9 Can't-Miss Sessions at RSA
by Jillian Kossman on May 13, 2021 12:00:00 AM
Two years in a row, RSA will be a very unique experience. This time, it’s going completely digital Here are the sessions we’re looking forward to most. And if you’re not registered yet, scroll to the bottom for a free Digital Expo code where you’ll get access to some of the events below.
Most modern companies have a multi-product tech stack, that is often held together by
hundreds of different libraries with external APIs and code loaded at run time. Attacks against this fragile software supply chain are becoming very common. This back to basics session will show in an interactive attack/defend session how the current attacks against these applications work, and how to correctly apply the defenses against them. Jason Lam, Certified Instructor from the SANS Institute will lead the session in a classroom style environment.
Geopolitical and cybersecurity expert Dmitri Alperovitch joins Sandra Joyce, EVP at FireEye to discuss new and novel attacks and the individuals and criminal organizations behind them. Behind every threat is a real human - who are they, and what do they want? This keynote is sure to be entertaining and illuminating.
Ransomware is one of the fastest growing categories of malware, and one of the most costly. The average cost of a ransomware attack is now more than $300,000. Attendees will learn how it is made, common characteristics, behaviors, and how an author can quickly evade antivirus signatures as well as how to fight back with novel detection and incident response techniques tailored from numerous ransomware engagements with live actors.
Adopting key security protocols for domain names and DNS has become critical with growth in business email compromise (BEC) and phishing attacks. Learn about the threats associated with poor management of these digital assets and ensure there are no missing links in security postures. This session will provide eye-opening research findings on the severity of this problem.
Hackers and bad actors are clever, and they often leverage what’s top of mind in the news cycle. Trending topics like COVID-19, the capitol riots, and TikTok were all used in 2020 to cloak malicious domain usage. DNSFilter CEO, Ken Carnesi, looks at some of the sneakiest, and most topical threats, we blocked in 2020, and how you can leverage your network insights to stop emerging threats.
Average users can’t afford to devote time to security. Invisible security, which occurs automatically and transparently, may help. This session will explore examples consistent with this approach in existence today, including protective DNS and automatic updates, describing how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public.
Today’s Everywhere Workplace promises your employees unprecedented levels of freedom. Yet threat actors see this as an opportunity to attack, creating a challenging environment for IT. Join Ivanti cybersecurity experts as they share best practices on implementing zero trust security at the user, device and network levels to ensure an optimal security posture for your organization.
This session benefits organizations challenged in getting started or developing an evidence based approach to maturing Zero Trust security - without the friction. We reveal the top 5 best practices for starting and maturing a frictionless Zero Trust initiative. Using industry recognized models, we will share practical, proven best practices and tools to accelerate your Zero Trust journey.
Today's enterprise depends on security professionals having an understanding of Active Directory? This talk will review the most common, over-powered attacks that hackers are using now. Attendees will learn how to lock these attacks down, and perhaps most important, learn to detect when attackers are trying. Attackers don't get points for new attacks. Learn what they use, lock it down, and detect it.
Check out our CEO's video from RSA to see him discuss cybersecurity and DNS filtering network data.
Navigating the complexities of cybersecurity challenges today means more than just being alert; it requires a readiness to adapt and embrace superior technologies for better protection of your digital assets. The recent announcement of Cisco Umbrella Roaming Clients end-of-life (EOL) on April 2, 2024, and its end-of-support (EOS) on April 2, 2025, has encouraged several organizations to consider the next steps in maintaining robust cybersecurity ...
The term “zero-day attacks” is thrown around frequently with a lot of concern—and rightfully so. In today’s world where even the most menial tasks are conducted online, there is always some cyber threat lurking in the dark shadows of the internet. Picture this: A burglar finds a secret doorway to your house and decides to pay you a visit. All your assets are now accessible to him, even without your knowledge.
AI, LLM, generative content, NLP, big data, neural processing, machine learning, GPT. In 2023 it's undeniable that these were some of the most heard terms from various businesses, news outlets and the social media sphere. Ultimately this alphabet soup can mean just as much as it sometimes doesn’t—and, as often is the case, the internet leans into the trend.Sites popped up everywhere—some reputable while others less so—promising cyberpunk profile ...