Type: audio/mpeg | Duration: Unknown

Stuart McClure, CEO/President, Cylance  The computing world has moved from the purely virtual to the real world physical. Everything from smart meters to insulin pumps to cardiac defibrillators to oil and gas pipelines and more.  All of them connect together somehow to expose their vulnerabilities to the bad guy. Explore the world of embedded computing and the almost abject devoid of security built into these tiny systems.  A well-published and acclaimed security visionary, Stuart McClure has over 25 years of profound technical, operational, financial and executive experience. Stuart McClure, is the CEO/President of Cylance, Inc., an elite global security services and products company solving the world’s most difficult security problems for the most critical companies around the globe. Prior to Cylance, Stuart was EVP, Global CTO and General Manager of the Management Business Unit for McAfee/Intel. Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004. Stuart is one of the industry's leading authorities in information security today. Lead author of “Hacking Exposed: Network Security Secrets and Solutions”.   Download <08:47>

 RSAC2013 Podcast: PNG-F43 - Waiter, There's a Fly in My Code | File Type: audio/mpeg | Duration: Unknown

Mary Ann Davidson, Oracle Corporation Joshua Brickman, CA Technologies  Mary Ann Davidson is Chief Security Officer at Oracle Corporation. She’s on the Board of Directors of the Information Technology Information Sharing and Analysis Center, and on the board of the Information Systems Security Association. She has been named one of Information Security's top five “Women of Vision” and was recently named to the ISSA Hall of Fame. She has served on the Defense Science Board and as a member of the Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency. Ms. Davidson has a BSME from the U. Virginia and an MBA from the Wharton School. She has testified on cybersecurity before Congress. She was awarded the Navy Achievement Medal when serving as a commissioned officer in the US Navy Civil Engineer Corps. Joshua Brickman, project management professional, runs CA’s Federal Certifications Program. Brickman has led CA through the successful evaluation of sixteen products through the Common Criteria over the last five years (in both the U.S. and Canada). He has given talks at the last five International Common Criteria Conferences. Most recently, he has been a Steering Committee member on the Open Group consortium focused on Supply Chain Integrity and Security, The Trusted Technology Forum. He holds an undergraduate degree from Emerson College and a Masters in Management from Lesley College.  Download <06:44>

 RSAC2013 Podcast: EXP-W25: Security Culture - Figuring Out How Bad Your Company Really Is | File Type: audio/mpeg | Duration: Unknown

Ira Winkler, Chief Security Strategist, Codenomicon  It’s easy to tell whether there is a strong or weak security culture if you can recognize the patterns. Unfortunately the most talented security practitioners will fail if their organizations have a weak security culture. This session will cover how to tell what type of security culture you are dealing with, and the critical success factors to implement a strong security culture and real security.  Ira Winkler, CISSP is President of the Internet Security Advisors Group.  He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media.  He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs.  Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards.  Download <08:48>

 RSAC2013 Podcast: PROF-M01 - The Threat Horizon: The 2013 Global Information Security Workforce Study | File Type: audio/mpeg | Duration: Unknown

Julie Peeler, Foundation Director, (ISC)²  As Foundation Director, Julie Peeler is responsible for building, leading and managing the (ISC)² Foundation to ensure it becomes a vibrant, wide-reaching and effective organization for the benefit of everyone who interacts with data and the Internet in their daily lives.  Peeler is an accomplished market researcher and business strategist with nearly three decades of experience in both the for-profit and non-profit arenas.  Her experience includes forging strategic partnerships, encouraging corporate social responsibility and employee volunteerism, nonprofit board development, strategic planning and marketing.  She has worked in senior management positions at Americans for the Arts, Arts & Business Council Inc., J. Walter Thompson, and Foote Cone & Belding.  Download <07:01>

 RSAC2013 Podcast: PNG-R35A - FPKIMA: The Dial-Tone for FPKI | File Type: audio/mpeg | Duration: Unknown

Darlene Gore, Federal Public Key Infrastructure Program Manager Program Manager, GSA Chris Louden, Managing Director, Protiviti Government Services  Darlene Gore is the Federal Public Key Infrastructure Program Manager. Gore manages the mission-critical Federal Public Key Infrastructure and is responsible for overseeing the operations of the FBCA including, certificate authorities (Federal PKI Common Policy Framework (FCPCA), Federal Bridge Certification Authority (FBCA), SHA-1 Federal Root Certification Authority (SHA-1 FRCA), E- Governance Certification Authorities (EGCA)) and the FBCA repository. Prior to joining GSA and accepting the IA position, she was the Public Key Infrastructure (PKI) Subject Matter Expert/Lead, and an Information Assurance Office for the Joint Chiefs of Staff (JS) at the Pentagon. She was responsible for all of the PKI issues and initiatives. She also executed the DOD Phase II PKI Implementation Plan.  Chris Louden is a Managing Director in Protiviti’s Washington, DC (Alexandria, VA) office, overseeing the identity management Center and U.S. Federal Government CIO Solutions practices.  Louden has substantial experience in all areas of information technology and is a recognized expert in identity management and information security.  He has substantial identity management experience, including federation, inter-federation, Public Key Infrastructure, Identity and Access Management and Services Oriented Architecture (SOA).  He has excellent written and verbal communication skills, including substantial public speaking experience.  Download <03:41>

