RSA 2019 作者: Hack Inn 时间: March 5, 2019 分类: 安全大会资料 访问: 2,793 次  #### 1、[The Advantage of Ignoring the Long Tail of Security:A Product View](https://data.hackinn.com/ppt/RSA2019/The%20Advantage%20of%20Ignoring%20the%20Long%20Tail%20of%20Security:A%20Product%20View.pdf) #### 2、[Five Secrets to Attract and Retain Top Tech Talent in Your Future Workplace](https://data.hackinn.com/ppt/RSA2019/Five%20Secrets%20to%20Attract%20and%20Retain%20Top%20Tech%20Talent%20in%20Your%20Future%20Workplace.pdf) #### 3、[Secure Innovation in Public Cloud, Myth or Reality?](https://data.hackinn.com/ppt/RSA2019/Secure%20Innovation%20in%20Public%20Cloud,%20Myth%20or%20Reality%3F.pdf) #### 4、[Ransom:A Real World Case Study in Data Theft, Forensics and the Law](https://data.hackinn.com/ppt/RSA2019/Ransom:A%20Real%20World%20Case%20Study%20in%20Data%20Theft,%20Forensics%20and%20the%20Law.pdf) #### 5、[The Art of the Nudge:Cheap Ways to Steer User Behavior](https://data.hackinn.com/ppt/RSA2019/The%20Art%20of%20the%20Nudge:Cheap%20Ways%20to%20Steer%20User%20Behavior.pdf) #### 6、[Securing Cloud-Native Applications at Scale](https://data.hackinn.com/ppt/RSA2019/Securing%20Cloud-Native%20Applications%20at%20Scale.pdf) #### 7、[What does it mean to #BeAnAlly?](https://data.hackinn.com/ppt/RSA2019/What%20does%20it%20mean%20to%20%23BeAnAlly%3F.pdf) #### 8、[Why Industrial IoT Security Is Really about Saving Lives](https://data.hackinn.com/ppt/RSA2019/Why%20Industrial%20IoT%20Security%20Is%20Really%20about%20Saving%20Lives.pdf) #### 9、[Cybersecurity:Federalism as Defense-in-Depth](https://data.hackinn.com/ppt/RSA2019/Cybersecurity:Federalism%20as%20Defense-in-Depth.pdf) #### 10、[CYBER INFLUENCE:CYBERWAR AND PSYCHOLOGICAL OPERATIONS](https://data.hackinn.com/ppt/RSA2019/CYBER%20INFLUENCE:CYBERWAR%20AND%20PSYCHOLOGICAL%20OPERATIONS.pdf) #### 11、[Lesson Learned:What I Have Experienced While Implementing GDPR](https://data.hackinn.com/ppt/RSA2019/Lesson%20Learned:What%20I%20Have%20Experienced%20While%20Implementing%20GDPR.pdf) #### 12、[Building Identity for an Open Perimeter](https://data.hackinn.com/ppt/RSA2019/Building%20Identity%20for%20an%20Open%20Perimeter.pdf) #### 13、[The NIST Privacy Framework:What It Is and What It Means for You](https://data.hackinn.com/ppt/RSA2019/The%20NIST%20Privacy%20Framework:What%20It%20Is%20and%20What%20It%20Means%20for%20You.pdf) #### 14、[Privacy in the Age of Pervasive Cameras When Electronic Privacy Gets Physical](https://data.hackinn.com/ppt/RSA2019/Privacy%20in%20the%20Age%20of%20Pervasive%20Cameras%20When%20Electronic%20Privacy%20Gets%20Physical.pdf) #### 15、[GDPR:How to Work Out If Your Security Is “Appropriate”](https://data.hackinn.com/ppt/RSA2019/GDPR:How%20to%20Work%20Out%20If%20Your%20Security%20Is%20“Appropriate”.pdf) #### 16、[Protecting the Cloud with the Power of Cloud](https://data.hackinn.com/ppt/RSA2019/Protecting%20the%20Cloud%20with%20the%20Power%20of%20Cloud.pdf) #### 17、[Hunting and Tracking Rogue Radio Frequency Devices](https://data.hackinn.com/ppt/RSA2019/Hunting%20and%20Tracking%20Rogue%20Radio%20Frequency%20Devices.pdf) #### 18、[Security at the Speed of DevOps](https://data.hackinn.com/ppt/RSA2019/Security%20at%20the%20Speed%20of%20DevOps.pdf) #### 19、[DevSecOps for the Rest of Us!](https://data.hackinn.com/ppt/RSA2019/DevSecOps%20for%20the%20Rest%20of%20Us!.pdf) #### 20、[AI:Hacking Without Humans How Can Human Brains Be Hacked?](https://data.hackinn.com/ppt/RSA2019/AI:Hacking%20Without%20Humans%20How%20Can%20Human%20Brains%20Be%20Hacked%3F.pdf) #### 21、[Homomorphic encryption](https://data.hackinn.com/ppt/RSA2019/Homomorphic%20encryption.pdf) #### 22、[Cryptocurrency Hacking and the Legal Climate for Blockchain Technology](https://data.hackinn.com/ppt/RSA2019/Cryptocurrency%20Hacking%20and%20the%20Legal%20Climate%20for%20Blockchain%20Technology.pdf) #### 23、[Changing the World with the UK’s Code of Practice for Consumer IoT Security](https://data.hackinn.com/ppt/RSA2019/Changing%20the%20World%20with%20the%20UK’s%20Code%20of%20Practice%20for%20Consumer%20IoT%20Security.pdf) #### 24、[Ransomware:The Rise, Death and Resurrection of Digital Extortion](https://data.hackinn.com/ppt/RSA2019/Ransomware:The%20Rise,%20Death%20and%20Resurrection%20of%20Digital%20Extortion.pdf) #### 25、[Cybersecurity Silo-Busters:1 Cyberthreat Actors:0](https://data.hackinn.com/ppt/RSA2019/Cybersecurity%20Silo-Busters:1%20Cyberthreat%20Actors:0.pdf) #### 26、[Downgradable