Author thumbnail

RSA Conference

RSAC 2024 Track Sessions

3,732 views
299 items
Last updated on Jun 10, 2024
public playlist
I’m an API Hacker and Here’s How I Hack Everything from the Military to AI
40:33
Going Passwordless for Employees: Secure Modern Authentication at Work
49:14
Securing AI Apps with the OWASP Top Ten for Large Language Models
48:46
How to Keep Your Cool and Write Powerful Incident Response Reports
41:17
I Screwed Up Threat Hunting a Decade Ago and Now We're Fixing it With PEAK
49:31
The Price is WRONG - An Analysis of Security Complexity
49:42
A Blueprint for Detection Engineering: Tools, Processes, and Metrics
34:20
DPAPI and DPAPI-NG: Decrypting All Users’ Secrets and PFX Passwords
52:14
You’re Doing It Wrong! Common Security Anti Patterns
50:11
The End of DevSecOps?
51:06
The Always-On Purple Team: An Automated CI/CD for Detection Engineering
49:27
The Evolution of Industrial Cyberthreats: Year in Review Report
53:01
The Art of Cyber Insurance: What's New in Coverage and Claims
49:39
IP Protection and Privacy in LLM: Leveraging Fully Homomorphic Encryption
43:41
Kubernetes Security: Attacking and Defending Modern Infrastructure
43:01
A Step-by-Step Guide to Securing Large Language Models (LLMs)
47:02
Gartner's Top Predictions for Cybersecurity 2023-2024
48:53
The Storm-0558 Attack - Inside Microsoft Identity Security's Response
46:31
Key Management 101: DEKs, KEKs, and Credentials Living Together, Oh My!
50:59
RFID: Flippers and Access Control
46:04
Building AI Security In: MLSecOps in Practice
49:50
National Security 2030: Social Media and Emerging Cyberthreats
49:25
Advancing AI Security with Insights from the World’s Largest AI Red Team
44:53
Backdoors & Breaches: Live Tabletop Exercise Demo
1:07:42
Threat Hunting with Python and Pandas
44:37
A Proven Approach on Automated Security Architectural Pattern Validation
52:01
State of the Hack 2024 - NSA’s Perspectives
48:01
Responsible AI: Adversarial Attacks on LLMs
49:51
Fight Smarter: Accelerate Your SOC with AI Discovered Attacks
49:28
Operation Cookie Monster & Genesis Market: An International Cyber Takedown
43:04
Hiding in Plain Sight: Hunting Volt Typhoon Cyber Actors
45:09
Your Cybersecurity Budget Is a Horse’s Behind
46:56
Cybersecurity for “Have Nots”
49:41
How AI Is Changing the Malware Landscape
40:44
Securing Software Supply Chain: Problems, Solutions, and AI/ML Challenges
45:00
CISOs Under Indictment: Case Studies, Lessons Learned, and What’s Next
50:19
Cloud Security Novice to Native in 10 Steps: A CNAPP Approach
40:03
The Anatomy of Cloud Attacks
49:50
What Hacking the Planet Taught Us About Defending Supply Chain Attacks
48:56
The Cybersecurity of Smart ‘Adult’ Toys, or Lack of It
34:26
Creating an AI Security and Incident Response Team
46:07
You Can't Measure Risk
50:56
Harnessing the Strengths of Neurodivergent Staff for Cybersecurity
50:15
All You Need Is Guest
49:06
Everything Everywhere All at Once: The European ID Wallet Ecosystem
48:02
2024 Edition: Cybersecurity Standards Scorecard
50:34
Secure and Privacy by Design Converge with Threat Modeling
50:01
10 Key Challenges for AI within the EU Data Protection Framework
52:47
Hacker’s Perspective on Your Infrastructure: Lessons from the Field
51:13
UEFI Bootkits and Where UEFI Security Fails
41:56
The ART of Probable: Test with AI, Atomic Red Team, and Threat Metrics
49:36
Beginner’s Guide to Bypassing Modern Authentication Methods to SSO
40:46
Costume Jewelry: How Capital One Uses Tokenization to Protect Data
43:02
My Resilient Career: How to Do More than Just Survive in Security
50:18
Geopolitics and Cyber Risk in 2024 and Beyond
49:12
Training for Incident Response: The Red, the Blue, and the Ugly
49:10
Agents of Chaos: Hacktivism Spreads Fear, Disinformation, and Propaganda
47:12
Building Your Quantum-safe Future with Crypto-agility
50:28
Connecting the Dots: Threat Intelligence, Cyber Incidents, and Materiality
46:20
How Large Language Models Are Reshaping the Cybersecurity Landscape
45:38
From Chatbot to Destroyer of Endpoints: Can ChatGPT Automate EDR Bypasses?
48:40
AI, the Software Supply Chain, and Other (Not So) Puzzling Pieces
37:08
Batloader or FakeBat? Unraveling Competing MaaS Operations
46:01
Unveiling the 2024 Data Breach Investigations Report (DBIR)
50:08
Use Generative AI to End Your Love/Hate Relationship with DLP
50:54
Autonomous Hacking Systems - Future Risk or FUD?
48:36
Building Your Roadmap to Cyber Resilience – Five Things You Can Do Today
44:31
Why Outer Space Is the Next Frontier for Cybersecurity
47:33
Building a Cloud Security Flywheel: Lessons from the Field
51:07
The State of Venture Capital in Cybersecurity
50:16
Homomorphic Encryption
46:56
Identity-Based Encryption
31:22
Achieving Quantum Readiness: A Comprehensive Approach
45:33
The One About Controls
31:40
SBOMs for Evil: From Software Supply Chain Documentation to an Attack Path
48:32
The 2024 Ransomware Threat Landscape: What's Fueling the Epidemic?
36:44
AI: Law, Policy, and Common Sense Suggestions to Stay Out of Trouble
59:32
A Walkthrough: AppSec Tool Selection, Procurement, and Implementation
43:56
Beyond the Hype: Research on How Cybercriminals Are Really Using GenAI
50:38
Flying Under the Radar - New Security Evasion Techniques
51:38
AI Governance: The Security Perspective
51:39
Enhancing Space Cybersecurity: Securing Space Systems from Cyber Threats
51:06
Establishing a Data Perimeter on AWS
38:28
Why Source Code Exfiltration Is the Biggest Blind Spot in Insider Threat
43:22
Navigating the AI Frontier: The Role of the CISO in GenAI Governance
47:43
Seatbelts for Web App (Security Headers)
51:32
Securing AI: There Is No Try, Only Do!
45:15
Smashing the Stack: Let’s Make It Less Fun And Unprofitable!
49:50
Steering Clear of Danger: Decrypting the Realities of Remote Car Hacking
50:43
Private Web Search with Tiptoe
39:30
Data-Driven Cyber Indicators of Malicious Insider Threat
48:00
All Good Things: End of Life and End of Support in Policy and Practice
51:02
Shades of Purple: Getting Started and Making Purple Teaming Possible
43:22
Life after the Breach: A Survivor's Guide
50:41
Crush Cred Stuffing: A Method for Neutralizing Credential Stuffing Attacks
36:33
Living with Chronic CFIUS: Foreign Investment Review Security Imperatives
46:52
How to Safely Deploy AI Copilots
50:33
To Patch or Not to Patch OT— A Risk Management Decision
39:08
Cloud and Platform Agnostic Security Posture Management (xSPM)
49:42
Dead Man’s PLC: Ransoming the Physical World via Operational Technology
49:45