Information is power. And wherever there’s power, there are people looking to steal it. But that’s also where you’ll find us. We’re RSA Conference. And we’re here to stand against cyberthreats around the world. That means being here for you. Connecting you with the people and insights that will empower you to stay ahead of cyberthreats. We do this through our online outreach and with our events around the globe. And we make a great host, if we do say so ourselves. Some say it’s impossible to ...
…
continue reading
1
Inside the RSAC Program Committee: Device Security & Accessibility
24:08
24:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:08
As we approach RSAC 2025, we're excited to bring together the Program Committee Members (PCMs) from our Device Security & Accessibility track. Tune into this podcast to learn what Device Security and Accessibility means, what topics the PCs saw trending in the submissions, and what people can look forward to learning about at the Conference.Speaker…
…
continue reading
1
Jingle All the Way to Safety: Cyber Security Tips for the Holidays
22:19
22:19
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:19
As the holidays approach, many are well into their shopping sprees. It's an exciting time to prepare for the holiday season and spend time with loved ones. However, with cyberattacks on the rise, we can expect a significant increase in cyberattacks during this season. Join this podcast to explore safety and security tips for online shoppers, learn …
…
continue reading
1
Cyber Resilience for SMEs: Practical Data Privacy and Security Strategies
19:25
19:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:25
SMEs often face significant hurdles in protecting their data due to limited resources and expertise. This podcast explores practical strategies to help SMEs strengthen their cybersecurity posture. Attendees will learn how to implement scalable solutions, leverage training and mentorship programs, and stay informed about emerging threats. By enhanci…
…
continue reading
1
Governing AI Innovation: Balancing Ethics and Compliance
27:16
27:16
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:16
As AI rapidly integrates into our lives, it presents both immense opportunities and significant risks. This podcast explores the urgent need for robust governance frameworks to ensure AI is used responsibly. We will delve into ethical guardrails, risk mitigation strategies, and best practices inspired by academic AI principles. Join us to discover …
…
continue reading
1
Election Security: Best Practices and Emerging Threats
20:48
20:48
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:48
In today's digital age, the integrity of our elections faces unprecedented threats from malicious actors. Our U.S. local elections are particularly vulnerable to these global threats, making it more crucial than ever to build cybersecurity resilience to safeguard our election security system.This podcast explores the critical issue of election secu…
…
continue reading
1
Securing Sovereignty: How Technology is Strengthening Tribal GC Elections
21:39
21:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:39
Tribes are modernizing their Tribal General Council elections using cutting-edge technology. From traditional in-person voting to mobile platforms & blockchain-based systems, we discuss the security measures in place to ensure election integrity. Learn how Tribes are collaborating with MS-ISAC and EI-ISAC to prevent cyber threats, while also addres…
…
continue reading
1
Navigating the Evolving Threat Landscape: Cybersecurity in Retail and Fashion
16:09
16:09
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:09
Join us for an in-depth discussion on the cybersecurity threats facing the retail and fashion industries. We'll explore the top trends for 2024 and 2025, including AI, e-commerce fraud, ransomware, and supply chain compromise. Our expert guest will share real-world examples of cyberattacks targeting the retail and fashion value chain, shedding ligh…
…
continue reading
Speakers:Arti Raman, CEO and Founder, Portal26Dane Sherrets, Senior Solutions Architect, HackerOneKacy Zurkus, Senior Content Manager, RSA ConferenceAI has been implemented in almost every organization and AI governance helps ensure that AI is being used ethically and unbiasedly. We will explore the multifaceted world of AI, focusing on governance …
…
continue reading
1
Elevate & Innovate: Success Tips for Women Entrepreneurs
17:31
17:31
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:31
Join us for an insightful discussion featuring one of our Program Committee members as she shares her experiences in building a startup. Inspiring women entrepreneurs to take risks demands that we also help them navigate the sometimes-tumultuous path to securing funding. We'll talk about what makes a successful pitch and how to engage with potentia…
…
continue reading
Summer is coming to an end and fall is approaching, which means RSAC 2025 Call for Submissions will be opening soon. Each year, RSA Conference receives an incredible amount of submissions from speakers globally, but what makes a submission stand out to the Program Committee? As you explore topics and ideas, we want to share some helpful tips to kee…
…
continue reading
1
Secure by Design: Transforming the Software Security Landscape