Identity-based Encryption and Applications](https://data.hackinn.com/ppt/RSA2019/Downgradable%20Identity-based%20Encryption%20and%20Applications.pdf) #### 27、[Protecting your Achilles’ heel:managing security risk in your legacy product portfolio](https://data.hackinn.com/ppt/RSA2019/Protecting%20your%20Achilles’%20heel:managing%20security%20risk%20in%20your%20legacy%20product%20portfolio.pdf) #### 28、[Democratizing Security:A Story of Security Decentralization](https://data.hackinn.com/ppt/RSA2019/Democratizing%20Security:A%20Story%20of%20Security%20Decentralization.pdf) #### 29、[The Emerging Gray-App Threat:Mobile Kids’ Apps](https://data.hackinn.com/ppt/RSA2019/The%20Emerging%20Gray-App%20Threat:Mobile%20Kids’%20Apps.pdf) #### 30、[Incident Response beyond Enterprise IT](https://data.hackinn.com/ppt/RSA2019/Incident%20Response%20beyond%20Enterprise%20IT.pdf) #### 31、[How to Apply a Zero-Trust Model to Cloud, Data and Identity](https://data.hackinn.com/ppt/RSA2019/How%20to%20Apply%20a%20Zero-Trust%20Model%20to%20Cloud,%20Data%20and%20Identity.pdf) #### 32、[Democratizing Cloud Security Our Journey To Secure The Public Cloud](https://data.hackinn.com/ppt/RSA2019/Democratizing%20Cloud%20Security%20Our%20Journey%20To%20Secure%20The%20Public%20Cloud.pdf) #### 33、[HOT TOPICS IN CYBER-LAW 2019](https://data.hackinn.com/ppt/RSA2019/HOT%20TOPICS%20IN%20CYBER-LAW%202019.pdf) #### 34、[We’re Not in Kansas Anymore:Measuring the Impact of a Data Breach](https://data.hackinn.com/ppt/RSA2019/We’re%20Not%20in%20Kansas%20Anymore:Measuring%20the%20Impact%20of%20a%20Data%20Breach.pdf) #### 35、[Top 10 ways to make hackers excited:All about the shortcuts not worth taking](https://data.hackinn.com/ppt/RSA2019/Top%2010%20ways%20to%20make%20hackers%20excited:All%20about%20the%20shortcuts%20not%20worth%20taking.pdf) #### 36、[Use Model to Deconstruct Threats:Detect Intrusion by Statistical Learning](https://data.hackinn.com/ppt/RSA2019/Use%20Model%20to%20Deconstruct%20Threats:Detect%20Intrusion%20by%20Statistical%20Learning.pdf) #### 37、[Security Learns to Sprint:DevSecOps](https://data.hackinn.com/ppt/RSA2019/Security%20Learns%20to%20Sprint:DevSecOps.pdf) #### 38、[Finding the Right Answers—Facilitating Insider Threat Analysis Using OCTAVE FORTE](https://data.hackinn.com/ppt/RSA2019/Finding%20the%20Right%20Answers—Facilitating%20Insider%20Threat%20Analysis%20Using%20OCTAVE%20FORTE.pdf) #### 39、[Infecting the Embedded Supply Chain](https://data.hackinn.com/ppt/RSA2019/Infecting%20the%20Embedded%20Supply%20Chain.pdf) #### 40、[Making Security a Competitive Advantage](https://data.hackinn.com/ppt/RSA2019/Making%20Security%20a%20Competitive%20Advantage.pdf) #### 41、[Awareness at Scale:Creating Risk-Aware Cultures in Big Companies](https://data.hackinn.com/ppt/RSA2019/Awareness%20at%20Scale:Creating%20Risk-Aware%20Cultures%20in%20Big%20Companies.pdf) #### 42、[The Industry of Social Network Manipulation:from Botnets to Hucksters](https://data.hackinn.com/ppt/RSA2019/The%20Industry%20of%20Social%20Network%20Manipulation:from%20Botnets%20to%20Hucksters.pdf) #### 43、[Engaging the Media](https://data.hackinn.com/ppt/RSA2019/Engaging%20the%20Media.pdf) #### 44、[From Abstract to Presentation:Diagramming your Successful Talk](https://data.hackinn.com/ppt/RSA2019/From%20Abstract%20to%20Presentation:Diagramming%20your%20Successful%20Talk.pdf) #### 45、[Why Data-driven Personalized Journeys Are The Future Of Security Training](https://data.hackinn.com/ppt/RSA2019/Why%20Data-driven%20Personalized%20Journeys%20Are%20The%20Future%20Of%20Security%20Training.pdf) #### 46、[12 Ways to Hack MFA](https://data.hackinn.com/ppt/RSA2019/12%20Ways%20to%20Hack%20MFA.pdf) #### 47、[SOC Automation, Enterprise Blueprinting and Hunting Using Open-Source Tools](https://data.hackinn.com/ppt/RSA2019/SOC%20Automation,%20Enterprise%20Blueprinting%20and%20Hunting%20Using%20Open-Source%20Tools.pdf) #### 48、[Evolution of AI-Bot Swarming Intelligence with Robots](https://data.hackinn.com/ppt/RSA2019/Evolution%20of%20AI-Bot%20Swarming%20Intelligence%20with%20Robots.pdf) #### 49、[Building a Defensible Cyberspace(Paper)](https://data.hackinn.com/ppt/RSA2019/Building%20a%20Defensible%20Cyberspace(Paper).pdf) #### 50、[More than Vaulting:Adapting to New Privileged Access Threats](https://data.hackinn.com/ppt/RSA2019/More%20than%20Vaulting:Adapting%20to%20New%20Privileged%20Access%20Threats.pdf) #### 51、[Manufacturers approach towards