Index of /rsaconference/usa-2012/


../
20-in-2012-The-Top-Privacy-Issues-to-Watch.pdf     03-Oct-2013 17:57              321321
3-C-Words-You-Need-to-Know-Custody-Control-Clou..> 28-Sep-2013 21:42             1350382
A-Timeline-of-Disaster.pdf                         28-Sep-2013 22:11             7377596
Adding-a-Security-Assurance-Dimension-to-Supply..> 01-Oct-2013 16:35             4105136
Advanced-Persistent-Binary-Planting.pdf            02-Oct-2013 00:12             5146005
Adversary-ROI-Why-Spend-40B-Developing-It-When-..> 02-Oct-2013 15:46            12041250
Applying-the-NFC-Secure-Element-in-Mobile-Ident..> 23-Sep-2013 15:55              988129
Attacks-2011-How-Complexity-Evaded-Defenses-and..> 28-Sep-2013 14:04            10141041
BYOD-evice-without-BYOI-nsecurity.pdf              28-Sep-2013 22:04            13486103
Base64-the-Security-Killer.pdf                     02-Oct-2013 18:06             1861645
Biometrics-and-Access-Token-Technology-10-Years..> 23-Sep-2013 15:34             2958665
Blending-Embedded-Hardware-OTP-SSO-and-Out-of-B..> 23-Sep-2013 15:52             3610832
Building-Robust-Security-Solutions-Using-Layeri..> 28-Sep-2013 21:19             1510741
Building-a-Security-Operations-Center-SOC.pdf      23-Sep-2013 16:01             3762162
CISO-View-Top-4-Major-Imperatives-for-Enterpris..> 23-Sep-2013 15:59              940516
Can-We-Reconstruct-How-Identity-is-Managed-on-t..> 23-Sep-2013 14:55             1645310
ChromeOS-vs-iCloud-a-New-Frontier-in-Security-C..> 23-Sep-2013 14:32             5628089
Cloud-and-Control-Any-Program-on-2000-or-2-Mach..> 02-Oct-2013 15:37            21041324
Code-Red-to-Zbot-10-Years-of-Tech-Researchers-a..> 01-Oct-2013 20:39             4812245
Collecting-and-Sharing-Security-Metrics-The-End..> 23-Sep-2013 14:57             3224885
Collective-Defense-How-the-Defenders-Can-Play-t..> 28-Sep-2013 21:30             3640054
Compliance-Audits-and-Fire-Drills-In-the-Way-of..> 28-Sep-2013 21:22             1281421
Convergence-of-BCM-and-Information-Security-at-..> 01-Oct-2013 20:50             2274955
Corporate-Espionage-for-Dummies-The-Hidden-Thre..> 02-Oct-2013 00:31             3316303
Cracking-Open-the-Phone-An-Android-Malware-Auto..> 01-Oct-2013 16:50              917318
Critical-Infrastructure-The-IPv6-Transition-Cha..> 23-Sep-2013 16:00             1705518
Crowdsourcing-Access-Control-in-the-Cloud.pdf      02-Oct-2013 15:54              904853
Cryptographic-Protocols-1.pdf                      02-Oct-2013 16:06             2286600
Cryptographic-Protocols-2.pdf                      02-Oct-2013 17:04              589888
Cyber-War-You-are-Doing-it-Wrong.pdf               28-Sep-2013 14:02              186232
Data-Breaches-and-Web-Servers-The-Giant-Sucking..> 02-Oct-2013 15:55              844050
Data-Loss-Prevention-The-Evolving-Landscape-of-..> 02-Oct-2013 16:02             1571100
Defending-Behind-the-Device-Mobile-Application-..> 02-Oct-2013 00:01             1789224
Deploying-IPv6-Securely.pdf                        23-Sep-2013 15:36              790525
Digital-Signatures-1.pdf                           03-Oct-2013 01:34             1388880
Digital-Signatures-2.pdf                           02-Oct-2013 15:57             1588796
Does-Defining-Privacy-Matter.pdf                   28-Sep-2013 21:39              998411
Dormant-Malware-Attacks-What-is-Next.pdf           23-Sep-2013 14:37             5899956
Earth-vs-the-Giant-Spider-Amazingly-True-Storie..> 28-Sep-2013 21:58             4849121
Engineering-Smart-Grid-Security.pdf                02-Oct-2013 15:52             2281156