24:29
24:29
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:29
Secure by design has many core principles, including manufacturer accountability, radical transparency, and leadership-driven security prioritization. Secure by design is critical for organizations as it minimizes risks and vulnerabilities within an enterprise. Join us as we discuss a transformative approach to software development and cybersecurit…
…
continue reading
1
Healthcare Cybersecurity: The Intersection of Patient Safety & Clinical Resiliency
29:50
29:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
29:50
Healthcare sectors need to implement a strong cybersecurity team, proactive strategies, and security awareness training, but how do they do that while prioritizing patient care? Enter the need for clinical resiliency. Join this podcast to learn actionable takeaways for building a team medical providers who also understand both the impact of cyberat…
…
continue reading
1
Guardians of Cybersecurity: Deploying IoT Devices via Drones and Dropboxes
23:05
23:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:05
Drones are becoming more common in skies around the world. While the initial reaction seems to be focused on privacy concerns, which are very valid, there should also be a higher focus on what someone can do with a relatively lightweight drone. Having it carry a hacking device or it being a hacking device itself is something that has not been talke…
…
continue reading
1
The CISA Zero Trust Maturity Model and the Five Pillars in Practice
18:44
18:44
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:44
In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to learn how to use and adapt CISA Zero Trust Maturity Model and it’s five security pillars in practice. Join this podcast to hear real-world examples of challenges, benefits, and approaches about the model.Speakers:Jason Garbis, President, Numberl…
…
continue reading
In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to hear about the educational resources on cybersecurity fundamentals that policymakers need to keep up in the rapidly changing regulatory environment. Learn how preparing them will support strong policies and equitable participation in the global …
…
continue reading
1
The Impact of AI for Cybersecurity on the Healthcare Sector
34:45
34:45
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:45
In today’s digital world, organizations are increasingly impacted by AI for the good and bad. AI is being used in the healthcare industry for a variety of reasons. Despite AI being a resource for the healthcare sector it also comes with challenges. Join this podcast as we discuss: • How the healthcare can prepare for combatting AI-driven cyber thre…
…
continue reading
1
Shielding Small Businesses: Tips for Defending Against Cyber Threats
17:35
17:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:35
We engage in a dynamic discussion our guests who will share their experiences in cyber and thoughts on the cyber risks for small businesses where there is a crucial gap in the cybersecurity market. Focusing on the unmet needs of small businesses, guests will discuss the importance of providing support and solutions tailored to this underserved sect…
…
continue reading
Diversity, Equity, and Inclusion (DEI) has long been talked about in an effort to diversify the workforce, but what are organizations really doing to change organizational culture. Understanding different perspectives on inclusion is key to informing how to create effective change to help attract and retain talent. Join this podcast to learn about …
…
continue reading
Tune in as RSAC 2024 DevSecOps Program Committee Members discuss the trends pulled out from the DevSecOps track. Join this podcast to hear the latest trends, their significance, and what track submissions are telling us about today’s cybersecurity landscape and much more.Speakers:Akira Brand, Application Security Engineer, Akira Brand ConsultingJen…
…
continue reading
How can we ensure we drive product security from the get go? How can we provide security assurance throughout the protect detect and response lifecycle of our services and solutions? How can AI empower our defenders? Leaders from Microsoft and Google will share insights on how AI can improve security efficiencies for the entire product lifecycle. W…
…
continue reading
1
Neglected Essentials: The Overlooked Basics of Cloud Security
19:03
19:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:03
This podcast shares research that reveals how many of the most common cloud security risks—despite being tied to basic security guidelines such as the Principle of Least Privilege—are widely overlooked in organizations of all sizes, even in those with a high maturity level in terms of cloud security. We'll explain why that is and investigate approa…
…
continue reading
Many organizations have fallen victim to data breaches and exposure. It is crucial to strengthen security as the rise of cyberattacks increases. What are some strong measurements to reduce the risk of data exposure? Join the RSAC 2024 Governance, Risk, and Compliance Program committee as they discuss what decision-makers need to think about from a …
…
continue reading