cybersecurity threats targeting healthcare](https://data.hackinn.com/ppt/RSA2019/Manufacturers%20approach%20towards%20cybersecurity%20threats%20targeting%20healthcare.pdf) #### 52、[Barney Fife Metrics:The Bullet That we Have but Don’t Use, and Why](https://data.hackinn.com/ppt/RSA2019/Barney%20Fife%20Metrics:The%20Bullet%20That%20we%20Have%20but%20Don’t%20Use,%20and%20Why.pdf) #### 53、[Retaining and Growing Cybersecurity Talent:A Proven Model](https://data.hackinn.com/ppt/RSA2019/Retaining%20and%20Growing%20Cybersecurity%20Talent:A%20Proven%20Model.pdf) #### 54、[The Psychology of Technology](https://data.hackinn.com/ppt/RSA2019/The%20Psychology%20of%20Technology.pdf) #### 55、[Blockchain Augmentation of the Trusted Supply Chain](https://data.hackinn.com/ppt/RSA2019/Blockchain%20Augmentation%20of%20the%20Trusted%20Supply%20Chain.pdf) #### 56、[HTTPS – Is Privacy Making Us LESS Secure?](https://data.hackinn.com/ppt/RSA2019/HTTPS%20–%20Is%20Privacy%20Making%20Us%20LESS%20Secure%3F.pdf) #### 57、[The Who:Is This Responsibility Yours, Mine or Ours?](https://data.hackinn.com/ppt/RSA2019/The%20Who:Is%20This%20Responsibility%20Yours,%20Mine%20or%20Ours%3F.pdf) #### 58、[Mobile Security and the Post-Perimeter World:10 Years of Mobile Threats](https://data.hackinn.com/ppt/RSA2019/Mobile%20Security%20and%20the%20Post-Perimeter%20World:10%20Years%20of%20Mobile%20Threats.pdf) #### 59、[Data Breach or Disclosure:A Quantitative Risk Analysis](https://data.hackinn.com/ppt/RSA2019/Data%20Breach%20or%20Disclosure:A%20Quantitative%20Risk%20Analysis.pdf) #### 60、[Container Security at the Speed of CI:CD](https://data.hackinn.com/ppt/RSA2019/Container%20Security%20at%20the%20Speed%20of%20CI:CD.pdf) #### 61、[HACKING EXPOSED:LIVE Bypassing ”NextGen”](https://data.hackinn.com/ppt/RSA2019/HACKING%20EXPOSED:LIVE%20Bypassing%20”NextGen”.pdf) #### 62、[The Rise of the Cyber Security Culture Hacker](https://data.hackinn.com/ppt/RSA2019/The%20Rise%20of%20the%20Cyber%20Security%20Culture%20Hacker.pdf) #### 63、[Blockchain Anchored Swap Meet —a mock trial](https://data.hackinn.com/ppt/RSA2019/Blockchain%20Anchored%20Swap%20Meet%20—a%20mock%20trial.pdf) #### 64、[Lossy Trapdoor Permutations with Improved Lossiness](https://data.hackinn.com/ppt/RSA2019/Lossy%20Trapdoor%20Permutations%20with%20Improved%20Lossiness.pdf) #### 65、[Identity and Access Management (IAM) Emerging Trends and Standards](https://data.hackinn.com/ppt/RSA2019/Identity%20and%20Access%20Management%20%28IAM%29%20Emerging%20Trends%20and%20Standards.pdf) #### 66、[Humans are awesome at risk management](https://data.hackinn.com/ppt/RSA2019/Humans%20are%20awesome%20at%20risk%20management.pdf) #### 67、[Future of Cybersecurity Scenarios:Anticipating the Cybersecurity Challenges of the Future](https://data.hackinn.com/ppt/RSA2019/Future%20of%20Cybersecurity%20Scenarios:Anticipating%20the%20Cybersecurity%20Challenges%20of%20the%20Future.pdf) #### 68、[Making Privacy Personal:Profiling Users’ Privacy Management Strategies on Social Networking Sites](https://data.hackinn.com/ppt/RSA2019/Making%20Privacy%20Personal:Profiling%20Users’%20Privacy%20Management%20Strategies%20on%20Social%20Networking%20Sites.pdf) #### 69、[How Bad Incentives Led to Crypto-Mining Malware, and What to Do about It](https://data.hackinn.com/ppt/RSA2019/How%20Bad%20Incentives%20Led%20to%20Crypto-Mining%20Malware,%20and%20What%20to%20Do%20about%20It.pdf) #### 70、[Dynamic Speaking:Tips to Finding Your Voice, Overcoming Your Fears and Telling Your Story](https://data.hackinn.com/ppt/RSA2019/Dynamic%20Speaking:Tips%20to%20Finding%20Your%20Voice,%20Overcoming%20Your%20Fears%20and%20Telling%20Your%20Story.pdf) #### 71、[Machine Learning:The What and Why of AI](https://data.hackinn.com/ppt/RSA2019/Machine%20Learning:The%20What%20and%20Why%20of%20AI.pdf) #### 72、[Internet of Food:How IoT Threatens Fields, Farms and Factories](https://data.hackinn.com/ppt/RSA2019/Internet%20of%20Food:How%20IoT%20Threatens%20Fields,%20Farms%20and%20Factories.pdf) #### 73、[Math is Hard:Compliance to Continuous Risk Management](https://data.hackinn.com/ppt/RSA2019/Math%20is%20Hard:Compliance%20to%20Continuous%20Risk%20Management.pdf) #### 74、[Do You Know Your Organization's Top 10 Security Risks?](https://data.hackinn.com/ppt/RSA2019/Do%20You%20Know%20Your%20Organization's%20Top%2010%20Security%20Risks%3F.pdf) #### 75、[Security and Privacy Challenges for