RSA 2018 作者: Hack Inn 时间: April 17, 2018 分类: 安全大会资料 访问: 3,507 次  #### 1、[The bottom of the barrel scraping pastebin for obfuscated malware](https://data.hackinn.com/ppt/RAS2018/air-r1-2-the_bottom_of_the_barrel_scraping_pastebin_for_obfuscated_malware.pdf) #### 2、[The incident response class of 2018 tactics and talesfrom the frontline](https://data.hackinn.com/ppt/RAS2018/air-t07-the-incident-response-class-of-2018-tactics-and-talesfrom-the-frontline.pd) #### 3、[Insights from nsas cybersecurity threat operations center](https://data.hackinn.com/ppt/RAS2018/air-t08-insights-from-nsas-cybersecurity-threat-operations-center.pdf) #### 4、[Threat intel content curation organizing the path to successful detection](https://data.hackinn.com/ppt/RAS2018/air-w12-threat-intel-_-content-curation-organizing-the-path-to-successful-detection.pdf) #### 5、[Leaking ads is user data truly secure](https://data.hackinn.com/ppt/RAS2018/asec-t08-leaking-ads-is-user-data-truly-secure.pdf) #### 6、[Realizing software security maturity the growing pains and gains](https://data.hackinn.com/ppt/RAS2018/asec-t10-realizing-software-security-maturity-the-growing-pains-and-gains.pdf) #### 7、[Derived unique token per transaction](https://data.hackinn.com/ppt/RAS2018/asec-w04-derived-unique-token-per-transaction.pdf) #### 8、[Repronow save time reproducing and triaging security bugs](https://data.hackinn.com/ppt/RAS2018/asec-w12-repronow-save-time-reproducing-and-triaging-security-bugs.pdf) #### 9、[Cybersecurity capability readiness necessary conversations next steps](https://data.hackinn.com/ppt/RAS2018/ast1-r02-cybersecurity_capability_readiness-necessary_conversations_next_steps.pdf) #### 10、[The cybersecurity job seekers report results and implications](https://data.hackinn.com/ppt/RAS2018/ast1-w02-the_cybersecurity_job_seekers_report-results_and_implications.pdf) #### 11、[Strategies to finding and building your robust workforce](https://data.hackinn.com/ppt/RAS2018/ast2-r02_strategies_to_finding_and_building_your_robust_workforce.pdf) #### 12、[The nist cybersecurity framework what is next](https://data.hackinn.com/ppt/RAS2018/ast2-w02-the_nist_cybersecurity_framework-what_s_next.pdf) #### 13、[The life and times of cybersecurity professionals](https://data.hackinn.com/ppt/RAS2018/ast3-r02-the_life_and_times_of_cybersecurity_professionals.pdf) #### 14、[Side channels 1](https://data.hackinn.com/ppt/RAS2018/cryp-t07-side-channels-1.pdf) #### 15、[Side channels 2](https://data.hackinn.com/ppt/RAS2018/cryp-f01-side-channels-2.pdf) #### 16、[Codes and isogenies](https://data.hackinn.com/ppt/RAS2018/cryp-f02-codes-and-isogenies.pdf) #### 17、[Other cryptography](https://data.hackinn.com/ppt/RAS2018/cryp-f03-other-cryptography.pdf) #### 18、[Block ciphers](https://data.hackinn.com/ppt/RAS2018/cryp-r02-block-ciphers.pdf) #### 19、[Hash and mac functions](https://data.hackinn.com/ppt/RAS2018/cryp-r04-hash-and-mac-functions.pdf) #### 20、[Digital sigatures](https://data.hackinn.com/ppt/RAS2018/cryp-r1-2-digital-sigatures.pdf) #### 21、[Ssecure storage](https://data.hackinn.com/ppt/RAS2018/cryp-r14-secure-storage.pdf) #### 22、[The promise of iot best practices testing the hazards of inaction](https://data.hackinn.com/ppt/RAS2018/ast3-w02-the_promise_of_iot_best_practices_testing_the_hazards_of_inaction.pdf) #### 23、[General cryptography](https://data.hackinn.com/ppt/RAS2018/cryp-t08-general-cryptography.pdf) #### 24、[Lattice based cryptography](https://data.hackinn.com/ppt/RAS2018/cryp-t10-lattice-based-cryptography.pdf) #### 25、[Computing on encrypted data](https://data.hackinn.com/ppt/RAS2018/cryp-w02-computing-on-encrypted-data.pdf) #### 26、[Cryptographic protocols](https://data.hackinn.com/ppt/RAS2018/cryp-w04-cryptographic-protocols.pdf) #### 27、[Post quantum cryptography](https://data.hackinn.com/ppt/RAS2018/cryp-w14-post-quantum-cryptography.pdf) #### 28、[Rred team vs. blue team on aws](https://data.hackinn.com/ppt/RAS2018/csv-r1-2-red-team-vs.