 RSAC2013 Podcast: GRC-R33 - Privacy Compliance and Oversight in the National Security Context | File Type: audio/mpeg | Duration: Unknown

John DeLong, Director of Compliance, National Security Agency  John DeLong is the Director of Compliance at the National Security Agency.  In previous positions, DeLong has supported NSA/CSS senior leadership in various transformational efforts - advocating and leading the careful and efficient resolution of complex policy, technical, compliance and oversight issues.   He has also developed and taught numerous classes at the National Cryptologic School in areas such as computer science and cybersecurity.   He graduated magna cum laude from Harvard with a Bachelor of Arts degree in physics and mathematics and received his Juris Doctor, cum laude, from Harvard Law School.  Download <04:31> 

 RSAC2013 Podcast: PNG-R33 - Cyber Security, Technology and Social Networking in Crisis Management | File Type: audio/mpeg | Duration: Unknown

Kiersten Todt Coon, President and Chief Executive Officer, Liberty Group Ventures, LLC  Kiersten Todt Coon is President of Liberty Group Ventures (LGV).  Todt Coon executes risk management strategies for companies, governments, quasi-public entities and universities.  She also conducts cyber security gap analyses for these clients. Prior to LGV, she was a partner at Good Harbor Consulting, Vice President at Business Executives for National Security, consultant for Sandia National Laboratories and an adjunct lecturer at Stanford. She served on the U.S. Senate Committee on Homeland Security and Governmental Affairs and drafted components of the Department of Homeland Security legislation. She graduated from Princeton University with a degree from The Woodrow Wilson School of Public and International Affairs and holds a Masters Degree in Public Policy from Harvard University.  Download <04:23>

 RSAC2013 Podcast: HT-R35B - The Security Threat to Smart Grid is Worse Than We Think | File Type: audio/mpeg | Duration: Unknown

Robert Hinden, Check Point Fellow, Check Point Software  Bob Hinden is the co-inventor of IPv6.  Hinden is a Check Point Fellow at Check Point Software, and is chair of the IETF Administrative Oversight Committee and co-chairs the IETF IPv6 working group. He is also a member of the Board of Trustees of the Internet Society.  He was co-recipient of the 2008 IEEE Internet Award for pioneering work in the development of the first Internet routers.  Download <04:31>

 RSAC2013 Podcast: SECT-F41 - Living Below the Security Poverty Line: Coping Mechanisms | File Type: audio/mpeg | Duration: Unknown

Wendy Nather, Research Director, Enterprise Security Practice, 451 Research Andrew Ellis, Chief Security Officer, Akamai Technologies  Wendy Nather is Research Director of the 451 Research Enterprise Security Practice. With over 20 years of IT experience, Nather built and managed the IT security program at the Texas Education Agency, where she directed multimillion-dollar initiatives for a statewide external user base of over 50,000. She also provided security guidance for the datacenter consolidation of 27 Texas state agencies. She previously worked in various roles in the investment banking division of Swiss Bank Corp (now UBS).   Andy Ellis is Akamai's Chief Security Officer, responsible for overseeing the security architecture and compliance of the company's massive, globally distributed network. He is the designer and patent holder of Akamai's SSL acceleration network, as well as several of the critical technologies underpinning the company’s Kona Security Solutions.  Download <05:40>

 RSAC2013 Podcast: HT-F43 - Taking Down the World's Largest Botnets | File Type: audio/mpeg | Duration: Unknown

Atif Mushtaq, Senior Staff Malware Scientist at FireEye, Inc.  Atif architected FireEye's core botnet detection engine, which is a signatures-less engine that can detect the presence of malware such as trojans, worms and botnets inside large networks. He writes often on network security issues, his articles can be found on FireEye's official blog at blog.fireeye.com.  His research on botnets has led to many of the world's largest spam botnets of their time.  The list includes Srizbi,  Rustock A and B, Ozdok/Mega-D,  Cutwail A and most recently the Grum botnet.  Download <04:01>