IoT](https://data.hackinn.com/ppt/RSA2019/Security%20and%20Privacy%20Challenges%20for%20IoT.pdf) #### 76、[Ransom:A Real-World Case Study in Data Theft, Forensics and the Law](https://data.hackinn.com/ppt/RSA2019/Ransom:A%20Real-World%20Case%20Study%20in%20Data%20Theft,%20Forensics%20and%20the%20Law.pdf) #### 77、[Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps](https://data.hackinn.com/ppt/RSA2019/Securely%20Deploying%20Micro%20Services,%20Containers%20&%20Serverless%20PaaS%20Web%20Apps.pdf) #### 78、[Understand Credential Security:Important Things You Need to Know About Storing Your Identity](https://data.hackinn.com/ppt/RSA2019/Understand%20Credential%20Security:Important%20Things%20You%20Need%20to%20Know%20About%20Storing%20Your%20Identity.pdf) #### 79、[Cheaper by the dozen:application security on a limited budget](https://data.hackinn.com/ppt/RSA2019/Cheaper%20by%20the%20dozen:application%20security%20on%20a%20limited%20budget.pdf) #### 80、[What Kids are Telling Us about the Digital Landscape](https://data.hackinn.com/ppt/RSA2019/What%20Kids%20are%20Telling%20Us%20about%20the%20Digital%20Landscape.pdf) #### 81、[Your Data’s Integrity:Protect & Respond to Ransomware and Critical Events](https://data.hackinn.com/ppt/RSA2019/Your%20Data’s%20Integrity:Protect%20&%20Respond%20to%20Ransomware%20and%20Critical%20Events.pdf) #### 82、[Privacy Essentials for Security Professionals](https://data.hackinn.com/ppt/RSA2019/Privacy%20Essentials%20for%20Security%20Professionals.pdf) #### 83、[What Lurks within Your IT:Spotlight on the Dark Side of the Supply Chain](https://data.hackinn.com/ppt/RSA2019/What%20Lurks%20within%20Your%20IT:Spotlight%20on%20the%20Dark%20Side%20of%20the%20Supply%20Chain.pdf) #### 84、[Debunking the Hacker Hype:The Reality of Widespread Blackouts](https://data.hackinn.com/ppt/RSA2019/Debunking%20the%20Hacker%20Hype:The%20Reality%20of%20Widespread%20Blackouts.pdf) #### 85、[No More Firewalls! How Zero Trust Networks are Reshaping Cyber Security](https://data.hackinn.com/ppt/RSA2019/No%20More%20Firewalls!%20How%20Zero%20Trust%20Networks%20are%20Reshaping%20Cyber%20Security.pdf) #### 86、[Mechanical Backdoors in Cold War Encryption Machines](https://data.hackinn.com/ppt/RSA2019/Mechanical%20Backdoors%20in%20Cold%20War%20Encryption%20Machines.pdf) #### 87、[The Metrics Manifesto](https://data.hackinn.com/ppt/RSA2019/The%20Metrics%20Manifesto.pdf) #### 88、[Intelligence-Driven Industrial Security with Case Studies in ICS Attacks](https://data.hackinn.com/ppt/RSA2019/Intelligence-Driven%20Industrial%20Security%20with%20Case%20Studies%20in%20ICS%20Attacks.pdf) #### 89、[Delivering Automated, Modern Enterprise App Auth in Old Orgs, Quickly](https://data.hackinn.com/ppt/RSA2019/Delivering%20Automated,%20Modern%20Enterprise%20App%20Auth%20in%20Old%20Orgs,%20Quickly.pdf) #### 90、[Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation](https://data.hackinn.com/ppt/RSA2019/Revisiting%20the%20Secret%20Hiding%20Assumption%20Used%20in%20Verifiable%20%28Outsourced%29%20Computation.pdf) #### 91、[AI and Machine Learning:Managing the Risks of Major Lawsuits](https://data.hackinn.com/ppt/RSA2019/AI%20and%20Machine%20Learning:Managing%20the%20Risks%20of%20Major%20Lawsuits.pdf) #### 92、[Lessons Learned Running High Stakes Cybercriminal Arms Races](https://data.hackinn.com/ppt/RSA2019/Lessons%20Learned%20Running%20High%20Stakes%20Cybercriminal%20Arms%20Races.pdf) #### 93、[Building a Leading Cloud Security Program](https://data.hackinn.com/ppt/RSA2019/Building%20a%20Leading%20Cloud%20Security%20Program.pdf) #### 94、[Studies of 2FA, Why Johnny Can not Use 2FA and How We Can Change That?](https://data.hackinn.com/ppt/RSA2019/Studies%20of%202FA,%20Why%20Johnny%20Can%20not%20Use%202FA%20and%20How%20We%20Can%20Change%20That%3F.pdf) #### 95、[Blockchainification of Cyber Supply Chain Risk:Hype vs. Hope](https://data.hackinn.com/ppt/RSA2019/Blockchainification%20of%20Cyber%20Supply%20Chain%20Risk:Hype%20vs.