RSA Conference
RSA Conference
  • 4 337
  • 9 403 285
RSAC 365 Innovation Showcase: Security Automation Done Right
Presenters:
Chenxi Wang, General Partner, Rain Capital
Bipin Gajbhiye, Product Security Partner, Stripe
David Cross, Senior Vice President/CISO, Oracle SaaS Cloud
Join us at the RSA Conference Innovation Showcase - a monthly virtual program designed to highlight innovation in cybersecurity. On May 30, we focus on Security Automation Done Right - The Holy Grail of Modern Security Operations. A panel of experts will discuss how to leverage AI and data to optimize and accelerate security operations, if we need security teams to automate security options due to the advent of data, AI and an ever-increasing threat landscape, and how incident detection, remediation and data inventory management play a role in security automation. The panel will then hear from two up and coming companies in security automation space.
RSAC 365 Innovation Showcase: Security Automation Done Right-in partnership with Rain Capital
zhlédnutí: 138

Video

Concentric AI Pitch - RSAC 365 Innovation Showcase
zhlédnutí 73Před 9 hodinami
Concentric AI pitches as part of the RSAC 365 Innovation Showcase: Security Automation Done Right-in partnership with Rain Capital
Seemplicity Pitch - RSAC 365 Innovation Showcase
zhlédnutí 65Před 9 hodinami
Seemplicity pitches as part of the RSAC 365 Innovation Showcase: Security Automation Done Right-in partnership with Rain Capital
Webcast: Tech Companies in Armed Conflict: Risks Arising from Public-Private Partnerships
zhlédnutí 194Před 14 hodinami
Presenters: Jonathan Horowitz, Legal Advisor, International Committee of the Red Cross Mauro Vignati, Adviser Digital Technologies of Warfare, International Committee of the Red Cross Private tech companies are increasingly providing both civilians and militaries with digital infrastructure and services utilized during armed conflict. The role of tech companies during wartime is further complic...
Webcast: Beyond the Firewall: Ensuring OT App Security
zhlédnutí 256Před 14 hodinami
Presenter: Diane Golden, System Architect, Rockwell Automation In this webcast, we delve into how application security principles intersect with the Operational Technology (OT) landscape, bolstering your OT application security posture. Join us as we explore: Identity and Access Management (IAM): Control and manage access to OT applications. We’ll delve into best practices for authentication, a...
Tamnoon - RSA Conference 2024 Launch Pad
zhlédnutí 631Před 21 dnem
Behind every great cybersecurity company is a stroke of genius that started it all. It can happen anywhere-at the kitchen table, in the garage, or in a computer lab at university. But when it comes to getting those ideas off the ground, there’s no better place than RSAC Launch Pad. RSAC Launch Pad is the place to watch new innovations unfold before your eyes. From nascent ideas to solutions on ...
Knostic - RSA Conference 2024 Launch Pad
zhlédnutí 804Před 21 dnem
Behind every great cybersecurity company is a stroke of genius that started it all. It can happen anywhere-at the kitchen table, in the garage, or in a computer lab at university. But when it comes to getting those ideas off the ground, there’s no better place than RSAC Launch Pad. RSAC Launch Pad is the place to watch new innovations unfold before your eyes. From nascent ideas to solutions on ...
Culminate - RSA Conference 2024 Launch Pad
zhlédnutí 452Před 21 dnem
Behind every great cybersecurity company is a stroke of genius that started it all. It can happen anywhere-at the kitchen table, in the garage, or in a computer lab at university. But when it comes to getting those ideas off the ground, there’s no better place than RSAC Launch Pad. RSAC Launch Pad is the place to watch new innovations unfold before your eyes. From nascent ideas to solutions on ...
RSA Conference 2024 Recap
zhlédnutí 1,4KPřed 21 dnem
Britta Glade, RSAC Vice President, Content & Curation, and Hugh Thompson, Executive Chairman, RSA Conference, reflect on the week of Conference and chat about all the captivating moments that had everyone talking.
The Possibilities, Risks, and Rewards of Cyber Tech Convergence
zhlédnutí 1KPřed 21 dnem
Presenter: Sundhar Annamalai, President, LevelBlue Join a research rich exploration of risks and rewards of cyber technology convergence and integration across network & security operations. Centralized visibility and management with improved efficacy is the promise, yet can create challenges for deployment and API protection and maintenance. Peek into a future of more open, adaptable security ...