Enteprise-Access-Control-Patterns-for-REST-and-..> 23-Sep-2013 15:53              831264
Estimating-the-Likelihood-of-Cyber-Attacks-When..> 01-Oct-2013 23:53              634028
Evil-Through-the-Lens-of-Web-Logs.pdf              01-Oct-2013 23:06              913613
Exploiting-a-PCI-Compliant-Network-A-How-To-Gui..> 02-Oct-2013 15:50             1330951
Exploring-Converged-Access-of-IT-Security-and-B..> 23-Sep-2013 14:46             1686841
Firewall-Fail-Live-Next-Gen-Firewall-Testing-to..> 23-Sep-2013 14:42             1252454
Fraud-and-Data-Exfiltration-Defending-Against-t..> 28-Sep-2013 21:35              575338
Friending-Your-Life-Away-How-Social-Networks-Ca..> 02-Oct-2013 15:41             3350655
From-Technology-to-Psychology-Understanding-the..> 01-Oct-2013 16:56             1313402
From-the-Bottom-to-the-Top-The-Evolution-of-App..> 23-Sep-2013 14:40             2343194
Garage-Sale-Forensics-Data-Discovery-Through-Di..> 02-Oct-2013 18:59            13878324
Getting-Your-Session-Proposal-Accepted.pdf         03-Oct-2013 17:42             8294966
Grilling-Cloudicorns-Mythical-Cloudsec-Tech-You..> 02-Oct-2013 15:43            22224760
Hacking-Exposed-Embedded-The-Dark-World-of-Tiny..> 03-Oct-2013 17:38              721196
Hacking-Exposed-Mobile-RAT-Edition.pdf             03-Oct-2013 02:08            17915811
Hacking-Gilded-Age-How-APIs-Will-Increase-Risk-..> 03-Oct-2013 01:42             2996031
Hacks-Flacks-And-Attacks-Collaborating-on-Commu..> 02-Oct-2013 19:08             8215215
How-Can-a-CIO-Secure-a-Moving-Target-with-Limit..> 28-Sep-2013 21:18             3191853
How-to-Create-a-Software-Security-Practice.pdf     03-Oct-2013 01:40             1697774
How-to-Launch-a-Secure-Cloud-Initiative-NASA-Je..> 03-Oct-2013 01:59             5303427
Human-Hacking-Exposed-6-Preventative-Tips-That-..> 01-Oct-2013 23:12             5024585
ISC2-SSO-Program-Bringing-Cybersecurity-Experts..> 03-Oct-2013 02:05             2616552
Identifying-and-Exploiting-Cryptographic-Paddin..> 03-Oct-2013 17:39             2544607
Information-Protection-in-Today-Changing-Mobile..> 23-Sep-2013 14:54             4623155
Invited-Talk-1.pdf                                 02-Oct-2013 18:03              984912
Invited-Talk-2.pdf                                 03-Oct-2013 17:41              463253
Is-Your-Mobile-Device-Radiating-Keys.pdf           28-Sep-2013 21:46             1630600
Job-Performance-Model-for-Advanced-Threat-Respo..> 02-Oct-2013 16:07              361518
Large-Scale-Cloud-Forensics.pdf                    28-Sep-2013 13:59             3286637
Legal-Ethical-Considerations-of-Offensive-Cyber..> 23-Sep-2013 16:03             6541279
Lightning-Round-Data-Confidentiality-and-Integr..> 02-Oct-2013 16:10             1454555
Lightning-Round-Mobile-Infrastructure-Security-..> 28-Sep-2013 22:09             9854530
Lightning-Round-SAP-Application-Security.pdf       28-Sep-2013 22:28              851211
Lightning-Round-Security-Risk-Management-Insura..> 01-Oct-2013 16:32             2552938
Live-Forensics-of-a-Malware-Infection.pdf          02-Oct-2013 00:14             2434122
Looking-Ahead-The-Path-to-Moving-Security-into-..> 23-Sep-2013 14:50              667724
Making-World-Class-Cloud-Security-the-Rule-not-..> 28-Sep-2013 21:27             1795188
Message-in-a-Bottle-Finding-Hope-in-a-Sea-of-Se..> 02-Oct-2013 19:09             2565426
Modern-Cyber-Gangs-Well-Organized-Well-Protecte..> 02-Oct-2013 00:28             3316303
Modern-Cyberthreats-The-Changing-Face-Behind-th..> 01-Oct-2013 23:50             5157013
NSA-Secure-Mobility-Strategy.pdf                   28-Sep-2013 21:45             1009921