%20Hope.pdf) #### 96、[Practical Approaches to Cloud Native Security](https://data.hackinn.com/ppt/RSA2019/Practical%20Approaches%20to%20Cloud%20Native%20Security.pdf) #### 97、[Using the Cloud to Secure Versus Securing the Cloud](https://data.hackinn.com/ppt/RSA2019/Using%20the%20Cloud%20to%20Secure%20Versus%20Securing%20the%20Cloud.pdf) #### 98、[IMF Case Study:Metrics that Matter Help Management with Decision Making and Improve Security Posture of the Organization.](https://data.hackinn.com/ppt/RSA2019/IMF%20Case%20Study:Metrics%20that%20Matter%20Help%20Management%20with%20Decision%20Making%20and%20Improve%20Security%20Posture%20of%20the%20Organization..pdf) #### 99、[Solving Our Cybersecurity Talent Shortage](https://data.hackinn.com/ppt/RSA2019/Solving%20Our%20Cybersecurity%20Talent%20Shortage.pdf) #### 100、[Rethinking Access Control and Authentication for the Home IoT](https://data.hackinn.com/ppt/RSA2019/Rethinking%20Access%20Control%20and%20Authentication%20for%20the%20Home%20IoT.pdf) #### 101、[Accelerate and Simplify Incident Response with Security Automation](https://data.hackinn.com/ppt/RSA2019/Accelerate%20and%20Simplify%20Incident%20Response%20with%20Security%20Automation.pdf) #### 102、[Use of Facial Recognition to Combat Terrorism and Make International Travel More Secure](https://data.hackinn.com/ppt/RSA2019/Use%20of%20Facial%20Recognition%20to%20Combat%20Terrorism%20and%20Make%20International%20Travel%20More%20Secure.pdf) #### 103、[Lessons Learned From 30 Years of Security Awareness Efforts](https://data.hackinn.com/ppt/RSA2019/Lessons%20Learned%20From%2030%20Years%20of%20Security%20Awareness%20Efforts.pdf) #### 104、[Stop That Release, There's A Vulnerability!](https://data.hackinn.com/ppt/RSA2019/Stop%20That%20Release,%20There's%20A%20Vulnerability!.pdf) #### 105、[Superforecasting II:Risk Assessment Prognostication in the 21st century](https://data.hackinn.com/ppt/RSA2019/Superforecasting%20II:Risk%20Assessment%20Prognostication%20in%20the%2021st%20century.pdf) #### 106、[Introduction to Defending the Enterprise using Automated Security Operations](https://data.hackinn.com/ppt/RSA2019/Introduction%20to%20Defending%20the%20Enterprise%20using%20Automated%20Security%20Operations.pdf) #### 107、[How Understanding Risk Is Changing for Open Source Components](https://data.hackinn.com/ppt/RSA2019/How%20Understanding%20Risk%20Is%20Changing%20for%20Open%20Source%20Components.pdf) #### 108、[Secure Computation-Context Hiding Multi-Key Homomorphic Authenticators](https://data.hackinn.com/ppt/RSA2019/Secure%20Computation-Context%20Hiding%20Multi-Key%20Homomorphic%20Authenticators.pdf) #### 109、[Demystifying Quantum Computers](https://data.hackinn.com/ppt/RSA2019/Demystifying%20Quantum%20Computers.pdf) #### 110、[How-To for Innovators and Entrepreneurs](https://data.hackinn.com/ppt/RSA2019/How-To%20for%20Innovators%20and%20Entrepreneurs.pdf) #### 111、[Why the role of CISO sucks and what we should do to fix it!](https://data.hackinn.com/ppt/RSA2019/Why%20the%20role%20of%20CISO%20sucks%20and%20what%20we%20should%20do%20to%20fix%20it!.pdf) #### 112、[Quantum Chosen-Ciphertext Attacks against Feistel Ciphers](https://data.hackinn.com/ppt/RSA2019/Quantum%20Chosen-Ciphertext%20Attacks%20against%20Feistel%20Ciphers.pdf) #### 113、[Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions](https://data.hackinn.com/ppt/RSA2019/Universal%20Forgery%20and%20Multiple%20Forgeries%20of%20MergeMAC%20and%20Generalized%20Constructions.pdf) #### 114、[Securing Intel PC for FIDO support:Industry standard to remove passwords](https://data.hackinn.com/ppt/RSA2019/Securing%20Intel%20PC%20for%20FIDO%20support:Industry%20standard%20to%20remove%20passwords.pdf) #### 115、[How to Measure Ecosystem Impacts](https://data.hackinn.com/ppt/RSA2019/How%20to%20Measure%20Ecosystem%20Impacts.pdf) #### 116、[The Quest for Usable and Secure Passwords](https://data.hackinn.com/ppt/RSA2019/The%20Quest%20for%20Usable%20and%20Secure%20Passwords.pdf) #### 117、[Opening Remarks:Security, Privacy & Human Behavior](https://data.hackinn.com/ppt/RSA2019/Opening%20Remarks:Security,%20Privacy%20&%20Human%20Behavior.pdf) #### 118、[Kubernetes Runtime Security](https://data.hackinn.com/ppt/RSA2019/Kubernetes%20Runtime%20Security.pdf) #### 119、[How to Eliminate a Major Vulnerability in the Cybersecurity Workforce](https://data.hackinn.com/ppt/RSA2019/How%20to%20Eliminate%20a%20Major%20Vulnerability%20in%20the%20Cybersecurity%20Workforce.pdf) #### 120、[ROBUST ENCRYPTION, EXTENDED](https://data.hackinn.com/ppt/RSA2019/ROBUST%20ENCRYPTION,%20EXTENDED.pdf) #### 121、[Are Spoof-Proof Biometrics Really Possible?](https://data.hackinn.com/ppt/RSA2019/Are%20Spoof-Proof%20Biometrics%20Really%20Possible%3F.pdf) #### 122、[How the H@ck R U? A Modern Identity Assurance Approach in a Hacked World](https://data.hackinn.com/ppt/RSA2019/How%20the%20H%40ck%20R%20U%3F%20A%20Modern%20Identity%20Assurance%20Approach%20in%20a%20Hacked%20World.pdf) #### 123、[Treating