Transcription

RSA CONFERENCETECHNICAL PATH Build your ideal Conference itineraryOur Conference Paths will help you discover the most relevant sessions for you and yourorganization. Start with the sessions listed in this Path, then visit the full agenda online tocomplete your itinerary.MONDAY9 AM – 5 PM1 –4:30 PMRANSOMWARERSAC INNOVATION SANDBOX CONTESTExplosive growth demands focusedunderstanding, so we’ve developed this newseminar to give attendees a full day all aboutransomware, and its multifaceted implicationsacross technical, policy, compliance andfinancial response. Sessions will discussinnovative research, present case studies onresponse and recovery to ransomware, explorecombatting ransomware and debate if—andwhen—you should pay the ransom.For the past eleven years, the RSACInnovation Sandbox Contest has crownedinnovative companies who create cutting-edgetechnologies to fight the infosec risk. Seethe agenda for this year’s contest.Winner announcement at 4:30 PMID: SEM-M03DON’T MISS!WELCOMERECEPTION5 – 7 PMVISIT RSACONFERENCE.COM TO VIEW THE FULL AGENDAALL SESSIONS ARE SUBJECT TO CHANGE

RSA CONFERENCETECHNICAL PATH TUESDAY1:15 – 2 PM2:30 – 3:15 PM3:45 – 4:30 PMA VIRTUAL AND SOFTWARE-DEFINEDSECURITY ARCHITECTURE WORKSHOPHACKING BLOCKCHAINMEET & GREET WITH THE MACOSMALWARE CLASS OF 2016Dave Shackleford, Sr. Faculty, SANS InstituteKonstantinos Karagiannis, Chief TechnologyOfficer, Security Consulting, BT AmericasID: TECH-T09RID: PDAC-T10FDELIVERING SECURE, CLIENT-SIDETECHNOLOGY TO BILLIONS OF USERSDEMYSTIFYING DEBUGGING ANDDISASSEMBLING APPLICATIONSAdrian Ludwig, Director of Android Security,GoogleJames Lyne, Global Head of Security Research,Sophos & SANS, and Stephen Sims, SecurityResearcher, SANS InstituteID: MBS-T09RPatrick Wardle, Director of Research, SynackID: HTA-T11RID: HTA-T10RFROM MOLE HILLS TO MOUNTAINS:REVEALING RICH HEADER ANDMALWARE TRIAGEZachary Hanif, Head of Security MachineLearning, Capital One, and George Webster,Ph.D. Candidate, Technical University MunichID: AIR-T10DON’T MISS!KEYNOTES8 – 10:30 AMDON’T MISS!PEER2PEERSESSIONS1:15 – 4:30 PMVISIT RSACONFERENCE.COM TO VIEW THE FULL AGENDAALL SESSIONS ARE SUBJECT TO CHANGE

RSA CONFERENCETECHNICAL PATH WEDNESDAY8 – 8:45 AM1:30 – 2:15 PM2:45 – 3:30 PMDEVOOPS: ATTACKS AND DEFENSES FORDEVOPS TOOLCHAINSHACKING EXPOSED NEXTGENTHE CYBER-CIRCUS: WHAT THE RISEOF HACKING EVERYDAY THINGS MEANSFOR ALL OF USChris Gates, Sr. Security Engineer, Uber, andKen Johnson, CTO, nVisiumID: HTA-W02SECURING WHAT YOU DON’T OWNOR CONTROL: THE CURRENT STATEOF WI-FI SECURITYRick Farina, Director of R&D, Pwnie ExpressID: MBS-W029:15 – 10 AMHACKING EXPOSED: REAL-WORLDTRADECRAFT OF BEARS, PANDASAND KITTENSStuart McClure, CEO, CylanceID: EXP-W10HACKER’S PERSPECTIVE ON YOURWINDOWS INFRASTRUCTURE:MANDATORY CHECK LISTPaula Januszkiewicz, CEO, Security Expert,Penetration Tester & Trainer, MVP, CQUREID: TECH-W10THE DRIDEX SWISS ARMY KNIFE: BIG DATADISSOLVES THE APT & CRIME GREY AREAEward Driehuis, Director of Product, Fox-ITID: HT-W10Keren Elazari, Analyst, Author and SeniorResearcher, Balvatnik Inter Disciplinary CyberResearch Center, Tel Aviv UniversityID: EXP-W11HELLO FALSE FLAGS! THE ARTOF DECEPTION IN TARGETEDATTACK ATTRIBUTIONBrian Bartholomew, Security Researcher,Kaspersky Lab and Juan Andrés GuerreroSaade, Security Researcher, Kaspersky LabID: HT-W11THE NIGHT OF THE LIVING XP: ATTACKS ONLEGACY AND EMBEDDED SYSTEMSDmitri Alperovitch, Co-Founder & CTO,CrowdStrike, and George Kurtz, CEO,CrowdStrikeTomer Bitton, VP Research, enSilo, and UdiYavo, CTO, enSiloID: EXP-W03ID: HTA-W11OPENING THE DOOR TODOD PERSPECTIVES ONCYBERTHREAT INTELLIGENCE4 – 6 PMRon Carback, Defense Intelligence Officer forCyber, Defense Intelligence AgencyID: HTA-W03PUBCRAWL5 – 6 PMINTEGRATING IT & OT: DESIGNCHALLENGES IN CRITICALINFRASTRUCTURE SECURITYLane Thames, Software Engineer and SecurityResearcher, TripwireID: LAB2-W12DON’T MISS!KEYNOTESDON’T MISS!10:30 AM - 12 PM4 – 5:05 PMPEER2PEERSESSIONS10:30 AM –12:30 PM4 – 4:45 PMVISIT RSACONFERENCE.COM TO VIEW THE FULL AGENDAALL SESSIONS ARE SUBJECT TO CHANGE