-blue-team-on-aws.pdf) #### 29、[Fim and system call auditing at scale in a large container deployment](https://data.hackinn.com/ppt/RAS2018/csv-r14-fim-and-system-call-auditing-at-scale-in-a-large-container-deployment.pdf) #### 30、[Confessions of a cloud security convert](https://data.hackinn.com/ppt/RAS2018/csv-t10-confessions-of-a-cloud-security-convert.pdf) #### 31、[Ephemeral devops adventures in managing short lived systems](https://data.hackinn.com/ppt/RAS2018/csv-w12-ephemeral-devops-adventures-in-managing-short-lived-systems.pdf) #### 32、[Securing innovation shifting the conversation from fear to possibility](https://data.hackinn.com/ppt/RAS2018/cxo-f02_securing-innovation-shifting-the-conversation-from-fear-to-possibility.pdf) #### 33、[Business executive fundamentals how to beat the mbas at their own game finalpptx](https://data.hackinn.com/ppt/RAS2018/cxo-f03-business-executive-fundamentals-how-to-beat-the-mbas-at-their-own-game_finalpptx.pdf) #### 34、[Dos and donts of devsecops](https://data.hackinn.com/ppt/RAS2018/dev-f01-dos-and-donts-of-devsecops.pdf) #### 35、[Devops and the future of enterprise security](https://data.hackinn.com/ppt/RAS2018/dev-f03-devops-and-the-future-of-enterprise-security.pdf) #### 36、[Agile and continuous threat models](https://data.hackinn.com/ppt/RAS2018/dev-r04-agile-and-continuous-threat-models.pdf) #### 37、[Devsecops using containers to speed up your testing](https://data.hackinn.com/ppt/RAS2018/dev-r1-2-devsecops-using-containers-to-speed-up-your-testing.pdf) #### 38、[Open source in security critical environments](https://data.hackinn.com/ppt/RAS2018/dev-r14-open-source-in-security-critical-environments.pdf) #### 39、[Game of pwns the pillars of cyber risk resilience](https://data.hackinn.com/ppt/RAS2018/tv-w12-game-of-pwns-the-pillars-of-cyber-risk-resilience.pdf) #### 40、[Incorporating security practices into business processes](https://data.hackinn.com/ppt/RAS2018/exp-r1-2-incorporating-security-practices-into-business-processes.pdf) #### 41、[Security orchestration and incident response](https://data.hackinn.com/ppt/RAS2018/exp-t10-security-orchestration-and-incident-response.pdf) #### 42、[Potus is posting social media and national security](https://data.hackinn.com/ppt/RAS2018/exp-w02-potus-is-posting-social-media-and-national-security.pdf) #### 43、[Security automation simplified via nist oscal we are not in kansas anymore](https://data.hackinn.com/ppt/RAS2018/grc-f01-security-automation-simplified-via-nist-oscal-we_re-not-in-kansas-anymore.pdf) #### 44、[Debunking myths for cyber insurance](https://data.hackinn.com/ppt/RAS2018/grc-f02-debunking-myths-for-cyber-insurance.pdf) #### 45、[The gdpr is only for europe right](https://data.hackinn.com/ppt/RAS2018/grc-r02-the-gdpr-is-only-for-europe-right.pdf) #### 46、[Cut through the confusion 2018 updates to cis critical security controls](https://data.hackinn.com/ppt/RAS2018/grc-r04-cut-through-the-confusion-2018_updates-to-cis-critical-security-controls.pdf) #### 47、[Gdpr compliance you forgot your digital environment](https://data.hackinn.com/ppt/RAS2018/grc-r1-2-gdpr-compliance-you-forgot-your-digital-environment.pdf) #### 48、[The supply chain threat](https://data.hackinn.com/ppt/RAS2018/grc-t10-the-supply-chain-threat.pdf) #### 