Cloud-Specific Threats with Automatic Remediation](https://data.hackinn.com/ppt/RSA2019/Treating%20Cloud-Specific%20Threats%20with%20Automatic%20Remediation.pdf) #### 124、[Zero-knowledge proofs (ZKP):Privacy Preserving Authentication](https://data.hackinn.com/ppt/RSA2019/Zero-knowledge%20proofs%20%28ZKP%29:Privacy%20Preserving%20Authentication.pdf) #### 125、[A Cloud Security Architecture Workshop](https://data.hackinn.com/ppt/RSA2019/A%20Cloud%20Security%20Architecture%20Workshop.pdf) #### 126、[Cryptojacking:What’s in Your Environment?](https://data.hackinn.com/ppt/RSA2019/Cryptojacking:What’s%20in%20Your%20Environment%3F.pdf) #### 127、[ICS:SCADA Attack Detection 101](https://data.hackinn.com/ppt/RSA2019/ICS:SCADA%20Attack%20Detection%20101.pdf) #### 128、[Japan’s new cybersecurity strategy to close an IoT gap](https://data.hackinn.com/ppt/RSA2019/Japan’s%20new%20cybersecurity%20strategy%20to%20close%20an%20IoT%20gap.pdf) #### 129、[How CTI Can Play a Key Role to Get Security on Board](https://data.hackinn.com/ppt/RSA2019/How%20CTI%20Can%20Play%20a%20Key%20Role%20to%20Get%20Security%20on%20Board.pdf) #### 130、[Humanistic Multi-Factor Authentication (MFA) Why We Don't Use MFA](https://data.hackinn.com/ppt/RSA2019/Humanistic%20Multi-Factor%20Authentication%20%28MFA%29%20Why%20We%20Don't%20Use%20MFA.pdf) #### 131、[99 Security Tools and You Still Got Breached?](https://data.hackinn.com/ppt/RSA2019/99%20Security%20Tools%20and%20You%20Still%20Got%20Breached%3F.pdf) #### 132、[4G to 5G Evolution:In-Depth Security Perspective](https://data.hackinn.com/ppt/RSA2019/4G%20to%205G%20Evolution:In-Depth%20Security%20Perspective.pdf) #### 133、[Machine Learning Toolbox for Cybersecurity Risk Management](https://data.hackinn.com/ppt/RSA2019/Machine%20Learning%20Toolbox%20for%20Cybersecurity%20Risk%20Management.pdf) #### 134、[Using High-Entropy Encryption for Enterprise Collaboration](https://data.hackinn.com/ppt/RSA2019/Using%20High-Entropy%20Encryption%20for%20Enterprise%20Collaboration.pdf) #### 135、[Combatting the Scourge of Fileless Attacks](https://data.hackinn.com/ppt/RSA2019/Combatting%20the%20Scourge%20of%20Fileless%20Attacks.pdf) #### 136、[Cybersecurity’s Dirty Little Secret and Talent Grenade:BURNOUT](https://data.hackinn.com/ppt/RSA2019/Cybersecurity’s%20Dirty%20Little%20Secret%20and%20Talent%20Grenade:BURNOUT.pdf) #### 137、[Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?](https://data.hackinn.com/ppt/RSA2019/Studies%20of%202FA,%20Why%20Johnny%20Can’t%20Use%202FA%20and%20How%20We%20Can%20Change%20That%3F.pdf) #### 138、[Old School Problems with New Age Devices Parenting in 2019](https://data.hackinn.com/ppt/RSA2019/Old%20School%20Problems%20with%20New%20Age%20Devices%20Parenting%20in%202019.pdf) #### 139、[Blockchain Based Digital Identity:Exploring the messy space between promise and reality](https://data.hackinn.com/ppt/RSA2019/Blockchain%20Based%20Digital%20Identity:Exploring%20the%20messy%20space%20between%20promise%20and%20reality.pdf) #### 140、[Passwords and Patching:The Forgotten Building Blocks of Enterprise Security](https://data.hackinn.com/ppt/RSA2019/Passwords%20and%20Patching:The%20Forgotten%20Building%20Blocks%20of%20Enterprise%20Security.pdf) #### 141、[Attack Vectors in Orbit:The Need for IoT and Satellite Security](https://data.hackinn.com/ppt/RSA2019/Attack%20Vectors%20in%20Orbit:The%20Need%20for%20IoT%20and%20Satellite%20Security.pdf) #### 142、[Will your application be secure enough when Robots produce code for you?](https://data.hackinn.com/ppt/RSA2019/Will%20your%20application%20be%20secure%20enough%20when%20Robots%20produce%20code%20for%20you%3F.pdf) #### 143、[Automated Fault Analysis of Block Cipher Implementations](https://data.hackinn.com/ppt/RSA2019/Automated%20Fault%20Analysis%20of%20Block%20Cipher%20Implementations.pdf) #### 144、[ELECTIONS AT RISK:GLOBAL THREATS: LOCAL IMPACT](https://data.hackinn.com/ppt/RSA2019/ELECTIONS%20AT%20RISK:GLOBAL%20THREATS:%20LOCAL%20IMPACT.pdf) #### 145、[Exploit Kits, Malware ROI and the Shift in Attack Vectors](https://data.hackinn.com/ppt/RSA2019/Exploit%20Kits,%20Malware%20ROI%20and%20the%20Shift%20in%20Attack%20Vectors.pdf) #### 146、[Measuring the Rationality of Security Behavior](https://data.hackinn.com/ppt/RSA2019/Measuring%20the%20Rationality%20of%20Security%20Behavior.pdf) #### 147、[Putin is Posting:Social Media, Vodka & National