Protecting data is a critical key when developing products, systems, or services. What are some privacy measures to consider? Join us for a discussion on the overview of Privacy By Design and how to implement it into practice.Speakers:Kim Wuyts, Manager Cyber & Privacy, PwC BelgiumTatyana Sanchez, Content and Programming Coordinator, RSAC…
…
continue reading
With differing privacy approaches that expand many geographies, more organizations are focused on building a strong privacy program. Is it time for Privacy by Design? And where exactly is the intersection between privacy and security? Join the RSAC 2024 Privacy & Data Protection Program Committee for insights into why privacy was a strong trend in …
…
continue reading
What does the cybersecurity workforce of the future looks like, and more importantly, how do we get there? Join us for a discussion on embracing the resilience and brilliance of black women is cyber, all part of the Black Women in Cyber Collective, who are working to protect our privacy and secure our world while also fostering opportunities to exp…
…
continue reading
Recent studies have found that SMS users increasingly do not trust the confidentiality and integrity of SMS, with users also reporting that they can not trust the true identity of the sender. Cybercriminals are able to exploit the weaknesses of this authentication tool, yet it continues to be a technology widely used and relied upon for perceived s…
…
continue reading
Zero Trust Security is often associated with network access and identity access management. However, while those solutions are important and necessary, the evolution in infrastructure and the onset of new attack surfaces require us to expand our perspective and include the API layer in security strategies. Join this podcast to hear industry influen…
…
continue reading
For years, the cybersecurity industry has supported the narrative that there is a major skills gap, but some have been questioning whether the issues is an actual dearth of qualified candidates who possess the skills needed to fill open roles or an abundance of candidates with some transferable skills who aren't being given an opportunity to gain e…
…
continue reading
1
Cybersecurity Community: Fortifying Defense Through Education and Sharing
13:03
13:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:03
Cyber leaders are unique in their necessity to share. Building community, leveraging best practices with organizations in the same industry is paramount to successfully protecting from threats. This podcast will delve into the world of the cybersecurity community and share some strategies, technologies, and best practices that CISOs can use to enha…
…
continue reading
In the race to develop the most powerful generative AI tools, businesses must take steps to avoid the inherent risks of this emerging tech. AI involves sharing massive quantities of data, so even a single misconfiguration can have serious repercussions. What are the new risks and broader business implications of AI that arise as organizations ventu…
…
continue reading
1
Threat Modeling - Using the DIPP Method (Detect, Identify, Protect, Prevent)
16:38
16:38
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:38
Threat modeling is a process that is essential for organizations to use to combat threats, and for mitigating risks. Threat intelligence is a component that can be applied as a method for use with threat modeling to ensure that all risks and vulnerabilities are being properly assessed and techniques are used to protect assets. In this podcast, we'l…
…
continue reading
Cyberattacks have been growing in frequency and severity over the past decade and have increased exponentially with the adoption of cloud-native technology. The pressure is on for organizations to prioritize building and implementing a security testing strategy to avoid becoming the latest cyberattack headline.Speakers:Caroline Wong, Chief Strategy…
…
continue reading
1
Avoiding Costly Toolset Purchase and Resource Spend for Enterprise-Wide Threat Modeling
16:46
16:46
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:46
Threat modeling at an enterprise scale can be costly to implement, scale and maintain, but there are ways in which you can curtail spend in two key areas – threat modeling toolsets cost and resourcing cost. This podcast will discus key spend considerations including purchase model for OOTB software and services as well as resource allocation and re…
…
continue reading
What is threat modeling and where does it fit in to the overall development process? In this podcast, we'll discuss what threat modeling is, when threat modeling activities are essential, and the skills needed to become a threat modeling expert.Speakers:Ashwini Siddhi, Senior Principal Product Security Advisor, Dell TechnologiesKacy Zurkus, Senior …
…
continue reading
1
CMMC: DoD's 3rd Party Supply Chain Risk Management (SCRM) Program
26:24
26:24
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:24
The Department of Defense (DoD) is implementing a 3rd Party Supply Chain Risk Management program that will require companies that receive their sensitive information to implement NIST SP 800-171 and then undergo a 3rd Party Cybersecurity Maturity Model Certification (CMMC) event. This podcast will discuss the ripple effects of the requirements and …
…
continue reading
1
Are Password Managers Still Not Improving Password Habits?