RSA CONFERENCETECHNICAL PATH THURSDAY8 – 8:45 AM10:30 AM – 12:30 PM2:45 – 3:30 PMTRACKING DARKNET: A WINDOWINTO ATTACKERS’ MOTIVES, METHODSAND TARGETSANALYTICS AND DETECTIONTHROUGH CODING, SCRIPTINGAND ORGANIZING DATATARGETED ATTACKS AGAINST CORPORATEINBOXES — A GMAIL PERSPECTIVEAndrew Lewman, Chief Revenue Officer,Farsight Security, Inc.Dilan Bellinghoven, SOC Analyst, MKACyber;Brian Kwon, Analyst, MKACyber; MischelKwon, Founder, MKACyber; Matthew Norris,Senior Anaylst, MKACyber; David Smith, QAManager, Phantom CyberID: HT-R02MEDJACK.3: NEW RESEARCH ON ATTACKSON HOSPITAL MEDICAL DEVICESMoshe Ben-Simon, Co-Founder and VicePresident, Services and TrapX Labs, TrapXSecurity and Anthony James, Vice President,Marketing, TrapX SecurityID: HTA-R02ID: LAB1-R04PSYCHOLOGY OF AN EASTERNEUROPEAN CYBERCRIMINAL:MINDSET DRIVES BEHAVIORORCHESTRATION OWNAGE:EXPLOITING CONTAINER-CENTRICDATA CENTER PLATFORMSID: HT-R10Bryce Kunz, Sr. Lead Security Engineer, Adobe,and Michael Mellor, Director of Security forMarketing Cloud, AdobeVictor Chebyshev, Security Expert,Kaspersky Lab and Mikhail Kuzin,Malware Analyst, Kaspersky LabID: CSV-R03ID: HTA-R10ID: HT-R11ISOLATING THE GHOST IN THE MACHINE:UNVEILING POST EXPLOITATION THREATSUri Fleyder-Kotler, Advanced Threats ResearchLab Manager, RSA Security, and Rotem Salinas,Senior Security Researcher, RSA Security1:30 – 2:15 PMID: HTA-R11Vitali Kremez, Cybercrime Subject MatterExpert, Flashpoint9:15 – 10 AMElie Bursztein, Anti-fraud and Abuse ResearchLead, Google, and Mark Risher, Director ofProduct Management, GoogleHEY ANDROID, WHERE IS MY CAR?PROFESSIONAL MOBILE ESPIONAGEATTACKS: PEGASUS AND BEYONDAndrew Blaich, Security Researcher, Lookoutand Max Bazaliy, Staff Security Researcher,LookoutID: MBS-R11FIXING THE FIXINGMitja Kolsek, CEO and Co-Founder, 0patchand ACROS Security, Stanka Salamun, CoFounder and COO, 0patch and ACROS SecurityID: TECH-R03HOW ANDROID AND iOS SECURITYENHANCEMENTS COMPLICATETHREAT DETECTIONAndrew Hoog, CEO and Co-Founder,NowSecureID: MBS-R03RDON’T MISS!PEER2PEERSESSIONS10:30 AM – 12:30 PM4 – 4:45 PMRSACBASH6 – 10 PMDON’T MISS!KEYNOTES10:30 – 11:40 AM4 – 5:10 PMVISIT RSACONFERENCE.COM TO VIEW THE FULL AGENDAALL SESSIONS ARE SUBJECT TO CHANGE

RSA CONFERENCETECHNICAL PATH FRIDAY9 – 9:45 AM10:15 – 11 AM11:30 AM – 12:15 PMWEBSITE SHADOW IT: WHERE THERISKS LURKDETECTING AND RESPONDING TOADVANCED THREATS WITHIN EXCHANGEENVIRONMENTSOSX PIRRIT: WHY YOU SHOULD CAREABOUT MALICIOUS MAC ADWAREMark Salter, Manager, Website SecurityDevelopment, The Media TrustID: HT-F01Steven Adair, CEO, VolexityAmit Serper, Principal Security Researcher,CybereasonID: HTA-F02ID: HTA-F03IoT END OF DAYSPROJECT OVERWATCH: MULTI-NATIONALEFFORT TO COMBAT IMSI CATCHERSCharles Henderson, Global Head ofX-Force Red, IBM CorporationID: MBS-F02Trent Smith, Director of Product Overwatch,ESD AmericaID: MBS-F03DON’T MISS!KEYNOTES1 – 2 PMVISIT RSACONFERENCE.COM TO VIEW THE FULL AGENDAALL SESSIONS ARE SUBJECT TO CHANGE

Lab Manager, RSA Security, and Rotem Salinas, Senior Security Researcher, RSA Security ID: HTA-R11 PROFESSIONAL MOBILE ESPIONAGE ATTACKS: PEGASUS AND BEYOND Andrew Blaich, Security Researcher, Lookout and Max Bazaliy, Staff Security Researcher, Lookout ID: MBS-R11 DON'T MISS! KEYNOTES 10:30 - 11:40 AM 4 - 5:10 PM RSAC BASH 6 - 10 PM