Security](https://data.hackinn.com/ppt/RSA2019/Putin%20is%20Posting:Social%20Media,%20Vodka%20&%20National%20Security.pdf) #### 148、[How to Infer Actual Privacy Concern From Online Behavior](https://data.hackinn.com/ppt/RSA2019/How%20to%20Infer%20Actual%20Privacy%20Concern%20From%20Online%20Behavior.pdf) #### 149、[DHS Hackers and the Lawyers Who Advise Them](https://data.hackinn.com/ppt/RSA2019/DHS%20Hackers%20and%20the%20Lawyers%20Who%20Advise%20Them.pdf) #### 150、[DUE DILIGENCE MEETS SMALL BUSINESS:NIGHTMARES FROM THE OTHER SIDE](https://data.hackinn.com/ppt/RSA2019/DUE%20DILIGENCE%20MEETS%20SMALL%20BUSINESS:NIGHTMARES%20FROM%20THE%20OTHER%20SIDE.pdf) #### 151、[Red Team View:Gaps in the Serverless Attack Surface.](https://data.hackinn.com/ppt/RSA2019/Red%20Team%20View:Gaps%20in%20the%20Serverless%20Attack%20Surface..pdf) #### 152、[Automation vs Human Eyes:Optimizing Human Intuition for Success](https://data.hackinn.com/ppt/RSA2019/Automation%20vs%20Human%20Eyes:Optimizing%20Human%20Intuition%20for%20Success.pdf) #### 153、[Safety Systems are the New Target Design Security Using Safety Methods](https://data.hackinn.com/ppt/RSA2019/Safety%20Systems%20are%20the%20New%20Target%20Design%20Security%20Using%20Safety%20Methods.pdf) #### 154、[Security At 36,000 Feet](https://data.hackinn.com/ppt/RSA2019/Security%20At%2036,000%20Feet.pdf) #### 155、[Error Detection in Monotone Span Programs with Application to Communication-Efficient Multiparty Computation](https://data.hackinn.com/ppt/RSA2019/Error%20Detection%20in%20Monotone%20Span%20Programs%20with%20Application%20to%20Communication-Efficient%20Multiparty%20Computation.pdf) #### 156、[Folk Theories of Security & Privacy](https://data.hackinn.com/ppt/RSA2019/Folk%20Theories%20of%20Security%20&%20Privacy.pdf) #### 157、[Achieving Operational Security Excellence in Connected IoT Solutions](https://data.hackinn.com/ppt/RSA2019/Achieving%20Operational%20Security%20Excellence%20in%20Connected%20IoT%20Solutions.pdf) #### 158、[Cybersecurity and Hospital Infection Control:Overlaps and Opportunities](https://data.hackinn.com/ppt/RSA2019/Cybersecurity%20and%20Hospital%20Infection%20Control:Overlaps%20and%20Opportunities.pdf) #### 159、[What You Need to Know about the Cybersecurity Landscape and Cyber Cases](https://data.hackinn.com/ppt/RSA2019/What%20You%20Need%20to%20Know%20about%20the%20Cybersecurity%20Landscape%20and%20Cyber%20Cases.pdf) #### 160、[Getting Practical with Addressing Risks in OT Networks:Where to Start?](https://data.hackinn.com/ppt/RSA2019/Getting%20Practical%20with%20Addressing%20Risks%20in%20OT%20Networks:Where%20to%20Start%3F.pdf) #### 161、[Panel:Network. Speak. Repeat.](https://data.hackinn.com/ppt/RSA2019/Panel:Network.%20Speak.%20Repeat..pdf) #### 162、[Cutting the Wrong Wire:How a Clumsy Hacker Exposed a Global Cyberattack](https://data.hackinn.com/ppt/RSA2019/Cutting%20the%20Wrong%20Wire:How%20a%20Clumsy%20Hacker%20Exposed%20a%20Global%20Cyberattack.pdf) #### 163、[Efficient Function-Hiding Functional Encryption:From Inner-Products to Orthogonality](https://data.hackinn.com/ppt/RSA2019/Efficient%20Function-Hiding%20Functional%20Encryption:From%20Inner-Products%20to%20Orthogonality.pdf) #### 164、[Don’t Hand Me That! The Art of Incident Analysis](https://data.hackinn.com/ppt/RSA2019/Don’t%20Hand%20Me%20That!%20The%20Art%20of%20Incident%20Analysis.pdf) #### 165、[You’ve Predicted the Future, Now What? Pulling the Right Security Levers](https://data.hackinn.com/ppt/RSA2019/You’ve%20Predicted%20the%20Future,%20Now%20What%3F%20Pulling%20the%20Right%20Security%20Levers.pdf) #### 166、[Yet Another IoT Hack](https://data.hackinn.com/ppt/RSA2019/Yet%20Another%20IoT%20Hack.pdf) #### 167、[Hindsight and 2020:A Clear-Eyed Look at Shared Responsibil-I-o-T](https://data.hackinn.com/ppt/RSA2019/Hindsight%20and%202020:A%20Clear-Eyed%20Look%20at%20Shared%20Responsibil-I-o-T.pdf) #### 168、[Virtual Pen Testing Using Risk Models](https://data.hackinn.com/ppt/RSA2019/Virtual%20Pen%20Testing%20Using%20Risk%20Models.pdf) #### 169、[Automatic Search for A Variant of Division Property Using Three Subsets](https://data.hackinn.com/ppt/RSA2019/Automatic%20Search%20for%20A%20Variant%20of%20Division%20Property%20Using%20Three%20Subsets.pdf) #### 170、[Playing to Win:What Makes a Winning Abstract](https://data.hackinn.com/ppt/RSA2019/Playing%20to%20Win:What%20Makes%20a%20Winning%20Abstract.pdf) #### 171、[Profiting from Hacked IoT Devices:Coin Mining, Ransomware, Something