Reducing AI’s Blast Radius: How to Prevent Your First AI Breach
zhlédnutí 1,5KPřed 21 dnem
Presenter: Matt Radolec, Vice President, Incident Response and Cloud Operations, Varonis Generative AI has taken the world by storm, but how can you control the data AI can access? And how can you ensure sensitive information isn’t used in gen AI training? This session will teach you how to ensure AI tools don't accidentally expose data. We'll show real-world examples of exposures & what to avo...
Revolutionizing the SOC for the Future Threat Landscape
zhlédnutí 3,2KPřed 21 dnem
Presenter: Gary Steele, Executive Vice President, General Manager, Splunk Could you have imagined today’s SOC five years ago? AI was probably part of it, but nobody foresaw the rise of Generative AI. To succeed now and stay resilient amidst tomorrow’s challenges, it’s time to revolutionize the SOC. In this session, we’ll discuss building a future-proof strategy for the evolving cyber landscape,...
Next-Gen SIEM: Converging Data, Security, IT, Workflow Automation & AI
zhlédnutí 6KPřed 21 dnem
Presenter: George Kurtz, CEO and President, CrowdStrike The promise of SIEM has failed. Instead of delivering machine speed to defeat adversaries, it’s a data dumping ground where efficiency and proactive protection goes to die. The future of security needs a modern foundation that converges data, security and IT with generative AI and workflow automation built natively within. Welcome to the D...
Securing AI: What We’ve Learned and What Comes Next
zhlédnutí 6KPřed 21 dnem
Presenter: Vasu Jakkal, Corporate Vice President, Microsoft Security Business The opportunity for innovators to drive new growth and progress with AI is immense. At the same time, with the advent of any new technology, there are risks that should be planned for and mitigated in how it is designed, deployed, and governed. Join Vasu Jakkal for an inside look at how AI is evolving, its impact on t...
Securing New Limits: Protecting the Pathway for AI Innovation
zhlédnutí 2,3KPřed 28 dny
Presenters: Rosa Bolger, Distinguished Engineer and Vice President of Cyber Defense and Technology, IBM Kevin Skapinetz, Vice President of Security Strategy, IBM Generative AI introduces game-changing opportunities for enterprises, but also a sense of urgency to secure this new frontier. With existential business data and critical IP moving closer to the surface, organizations have a heightened...
Securing the Modern Application: From Code to Infrastructure
zhlédnutí 1,8KPřed 28 dny
Securing the Modern Application: From Code to Infrastructure
RSAC Math Award Presentation
zhlédnutí 223Před 28 dny
RSAC Math Award Presentation
Technology and the Transformation of U.S. Foreign Policy
zhlédnutí 2,1KPřed 28 dny
Technology and the Transformation of U.S. Foreign Policy
CISO Confidential: What Separates The Best From The Rest
zhlédnutí 2,6KPřed 28 dny
CISO Confidential: What Separates The Best From The Rest
The State of Cybersecurity - Year in Review
zhlédnutí 6KPřed 28 dny
The State of Cybersecurity - Year in Review
RSA Conference Lifetime Achievement Award Presentation
zhlédnutí 612Před 28 dny
RSA Conference Lifetime Achievement Award Presentation
The Time is Now: Redefining Security in the Age of AI
zhlédnutí 7KPřed 28 dny
The Time is Now: Redefining Security in the Age of AI
The Power of Community
zhlédnutí 1,2KPřed 28 dny
The Power of Community
Winner's Announcement - RSA Conference 2024 Innovation Sandbox
zhlédnutí 1,6KPřed 28 dny
Winner's Announcement - RSA Conference 2024 Innovation Sandbox
VulnCheck - RSA Conference 2024 Innovation Sandbox
zhlédnutí 814Před 28 dny
VulnCheck - RSA Conference 2024 Innovation Sandbox
Aembit - RSA Conference 2024 Innovation Sandbox
zhlédnutí 993Před 28 dny
Aembit - RSA Conference 2024 Innovation Sandbox
Dropzone A.I. - RSA Conference 2024 Innovation Sandbox
zhlédnutí 998Před 28 dny
Dropzone A.I. - RSA Conference 2024 Innovation Sandbox
Harmonic - RSA Conference 2024 Innovation Sandbox
zhlédnutí 776Před 28 dny
Harmonic - RSA Conference 2024 Innovation Sandbox
P0 Security - RSA Conference 2024 Innovation Sandbox
zhlédnutí 459Před 28 dny
P0 Security - RSA Conference 2024 Innovation Sandbox
Bedrock Security - RSA Conference 2024 Innovation Sandbox
zhlédnutí 586Před 28 dny
Bedrock Security - RSA Conference 2024 Innovation Sandbox

