I was searching trough youtube for some conferences i have missed. I found a serie of RSA conference presentations. To make it easy for you i have listed them here.
The RSA Conference is a cryptography and information security-related conference held annually in the San Francisco Bay Area.
The RSA Conference started in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of Internet security. The RSA Conference is still vendor-independent and managed by RSA Security, the Security Division of EMC, with the support of the industry.
Since 1995, a theme has been chosen every year and predicated on a specific contribution or illustration related to information security. A story and design are developed and carried throughout the event.
2011: Alice and Bob
2010: The Rosetta Stone
2009: Edgar Allan Poe
2008: Alan Mathison Turing
2007: Leon Batista Alberti
2006: Modern Codes in Ancient Sutras
2005: Codes of Prohibition: Rumrunners and Elizebeth Friedman
2004: Chinese Remainder Theorem
2003: The Secrets of the Maya
2002: Mary, Queen of Scots
2001: Search for Extra-Terrestrial Intelligence (SETI)
2000: Ancient Greece/Fall of Troy
1999: Norse/Viking Runestones
1998: the 16th Century monk Trithemius and his book Polygraphia
1997: Cher Ami, Carrier Pigeon
1996: WWII Navajo Codetalkers
1995: Egyptian Scarab Seals
Moderated by James Lewis Director and Senior Fellow, Technology and Public Policy Program, Center for Strategic and International Studies
PANELISTS: Michael Chertoff , Former U.S. Secretary of Homeland Security; Mike McConnell, Executive Vice President, Booz Allen Hamilton; Bruce Schneier, Chief Technology Security Officer, BT In this keynote panel, explore the complex and evolving issues tied to cybersecurity and conflict in cyberspace in the 21st Century from leading experts in the field.
Moderated by Dr. James Lewis of the Center for Strategic and International Studies, this session will include discussion on thresholds for cyberwar, the often confusing terminology used for various types of cyber conflict, and what needs to be done in the international context to secure cyberspace while also deterring the possible escalation of various kinds of cyber attacks and conflict.
RSA Conference 2011 Keynote presented by Art Coviello, Chairman of RSA Security and Richard McAniff, Co-President & Chief Development Officer of VMware.
SPEAKER: Michio Kaku, Theoretical Physicist, Best-selling Author, and Popularizer of Science
What will computers and the internet look like in 20 years? The internet in our contact lens, computers controlled by the mind, nanobots attacking cancer cells. Dr. Michio Kaku will explore how artificial intelligence, nanotechnology, and quantum mechanics will play keys roles in the development of these and other innovations in the not so distant future, especially as Moore's Law begins to break down.
Secure software means threat modeling, code review, penetration testing, and a plethora of other activities we take for granted. Right? Starting with Saltzer and Schroeder, this talk explores the origins, evolution, and use of these activities and others. Throughout, we share deployment experience and relate the discussion to living standards, such as Microsoft SDL, OWASP Top 10, and PCI DSS.
Nation-states and organized crime groups are rapidly increasing the sophistication, virulence, and effectiveness of attack tools and techniques. In this session, three people in unique positions to see the newest attack patterns will share what they believe are the seven most dangerous new attack vectors and how they think attack tools and patterns will evolve over the coming year.
MODERATED BY: Alan Paller, Director of Research, SANS Institute
PANELISTS: Ed Skoudis, Senior Security Consultant, InGuardians, Inc.; Johannes Ullrich, Chief Research Officer, SANS Institute
This session draws insights from Information Security Media Group's inaugural Government Information Security Today survey to review the top trends, threats and solutions for federal, state and local government agencies. Topics include cybersecurity policy, regulatory compliance, cloud computing and other emerging technologies.
SPEAKERS: David Matthews, Deputy Chief Information Security Officer, City of Seattle; Eric Chabrow, Executive Editor, GovInfoSecurity.com
Confused by the marketing hype that surrounds APT, the latest buzzword in security? APT is not a botnet, malware code or a new term for cybercrime. What is it? You will find out if you attend this panel of battle-hardened experts that have been facing this threat for years in government and enterprise networks. Hear their experiences and lessons learned for detecting and responding to APT attacks.
MODERATOR: Dmitri Alperovitch, Vice President of Threat Research, McAfee, Inc.
PANELISTS: Kevin Mandia, Chief Executive Officer, Mandiant; Heather Adkins, Information Security Manager, Google; Adam Meyers, Director, Cyber Security Intelligence, SRA International; George Kurtz, Chief Technology Officer and Executive Vice President, McAfee, Inc.