49、[Theres no such thing as cyber risk](https://data.hackinn.com/ppt/RAS2018/grc-w02-theres-no-such-thing-as-cyber-risk.pdf) #### 50、[Creating order from chaos metrics that matter](https://data.hackinn.com/ppt/RAS2018/grc-w04-creating-order-from-chaos-metrics-that-matter.pdf) #### 51、[Creating order from chaos metrics that matter](https://data.hackinn.com/ppt/RAS2018/grc-w04-creating-order-from-chaos-metrics-that-matter_copy1.pdf) #### 52、[Issues of quantifying risk around identity and access management iam](https://data.hackinn.com/ppt/RAS2018/grc-w14-issues-of-quantifying-risk-around-identity-and-access-management-_iam_.pdf) #### 53、[I forgot your password breaking modern password recovery systems](https://data.hackinn.com/ppt/RAS2018/ht-r1-2_i-forgot-your-password-breaking-modern-password-recovery-systems.pdf) #### 54、[When in russia hacking vice abroad](https://data.hackinn.com/ppt/RAS2018/ht-t07_when-in-russia-hacking-vice-abroad.pdf) #### 55、[Hacking closed networks](https://data.hackinn.com/ppt/RAS2018/ht-t10_hacking-closed-networks.pdf) #### 56、[Modern exploitation owning all of the things](https://data.hackinn.com/ppt/RAS2018/hta-t07_modern-exploitation-owning-all-of-the-things.pdf) #### 57、[No one wants to work on your infosec team how to fix it](https://data.hackinn.com/ppt/RAS2018/tv-w09-no-one-wants-to-work-on-your-infosec-team-how-to-fix-it.pdf) #### 58、[Ccleaner apt attack a technical look inside](https://data.hackinn.com/ppt/RAS2018/hta-t10-ccleaner-apt-attack-a-technical-look-inside.pdf) #### 59、[The system is people designing effective security ux](https://data.hackinn.com/ppt/RAS2018/hum-f03-the-system-is-people-designing-effective-security-ux.pdf) #### 60、[A framework to effectively develop insider threat controls](https://data.hackinn.com/ppt/RAS2018/hum-r02-a-framework-to-effectively-develop-insider-threat-controls.pdf) #### 61、[Compromising a fortune 500 business without hacking a thing](https://data.hackinn.com/ppt/RAS2018/hum-r04-compromising-a-fortune-500-business-without-hacking-a-thing.pdf) #### 62、[Seeing is believing making the cyber hype real with hacking demos](https://data.hackinn.com/ppt/RAS2018/hum-r1-2-seeing-is-believing-making-the-cyber-hype-real-with-hacking-demos.pdf) #### 63、[Building a security awareness ambassador program](https://data.hackinn.com/ppt/RAS2018/hum-t08-building-a-security-awareness-ambassador-program.pdf) #### 64、[Turning your security strategy inside out managing insider threat](https://data.hackinn.com/ppt/RAS2018/hum-t10-turning-your-security-strategy-inside-out-managing-insider-threat.pdf) #### 65、[Let us blow up security awareness and start over](https://data.hackinn.com/ppt/RAS2018/hum-w04-let_s-blow-up-security-awareness-and-start-over_copy1.pdf) #### 66、[Big little lies truth on the new eu regulations for id and dataprotection](https://data.hackinn.com/ppt/RAS2018/idy-f01_big-little-lies-truth-on-the-new-eu-regulations-for-id-and-dataprotection.pdf) #### 67、[Can blockchain enable identity management](https://data.hackinn.com/ppt/RAS2018/idy-r1-2_can-blockchain-enable-identity-management.pdf) #### 68、[The long road to identity on the blockchain](https://data.hackinn.com/ppt/RAS2018/idy-r14_the-long-road-to-identity-on-the-blockchain_.pdf) #### 69、[Passwords and fingerprints and face oh my comparing old and new](https://data.hackinn.com/ppt/RAS2018/idy-t10_passwords-and-fingerprints-and-face-oh-my-comparing-old-and-new.pdf) #### 70、[Identity based security and privacy for the internet of