Komentáře

  • @grayshell8928
    @grayshell8928 Před rokem

    great panel and very interesting overview. Thank you for putting this up.

  • @ihacksi
    @ihacksi Před rokem

    Very nice explanation Lenny THANK YOU :)

  • @ihacksi
    @ihacksi Před rokem

    Lenyy is the best in this field without a doubt. His speech and demonstration skills are perfect for every level.

  • @siddharthabanerjee4076

    Very good and crisp presentation

  • @javedakhter82
    @javedakhter82 Před 2 lety

    Great information

  • @jimwilder7828
    @jimwilder7828 Před 2 lety

    Nice job of bringing it altogether and providing a very simple, yet complete explanation. Keep up the good work!

  • @jontnoneya3404
    @jontnoneya3404 Před 2 lety

    What about middle aged people looking for new careers? Would this be a good start for someone without CS experience? What about a CS grad that's worked in non-programming, non-hacking jobs looking to get into much more technical work. Is this a good place to start?

  • @AlgoNudger
    @AlgoNudger Před 2 lety

    Is security just an illusion? (like neutrality in algorithms).

  • @superfreiheit1
    @superfreiheit1 Před 2 lety

    The first Teacher that understand what learning means

  • @solotechoregon
    @solotechoregon Před 2 lety

    Aahh because the creatives go to employers who hire on merit....where the next big thing is actually made...duh!

  • @samanthazayas94
    @samanthazayas94 Před 2 lety

    cool.

  • @johnderhammer7530
    @johnderhammer7530 Před 2 lety

    On a lighter note...kudos for breaking up the shadow-web Silk Road in '04.

  • @rinzler7578
    @rinzler7578 Před 2 lety

    awesome video, are there ransomware groups like these based in the US and where do they learn these skills?

  • @aahr2034
    @aahr2034 Před 2 lety

    Who's doing that and why?

  • @alfabetony
    @alfabetony Před 2 lety

    Great video !

  • @simple-security
    @simple-security Před 2 lety

    Are there any videos that discuss the new variant of MITRE ENGAGE? now that SHIELD has been deprecated? I'm looking for real world examples for applying the 22 Engagement Activities - I think you refer to this as 'references' And as you mention in the video I'm also looking for methods to create deception related defenses. And if you can provide a method/tool to map att&ck tactics to all of the new engage fields w/o having to piece together several json files that would be very helpful. Thanks!

  • @mbalelandry6129
    @mbalelandry6129 Před 2 lety

    Thank you so much. From DRC

  • @felixculpa4192
    @felixculpa4192 Před 2 lety

    This dude is hilarious lol

  • @arkdtk
    @arkdtk Před 2 lety

    Very interesting talk, always been interested in it

  • @teemum.9023
    @teemum.9023 Před 2 lety

    30:25 bell curve of ability. I learn slowly and can feel intimidated by difficulty. I may not do my homework. I also know that once I have gathered all the details, which I see more and deeper than others, and internalize them, I get faster and more able than average

  • @teemum.9023
    @teemum.9023 Před 2 lety

    26:55 the graphics are not poor at picoCTF, they are nostalgic

  • @teemum.9023
    @teemum.9023 Před 2 lety

    23:13 the highest expert mountain is how child protection bureaucracy deems itself about personal lives of their clients. They do not even go through the scientific process to get there.