 RSAC2013 Podcast: EXP-R31 - Hacking Exposed: PLA Edition | File Type: audio/mpeg | Duration: Unknown

Dmitri Alperovitch, Co-Founder & CTO, CrowdStrike George Kurtz, President & CEO, CrowdStrike  Over the last half a decade, Chinese intruders have penetrated companies as varied as Google, Adobe, and Lockheed Martin. The Hacking Exposed: PLA Edition talk will have live action demos with focus on tactics, techniques and procedures attributed to the People's Republic of China. We will demonstrate how attackers operate by using their own tools and tradecraft to compromise a target enterprise.  Dmitri Alperovitch is Co-Founder and CTO of CrowdStrike, leading Intelligence, Research and Engineering teams. A renowned computer security researcher, he is a thought-leader on cybersecurity policies and state tradecraft. As former VP of Threat Research at McAfee, he led the company’s Internet threat intelligence analysis, correlation, and visualization. In 2010 and 2011, Alperovitch led the global team that investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions, and named those incidents. Alperovitch serves on Georgia Tech Information Security Center Industry Advisory Board and is a Senior Fellow at Atlantic Council.  George Kurtz is co-founder and CEO of CrowdStrike, a cutting edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information.  George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost 20 years of experience in the security space and has helped hundreds of organizations and governments around the world tackle the most demanding security problems. His prior roles include McAfee’s WW Chief Technology Officer and GM. Prior to joining McAfee, Kurtz was CEO and co-founder of Foundstone, which was acquired by McAfee. He also authored the bestselling security book, Hacking Exposed: Network Security Secrets & Solutions.  Download <07:35> 

 RSAC2013 Podcast: GRC-W22 - Risk Management: How to Put Theory into Practice | File Type: audio/mpeg | Duration: Unknown

Eric Chabrow, Executive Editor, ISMG  Eric Chabrow, who oversees ISMG's GovInfoSecurity and InfoRiskToday, is a veteran multimedia journalist who has covered information technology, government and business. He's the former top editor at the award-winning business journal CIO Insight and a long-time editor and writer at InformationWeek.  Download <05:37>

 RSAC2013 Podcast: GRC-W23 - Managing Enterprise Risk: Y U NO HAZ METRICS? | File Type: audio/mpeg | Duration: Unknown

John Johnson, Global Security Program Manager, John Deere  Dr. John Johnson manages technical security programs across more than 130 John Deere business units in 160 countries worldwide. Johnson has been responsible for architecting solutions that have been critical to maintaining global network security at John Deere. He has been with John Deere since 1999, prior to that he was network and security manager for the Theoretical Division at Los Alamos National Laboratory. He is a frequent speaker at industry conferences and serves on various industry boards, advisory councils and conference committees. He develops and teaches information security courses for several universities and is an advisory board member for The University of Advancing Technology.  Download <07:29>

 RSAC2013 Podcast: PNG-T18B - The Internet Health Model for Cyber Security | File Type: audio/mpeg | Duration: Unknown

Kevin Sullivan, Principal Security Strategist, Microsoft  Kevin Sullivan is a Principal Security Strategist with Microsoft’s Global Security Strategy and Diplomacy team, part of Trustworthy Computing,  which focuses on driving strategic change, both within Microsoft and externally, to advance security and resiliency. Sullivan leads the group’s efforts on internet threat reduction, strategic pilots and critical infrastructure protection. He participates in several industry committees focused on technology and policy issues and is a frequent speaker at conferences. Prior to joining Microsoft, he specialized in system and network design for government, academic and private sector organizations. He earned a Bachelor of Science in Information Science from Northeastern University.  Download <05:48>

 RSAC2013 Podcast: GRC-T17 - Extreme Cyber Scenario Planning & Fault Tree Analysis | File Type: audio/mpeg | Duration: Unknown

Ian Green, Manager, Cybercrime and Intelligence, Commonwealth Bank of Australia  Ian Green is the Manager of the Cybercrime & Intelligence team at Australia’s largest and one of the world’s largest banks. Green’s team is responsible for analyzing, monitoring and mitigating threats posed by organized crime groups, hacktivists and nation states. His team specializes in the collection, analysis and mitigation of banking Trojans.  He has managed teams of penetration testers and been a penetration tester himself.  He has been part of teams who regularly discover 0-day vulnerabilities in enterprise grade solutions.  His strength is his communication skills, in particular, his ability to explain highly technical concepts in plain English. He has spoken in front of large and small audiences on various  information security topics and has lectured at RMIT University.  Download <04:00>

Comments

Login or signup comment.