things](https://data.hackinn.com/ppt/RAS2018/idy-w14_identity-based-security-and-privacy-for-the-internet-of-things.pdf) #### 71、[Cybersecurity and international trade the new landscape](https://data.hackinn.com/ppt/RAS2018/law-f01_cybersecurity_and_international_trade-the_new_landscape.pdf) #### 72、[Iot and critical infrastructures a collision of fundamentals](https://data.hackinn.com/ppt/RAS2018/law-f02-iot_and_critical_infrastructures-a_collision_of_fundamentals.pdf) #### 73、[Rethinking employee surveillance in a new digital era](https://data.hackinn.com/ppt/RAS2018/law-f03_rethinking_employee_surveillance_in_a_new_digital_era.pdf) #### 74、[Gamification emerging regulation aka make money and avoid jail](https://data.hackinn.com/ppt/RAS2018/law-r02-gamification-emerging_regulation_aka_make_money_and_avoid_jail_.pdf) #### 75、[Cyber litigation 2018 recent cyber cases in federal courts and agencies](https://data.hackinn.com/ppt/RAS2018/law-r04_cyber-litigation_2018-recent_cyber-cases_in_federal_courts_and_agencies.pdf) #### 76、[Customer losses who is going to sue you and what you can do about it](https://data.hackinn.com/ppt/RAS2018/law-r14-customer_losses-who_s_going_to_sue_you_and_what_you_can_do_about_it.pdf) #### 77、[Hot topics in cyber law 2018](https://data.hackinn.com/ppt/RAS2018/law-t07-hot_topics_in_cyber_law_2018.pdf) #### 78、[Emerging security management and legal challenges for executives](https://data.hackinn.com/ppt/RAS2018/law-t08-emerging_security_management_and_legal_challenges_for_executives.pdf) #### 79、[Hack back for good not vengeance debating active defense for enterprises](https://data.hackinn.com/ppt/RAS2018/law-t10-hack_back_for_good_not_vengeance-debating_active_defense_for_enterprises.pdf) #### 80、[Internet of wild things a mock trial](https://data.hackinn.com/ppt/RAS2018/law-w02_internet_of_wild_things-a_mock_trial.pdf) #### 81、[Calculated risk how ai is rewiring business law and security](https://data.hackinn.com/ppt/RAS2018/law-w04-calculated_risk_how_ai_is_rewiring_business-law_and_security.pdf) #### 82、[The new barons of cyberspace ico creators and ransomware authors](https://data.hackinn.com/ppt/RAS2018/law-w12-the_new_barons_of_cyberspace-ico_creators_and_ransomware_authors.pdf) #### 83、[Swimming in a sea of enemies the dilemmas of the threat researcher](https://data.hackinn.com/ppt/RAS2018/law-w14-swimming_in_a_sea_of_enemies_the_dilemmas_of_the_threat_researcher.pdf) #### 84、[Nation state espionage hunting multi platform apts on a global scale](https://data.hackinn.com/ppt/RAS2018/mbs-f01-nation-state-espionage-hunting-multi-platform-apts-on-a-global-scale.pdf) #### 85、[Within 10 years autonomous vehicles will change every cisos job](https://data.hackinn.com/ppt/RAS2018/mbs-t08-within-10-years-autonomous-vehicles-will-change-every-cisos-job.pdf) #### 86、[My firsthand experience with ransomware](https://data.hackinn.com/ppt/RAS2018/tv-w07-my-firsthand-experience-with-ransomware.pdf) #### 87、[Cheapscate attacking iot with less_than 60](https://data.hackinn.com/ppt/RAS2018/mbs-w02-cheapscate-attacking-iot-with-less_-than-60_.pdf) #### 88、[The new landscape of airborne cyberattacks](https://data.hackinn.com/ppt/RAS2018/mbs-w04-the-new-landscape-of-airborne-cyberattacks.pdf) #### 89、[Fighting malware with graph analytics an end to end case study](https://data.hackinn.com/ppt/RAS2018/mln-f01-fighting-malware-with-graph-analytics-an-end-to-end-case-study.pdf) #### 90、[The untold stor of 8200 a launching point for women in cybersecurity title apply slides](https://data.hackinn.com/ppt/RAS2018/prof-t07-the-untold-stor-of-8200-a-launching-point-for-women-in-cybersecurity_title_apply_slides.pdf) #### 