Else?](https://data.hackinn.com/ppt/RSA2019/Profiting%20from%20Hacked%20IoT%20Devices:Coin%20Mining,%20Ransomware,%20Something%20Else%3F.pdf) #### 172、[Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling](https://data.hackinn.com/ppt/RSA2019/Poly-Logarithmic%20Side%20Channel%20Rank%20Estimation%20via%20Exponential%20Sampling.pdf) #### 173、[First Steps in RF:Lessons Learned](https://data.hackinn.com/ppt/RSA2019/First%20Steps%20in%20RF:Lessons%20Learned.pdf) #### 174、[Election Hacking:Trading Malware for Votes](https://data.hackinn.com/ppt/RSA2019/Election%20Hacking:Trading%20Malware%20for%20Votes.pdf) #### 175、[Women in Cybersecurity:Finding, Attracting and Cultivating Talent](https://data.hackinn.com/ppt/RSA2019/Women%20in%20Cybersecurity:Finding,%20Attracting%20and%20Cultivating%20Talent.pdf) #### 176、[Bitcoin Por Favor:Cybercriminal Usage of Cryptocurrency in Latin America](https://data.hackinn.com/ppt/RSA2019/Bitcoin%20Por%20Favor:Cybercriminal%20Usage%20of%20Cryptocurrency%20in%20Latin%20America.pdf) #### 177、[When the One You Trust Hurts You Most:Real-World Attack, Real-Time Response](https://data.hackinn.com/ppt/RSA2019/When%20the%20One%20You%20Trust%20Hurts%20You%20Most:Real-World%20Attack,%20Real-Time%20Response.pdf) #### 178、[Playing with Fire:How Cyber Physical Attacks Threaten Our Connected World](https://data.hackinn.com/ppt/RSA2019/Playing%20with%20Fire:How%20Cyber%20Physical%20Attacks%20Threaten%20Our%20Connected%20World.pdf) #### 179、[Post-Quantum EPID Signatures from Symmetric Primitives](https://data.hackinn.com/ppt/RSA2019/Post-Quantum%20EPID%20Signatures%20from%20Symmetric%20Primitives.pdf) #### 180、[Shadow IoT Hacking the Corporate Environment:Office as the New Smart Home](https://data.hackinn.com/ppt/RSA2019/Shadow%20IoT%20Hacking%20the%20Corporate%20Environment:Office%20as%20the%20New%20Smart%20Home.pdf) #### 181、[ATT&CK in Practice A Primer to Improve Your Cyber Defense](https://data.hackinn.com/ppt/RSA2019/ATT&CK%20in%20Practice%20A%20Primer%20to%20Improve%20Your%20Cyber%20Defense.pdf) #### 182、[Harnessing the Law of Data Gravity:Cyber Defense and the Hybrid Cloud](https://data.hackinn.com/ppt/RSA2019/Harnessing%20the%20Law%20of%20Data%20Gravity:Cyber%20Defense%20and%20the%20Hybrid%20Cloud.pdf) #### 183、[Aviation Cybersecurity:Keeping the Wings On](https://data.hackinn.com/ppt/RSA2019/Aviation%20Cybersecurity:Keeping%20the%20Wings%20On.pdf) #### 184、[The How:Recruit and Retain a Diverse Talent Pool](https://data.hackinn.com/ppt/RSA2019/The%20How:Recruit%20and%20Retain%20a%20Diverse%20Talent%20Pool.pdf) #### 185、[Threat Modeling in 2019](https://data.hackinn.com/ppt/RSA2019/Threat%20Modeling%20in%202019.pdf) #### 186、[Lost Boys:How Linux and mac Intersect in a Windows-Centric Security World](https://data.hackinn.com/ppt/RSA2019/Lost%20Boys:How%20Linux%20and%20mac%20Intersect%20in%20a%20Windows-Centric%20Security%20World.pdf) #### 187、[Better Securing the Now and the Next:Applying Engineering First Principles to Achieve Demonstrably Better Cybersecurity](https://data.hackinn.com/ppt/RSA2019/Better%20Securing%20the%20Now%20and%20the%20Next:Applying%20Engineering%20First%20Principles%20to%20Achieve%20Demonstrably%20Better%20Cybersecurity.pdf) #### 188、[Games, Apps and Devices:What Kids Are Using What and Why You Should Know](https://data.hackinn.com/ppt/RSA2019/Games,%20Apps%20and%20Devices:What%20Kids%20Are%20Using%20What%20and%20Why%20You%20Should%20Know.pdf) #### 189、[NIST Cybersecurity Framework and PCI DSS](https://data.hackinn.com/ppt/RSA2019/NIST%20Cybersecurity%20Framework%20and%20PCI%20DSS.pdf) #### 190、[Using Measurement and Reporting Drive Behavior Among Developers and Beyond](https://data.hackinn.com/ppt/RSA2019/Using%20Measurement%20and%20Reporting%20Drive%20Behavior%20Among%20Developers%20and%20Beyond.pdf) #### 191、[Security at the Speed of DevOps 2](https://data.hackinn.com/ppt/RSA2019/Security%20at%20the%20Speed%20of%20DevOps%202.pdf) #### 192、[The DevSecOps Handbook Panel](https://data.hackinn.com/ppt/RSA2019/The%20DevSecOps%20Handbook%20Panel.pdf) #### 193、[Security Data:GPS for Application Teams](https://data.hackinn.com/ppt/RSA2019/Security%20Data:GPS%20for%20Application%20Teams.pdf) #### 194、[Defending Account Takeover Attacks](https://data.hackinn.com/ppt/RSA2019/Defending%20Account%20Takeover%20Attacks.pdf) `大会官网: https://www.rsaconference.com/events/us19` > If You Have Any Questions or Concerns, Please Contact: admin$hackinn.com 标签: none