  • @teemum.9023
    @teemum.9023 Před 2 lety

    22:22 it´s not talking about the cryptography, it´s talking about the implementation, in other words, metadiscourse.

  • @teemum.9023
    @teemum.9023 Před 2 lety

    3:15 How would you sell a zero day to Microsoft of Apple? If you use to break their system, they sue you for extortion. If you tell them what it is, they just take the info and don´t pay you 100000s.

  • @kabandajamir9844
    @kabandajamir9844 Před 2 lety

    So nice explanation sir thanks

  • @elsainnamorato2231
    @elsainnamorato2231 Před 2 lety

    A lot of apps feed me more of the same of what I search. And this gets to be very very, repetitious monotonous and simply boring. The apps are too busy feeding me thousands of videos of the same thing , and the feature that is supposed to give me variety doesn't even have a chance. I have to make up my own variety list. Technology is not becoming smarter it's becoming a nuisance.

  • @PalCan
    @PalCan Před 2 lety

    Thank you for this. It's invaluable information

  • @rushikeshsisode1533
    @rushikeshsisode1533 Před 2 lety

    Tim urban is genius

  • @mustafacagal4300
    @mustafacagal4300 Před 2 lety

    Thank you Jen. Great content!

  • @awesomesauce804
    @awesomesauce804 Před 2 lety

    Good info. By 2023 this will be a step by step instruction set for avoiding extended car warranty calls. Joking aside, we will all need to think like this to help people in oppressed areas of the world. It's going to get worse before it gets better.

  • @C3Cooper
    @C3Cooper Před 2 lety

    I'm not sure I follow how roll-based access aligns with automation. Least privileged, privilege aggregation, secrets protection and granularity would have all been good security themes to attach to automation.

  • @ThatBidsh
    @ThatBidsh Před 2 lety

    another thing to consider is where (which wiki network) you create your proton and amazon accounts from - obviously you don’t want to do this at home or a friend/family member’s house or any of your typical locations

  • @AN-ks7vb
    @AN-ks7vb Před 2 lety

    Good stuff and there are some common tools too.

  • @alfonsmuller2318
    @alfonsmuller2318 Před 2 lety

    What do you think about an alternative OS, so Google and Apple can't track you?

  • @sjatkins
    @sjatkins Před 2 lety

    You say hacking isn't about breaking into things then you give those examples. Sigh. Hacking is so very much broader than that.

  • @sjatkins
    @sjatkins Před 2 lety

    Main thing is enjoying writing that first program and then stretching always to see how much more you can make it do and how beautifully. Having math intuition and sense of what is elegant helps. I think you can hone that over time.

  • @talkaholi1395
    @talkaholi1395 Před 2 lety

    amazing!!

  • @wouldntyouliketoknow1894

    Why are we being targeted in the first place

  • @novo7867
    @novo7867 Před 2 lety

    Nice work amazing thinking

  • @tahmidbhuiyan5591
    @tahmidbhuiyan5591 Před 2 lety

    Magnificent

  • @Uneke
    @Uneke Před 2 lety

    “They can free you from those eco systems” Blue pill, red pill… choose Lol

  • @andychung7922
    @andychung7922 Před 2 lety

    Hacking is like life O.o

  • @manuneethis9076
    @manuneethis9076 Před 2 lety

    Really Great!

  • @sheunesumakoni577
    @sheunesumakoni577 Před 2 lety

    Is solidity & Maian still valid?

  • @hjr834
    @hjr834 Před 2 lety

    Great content, really helpful and clear explication!!!! Thank you very much for the lecture Jen!

  • @nothing5600
    @nothing5600 Před 2 lety

    Biometrics is sad ;(

  • @nothing5600
    @nothing5600 Před 2 lety

    :)

  • @a--b
    @a--b Před 2 lety

    Great presentation 😊👍

  • @tjinspace7001
    @tjinspace7001 Před 2 lety

    You're suppose to know binary analysis, web vulnerabilities, and common algorithm math before you go to one. If you go there just knowing how to use Kali tools you won't make it past one challenge

  • @adamkwalczyk
    @adamkwalczyk Před 2 lety

    Evil is creative. Bad actors pay more and governments never do enough to think outside the box about the gravity of a situation when some day things get out of control.