91、[Meeting business needs by filling the cybersecurity skills gap](https://data.hackinn.com/ppt/RAS2018/prof-w02-meeting-business-needs-by-filling-the-cybersecurity-skills-gap.pdf) #### 92、[Sending a human to do a machines job addressing threats with analytics](https://data.hackinn.com/ppt/RAS2018/spo1-r04-sending_a_human_to_do_a_machines_job-addressing_threats_with_analytics.pdf) #### 93、[Demystifying big data analytics and machine learning in cyber security](https://data.hackinn.com/ppt/RAS2018/spo2-r04-demystifying_big_data-analytics-and_machine_learning_in_cyber_security.pdf) #### 94、[Ai and cybersecurity applications of artificial intelligence in security understanding and defending against adversarial ai](https://data.hackinn.com/ppt/RAS2018/spo2-t07-ai_and_cybersecurity_-_applications_of_artificial_intelligence_in_security-understanding_and_defending_against_adversarial_ai.pdf) #### 95、[The future of trust in ecosystems global challenges](https://data.hackinn.com/ppt/RAS2018/spo2-t08-the_future_of_trust_in_ecosystems_-_global_challenges.pdf) #### 96、[Threat intelligence insights dns based data exfiltration in the wild](https://data.hackinn.com/ppt/RAS2018/spo3-t08-threat_intelligence_insights_dns-based_data_exfiltration_in_the_wild.pdf) #### 97、[Help me network visibility and ai you are our only hope](https://data.hackinn.com/ppt/RAS2018/spo3-t10-help_me_network_visibility_and_ai-you_re_our_only_hope.pdf) #### 98、[Honeypots 2.0 defending industrial systems with dynamic deception](https://data.hackinn.com/ppt/RAS2018/spo3-w12-honeypots_2.0-defending_industrial_systems_with_dynamic_deception.pdf) #### 99、[Stop translating start defending common language for managing cyber risk](https://data.hackinn.com/ppt/RAS2018/tech-w04-stop-translating-start-defending-common-language-for-managing-cyber-risk_.pdf) #### 100、[Breaking and entering how and why dhs conducts penetration tests](https://data.hackinn.com/ppt/RAS2018/tv-r04-breaking-and-entering-how-and-why-dhs-conducts-penetration-tests_.pdf) #### 101、[Hacking in space](https://data.hackinn.com/ppt/RAS2018/tv-r1-2-hacking-in-space.pdf) #### 102、[Ai deception fooling artificial intelligence is easier than you think](https://data.hackinn.com/ppt/RAS2018/tv-t02-ai-deception-fooling-artificial-intelligence-is-easier-than-you-think.pdf) #### 103、[Infosec 101 for icos how the most secure transaction protocol failed](https://data.hackinn.com/ppt/RAS2018/tv-t04-infosec-101-for-icos-how-the-most-secure-transaction-protocol-failed.pdf) #### 104、[The dark web and how it affects your industry](https://data.hackinn.com/ppt/RAS2018/tv-t05-the-dark-web-and-how-it-affects-your-industry.pdf) #### 105、[My voice is your command the perils of smart voice assistants](https://data.hackinn.com/ppt/RAS2018/tv-t06-my-voice-is-your-command-the-perils-of-smart-voice-assistants.pdf) #### 106、[Seven tips for mentoring security newbies](https://data.hackinn.com/ppt/RAS2018/tv-t09-seven-tips-for-mentoring-security-newbies.pdf) #### 107、[Create a ten year strategy for your ciso](https://data.hackinn.com/ppt/RAS2018/tv-t10-create-a-ten-year-strategy-for-your-ciso.pdf) #### 108、[Keeping up with generation app new approaches for cybersafety and communicating with kids](https://data.hackinn.com/ppt/RAS2018/tv-w01-keeping-up-with-generation-app-new-approaches-for-cybersafety-and-communicating-with-kids.pdf) #### 109、[The rise of supply chain attacks](https://data.hackinn.com/ppt/RAS2018/tv-w04-the-rise-of-supply-chain-attacks.pdf) `大会官网: https://www.rsaconference.com/events/us18` 标签: none