18:35
18:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:35
Password Managers are required by for employees at most companies, but are they designed to encourage good password hygiene? We conducted a comprehensive study with users who trusts the most popular passwords managers offered in the industry. We discovered that many users are still ignoring password reset notification from their Password Managers a…
…
continue reading
1
The People-Centric Security Framework - A People Protection Perspective
21:05
21:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:05
Well-known frameworks and lots of advice exist to help people protect data, privacy, and devices, but minimize the implication of human factors. This podcast will discuss the PCSF and highlight the ways in which it will help organizations move one step closer to having people recognized as the new enterprise edge. The PCSF complements, and does not…
…
continue reading
1
Tomorrow's Cyber Workforce Requires Access to Cyber Education Today
17:16
17:16
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:16
The cybersecurity community has had lots of conversations about workforce development, but it's time to take action. Learn about the efforts to bring cybersecurity education to the K-12 sector as part of the effort to narrow the skills gap and build the next generation of cyber defenders.Speakers:Laurie Salvail, Executive Director, CYBER.ORGKacy Zu…
…
continue reading
In order to mitigate the risks in telehealth devices, healthcare delivery organizations need to identify threats. Join this podcast to hear practical steps to implement a more robust security strategy rooted in standards and best practices that include how to use NIST Frameworks and the work being done by the NCCoE Healthcare team.Speakers:Anahi Sa…
…
continue reading
1
Driving Resilience: A Discussion on the US National Cybersecurity Strategy
30:32
30:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:32
The White House published the US National Cybersecurity Strategy that outlines a five-pillared approach to dismantling threat actors, enabling partnerships, and investing in resilience. But what does all that mean for cyber defenders? This podcast will examine the strategy in depth to help listeners both realize the vision and understand roles, res…
…
continue reading
Within the last decade, fraud and cyberattacks have become increasingly focused on exploiting digital identity. The exposure of digital identity as an attack surface has implications for individuals, enterprises, and even our societal structures. In this session we discuss the state of identity-based attack vectors and what the security community i…
…
continue reading
In the story of Gyge’s Ring, Plato asserts that if humans had the power to be invisible, they would act without consequence. In his book, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency, Greenberg details the truth of Plato’s claim as he recounts stories of criminal activity on the dark web, where people believed they wer…
…
continue reading
1
Pulling Back the Curtain on the Dark Web Payment Card Landscape
20:04
20:04
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:04
Intrigued by the dark web payment card landscape? Join us for this RSAC 365 podcast to hear about how the dark web payment card landscape was affected by the Russia-Ukraine war, exploring everything from the magecart infections/e-skimmers, which are used to steal the payment card data to “checkers”, which are tools used by cybercriminals to check t…
…
continue reading
Cybersecurity and the resiliency of space assets are a priority because of the critical infrastructure services they provide. This session will discuss the attack vectors and mitigation approaches of exploits that can impact them as well as how the cyber security and space asset resiliency range will be used to test and validate their confidentiali…
…
continue reading
1
Critical Infrastructure at Risk: Uncovering the Danger of insecure-by-design Control System Software
28:42
28:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:42
In this podcast, we will uncover the realities of insecure control systems software in critical infrastructure. From discovering zero-days to exposing vulnerabilities in built-in features, we'll explore the role of both vendors and operators in safeguarding our essential utilities. By the end, listeners will have a new perspective on the need to im…
…
continue reading
1
A Quantum-Ready Board: Governance and Cyber Risk Oversight
21:44
21:44
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:44
There is a general lack of quantum risk awareness among board members. The emergence of powerful quantum computers are an impending threat to our digital ecosystems — e.g. mobile phones and internet — because they can conceivably crack classical encryption. A quantum algorithm with that capability already exists; yet, quantum risk management is not…
…
continue reading
1
Ransomware Operators Can Circle Defenses: Proactive Defense Strategies
28:54
28:54
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:54
Ransomware Operators have not only increased the ransoms they demand but are also using additional coercion techniques to perform multifaceted extortion attacks. Between us, we have worked on several ransomware incidents observing closely the challenges that organizations face while battling and remediating ransomware incidents. Based on the learni…
…
continue reading
1
Beyond MFA: Why Multi-factor Alone Is Not a Fail-Safe for Identity Protection
22:49
22:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:49
Most organizations have moved beyond the insecure username and password access control a long time ago and started using multifactor authentication. But as Yahoo, Deloitte, and LinkedIn know, MFA won’t always save the company from a data breach. Not only has MFA access been defeated multiple times by attackers, but users hate it. It’s cumbersome, a…
…
continue reading
1
Transcendent Tango: The Role of Cryptography in Establishing Zero Trust Identity
12:08
12:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
12:08
In the same way that the tango begins with foundational steps, the layering of device, application/workload, and user identity forms the foundation of Zero Trust security. Each intentional step weaving to create an intricately coordinated pattern. Join us as we take a look at the cryptographic dance between keys and identity that forms the basis of…
…
continue reading
1
Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX
21:58
21:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:58
Security analysts must fight both attackers and the products and services they rely on to drive their detection and response capabilities because of a lack of usability of security tools and processes. This podcast explains an emerging cybersecurity technology trend: analyst experience (AX). Join us to understand how AX can enable your team to find…
…
continue reading