RSA Conference Connect December 15

Webcast: Using Claims to Simplify and Secure User Access to Applications and Services

Kim Cameron, Distinguised Engineer and Chief Architect of Identity in the Connected Systems Division at Microsoft, updates his highly rated session from RSA Conference 2009.

http://bit.ly/6ehpaR

RSA Conference 2010: Final Discount Registration Deadline is January 30th

http://bit.ly/5nrBHA

**PODCASTS AND BLOGS**

Hugh Thompson continues his reviews of RSA Conference 2010 track sessions and this time takes a look at the Data Security track.

http://bit.ly/4SpYjc

Ben Rothke (Security Reading Room) blogs about the best “Information Security” book ever as “Security Engineering: A Guide to Building Dependable Distributed Systems” by Ross Anderson.

http://bit.ly/7frYzl

Ira Winkler (Spy Files) discusses a recent phishing message he received and while, of course, it is a scam he says users need to smarten up.

http://bit.ly/7a9nmn

Tim Mather (Experienced Security) focuses on vendor year-end information security reports and how they are used as a marketing tool.

http://bit.ly/7JbH3d

Steven Wu, Esq. (eDiscovery, Digital Evidence and Cybersecurity Law) looks at legal cases involving eDiscovery disputes where one party asks the other to turn over electronically stored information (ESI) in native file format, and the other party wants to turn over ESI in a different format. He concludes that despite the rules’ lack of clarity, the wishes of the requesting party for native files will trump the producing party’s refusal to provide native files in federal court.

http://bit.ly/5eUv4M

Steven also focuses on technologies that allow people to use ”lifelogging” devices to capture daily events. The information from these devices may then be used in legal court proceedings.

http://bit.ly/6ti3d0

Evan Wheeler (Take a Byte Out of CyberCrime) shows organizations how to determine their forensic readiness by creating a prioritized action plan that focuses on likely incidents for their industry and with controls relative to the size of the organization.

http://bit.ly/8U8p9l

Gib Sorebo (Critical Instructure) is looking forward to Deviant Ollam and Babak Javadi’s session entitled “Why Your Locks are Weak… And Why That’s Not as Bad as You Think.”

http://bit.ly/58s0Vb

**IN THE NEWS**

Strong Authentication Not Strong Enough
Gartner warns that cyber criminals have had success defeating two-factor authentication systems in Web browsing sessions using Trojan-based man-in-the-middle attacks.

http://bit.ly/8ipVYM

The Future of the Information Security Profession
Information Security as a profession is amidst an evolution. From a traditional, technology-oriented role safeguarding critical information assets, the career is progressing toward integration with the strategic thinking of organizations.

http://bit.ly/5innam

Top 15 Most Common Security Attacks
The latest in the Data Breach Investigations Report series by Verizon Business security experts provide a look at the 15 most common security attacks and how they typically unfold.

http://bit.ly/7Hmp4O

Forecast for 2010: The Coming Cloud ‘Catastrophe’
Cloud computing enthusiasts be warned. Next year, computing services handled remotely and delivered via the Internet may undergo some kind of "catastrophe" that alerts companies and consumers to the risks of relying on the so-called cloud.

http://bit.ly/7qhC7y

**WHAT’S NEW AT RSA CONFERENCE**

Learn about Innovation Sandbox at RSA Conference 2010 – submit your company or register to participate.

http://bit.ly/5T9DRr

CPE Credit information for RSA Conference 2010

http://bit.ly/5LN0tn

Announcing the very first RSA Conference Pecha Kucha (PK) event!

http://bit.ly/8H4GHr

Tek-Tips

,

No comments yet.

Leave a Reply


*