MODERATOR: Dr. Ari Juels, Chief Scientist, RSA, The Security Division of EMC, and Director, RSA Laboratories
PANELISTS: Whitfield Diffie, Chief Cryptographer, Revere Security; Dickie George, Technical Director, Information Assurance, NSA; Martin Hellman, Professor Emeritus of Electrical Engineering, Stanford University; Ronald Rivest, Viterbi Professor of Electrical Engineering and Computer Science, MIT; Adi Shamir, Professor, Computer Science Department, Weizmann Institute of Science, Israel
Join the founders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2011 and practical insights that continue to be drawn from lessons learned over the last three decades.
Reducing your application's attack surface is one of the most effective ways to improve its security. This session will examine how to analyze and reduce attack surface while still allowing developers to add new exciting and delighting features that users love. This session will also include demonstrations of new tools to help find hidden attack surface in your applications before attackers find it for you.
In today's economic environment, limited resources for information security programs have become even more constrained. CISOs must pick the right metrics and align with business goals to justify funding for information security priorities. This session discusses the importance and benefits of measuring security, and offers practical advice for practitioners looking to build or improve a security metrics program.
This session examines empirical studies around common assumptions associated with risk and risk mitigation. The presentation will challenge common risk mitigation strategies of utilizing technical solutions, awareness training, and sanctions policies. A major surprise is that empirical studies find many common mitigation strategies are, at best, ineffective—and, at worse, counterproductive!
Tom Gillis, Vice President & General Manager, Security Technology Business Unit, Cisco
Enterprise security is built for a network that is quickly disappearing. With the disappearance of enterprise perimeters, the rise of mobile devices, the cloud, and always-connected workers changing the game, the need for a new security model is paramount. Tom Gillis discusses how a new fabric of trust over the global network will make security transparent for every user and safer for every administrator.
The CERT Resilience Management Model (CERT-RMM) defines processes for managing operational resilience in complex risk-evolving environments. This presentation will discuss the concepts and principles of operational risk, link operational risk and operational resilience, present a framework for operational risk management, and introduce aspects of CERT-RMM.
SPEAKERS: Julia Allen, Senior Researcher, Software Engineering Institute; James Cebula, Information and Infrastructure Security Analyst, Software Engineering Institute
In this enlightening session, industry heavyweights and "Hacking Exposed" co-authors, George Kurtz and Stuart McClure, will show you contemporary ways that hackers are exploiting the cloud and virtual machines to harm your business, along with common sense techniques you can employ to stop them in their tracks.
SPEAKERS: George Kurtz, Chief Technology Officer and Executive Vice President, McAfee, Inc.; Stuart McClure General Manager/Senior Vice President, Risk and Compliance, McAfee, Inc.
Presented by Scott Charney, Corporate Vice President Trustworthy Computing, Microsoft
As people move more data and information into the Cloud, the need for secure, private and reliable services is growing from a technology concern within the industry, to a societal concern for citizens around the world. Microsoft Corporate Vice President for Trustworthy Computing, Scott Charney, will discuss how the growing alignment of social, economic, political and technical forces are creating a situation where the industry has the potential to make substantial security progress
As mobile computing devices proliferate the enterprise, more people are raising flags about mobile device security. One device that is dominant in the enterprise mobile computing world is the ubiquitous BlackBerry®, which has quite a bit of Fear, Uncertainty, and Doubt surrounding its security controls. This presentation aims to set the facts straight by going to the source - literally.
Cyber War is a controversial subject, with some experts arguing that the whole idea is overhyped while others argue that it is underappreciated. Who is right? This distinguished panel of experts, assembled by IEEE Security & Privacy magazine, will discuss cyber war. Where do these ideas come from? What do they mean to information security and risk management professionals?
MODERATOR: Gary McGraw, Chief Technology Officer, Cigital, Inc.
PANELISTS: Anup Ghosh, Chief Technology Officer and Founder, Invincea; Dorothy Denning, Distinguished Professor of Defense Analysis, Naval Postgraduate School; William Cheswick, Lead Member of the Technical Staff, AT&T; Thomas Herlea, IT Security Consultant, Verizon Business
Many CISOs dread the budget cycle, frustrated for lack of a persuasive business case. This updated session for RSA Conference 2011 looks at key parts of an infosec business case. The objections will be flushed out and neutralized, the needed alliances will be forged, and success will be yours. Attendees take away a useful template to craft business cases for the key elements of their information security programs.
You can find all of the videos on Youtube.