Never-Waste-a-Crisis-Necessity-Drives-Software-..> 03-Oct-2013 02:03             3678099
Offensive-Countermeasures-Making-Attackers-Live..> 28-Sep-2013 21:25            13089610
Optimizing-Security-for-Situational-Awareness.pdf  23-Sep-2013 14:49             2826709
PCI-Security-as-a-Lifecycle-How-to-Plan-for-PCI..> 01-Oct-2013 20:28            11981902
PenTesting-People-Social-Engineering-Integratio..> 01-Oct-2013 16:43              524973
Privacy-by-Design-Baking-Privacy-into-Business-..> 02-Oct-2013 16:05             3820424
Public-Key-Encryption-1.pdf                        02-Oct-2013 15:53             1623165
Public-Key-Encryption-2.pdf                        02-Oct-2013 18:57             1868318
README.txt                                         13-Feb-2015 13:07                  80
Remediation-Statistics-What-Does-Fixing-Applica..> 03-Oct-2013 01:45             1443392
SSL-Identifiers-Keeping-Your-Lines-of-Communica..> 23-Sep-2013 14:35              972308
SSL-and-Browsers-The-Pillars-of-Broken-Security..> 28-Sep-2013 21:26             6353496
SSL-and-the-Future-of-Authenticity.pdf             28-Sep-2013 21:47             7030195
Secure-Implementation-Methods.pdf                  02-Oct-2013 15:56             1031990
Secure-Multiparty-Computation.pdf                  03-Oct-2013 01:51             2466502
Security-2012-A-Handbook-for-Cyber-Security.pdf    28-Sep-2013 21:29             1871242
Security-Enters-the-Boardroom-How-Does-Security..> 23-Sep-2013 14:47             2878554
Security-is-Dead-Long-Live-Rugged-DevOps-IT-at-..> 02-Oct-2013 16:03             2660627
Side-Channel-Attacks-1.pdf                         02-Oct-2013 19:06             1439225
Side-Channel-Attacks-2.pdf                         03-Oct-2013 02:01             5839872
Side-Channel-Attacks-3.pdf                         03-Oct-2013 01:37             2479957
Social-Media-in-Marketing-and-the-Workplace-Leg..> 28-Sep-2013 21:43              390665
Software-Security-Goes-Mobile.pdf                  03-Oct-2013 01:28             6843082
Stop-the-Maelstrom-Using-Endpoint-Sensor-Data-i..> 23-Sep-2013 14:56              938264
Strategies-for-the-Eroding-Network-Perimeter-De..> 28-Sep-2013 21:23             1132250
Surviving-Lulz-Behind-the-Scenes-of-LulzSec.pdf    02-Oct-2013 15:40            18633121
Symmetric-Key-Primitives.pdf                       03-Oct-2013 01:47             1503201
Taking-Information-Security-Risk-Management-Bey..> 01-Oct-2013 16:29             4027513
Taking-to-the-Skies-IT-Flight-Plan-for-Cloud-Se..> 02-Oct-2013 15:48              665236
Terrorist-Groups-in-the-Online-World.pdf           02-Oct-2013 00:43             8694259
The-Art-of-Breaking-and-Designing-CAPTCHAS.pdf     02-Oct-2013 00:05             9355441
The-CERT-Top-10-List-for-Winning-the-Battle-Aga..> 28-Sep-2013 21:20             4921706
The-Faces-of-Fraud-An-Inside-Look-at-the-Frauds..> 01-Oct-2013 16:45             1202841
The-First-24-Responding-to-an-Attack-within-the..> 02-Oct-2013 19:03            23336907
The-Hidden-Risks-Managing-Risks-in-Outsourcing-..> 01-Oct-2013 23:15             3397607
The-Keys-to-the-Cloud-How-Aetna-Addresses-Certi..> 23-Sep-2013 14:59             1675124
The-Psychology-of-a-Cyber-Predator-Decoding-the..> 01-Oct-2013 16:27              701150
The-Security-Professional-as-Data-Steward-Under..> 03-Oct-2013 17:40             1450786
The-Social-Web-Business-vs-Security-How-to-Be-a..> 23-Sep-2013 15:08            13627664
The-Vendor-Management-Challenge-Doing-More-with..> 01-Oct-2013 23:08             1358390
The-Virtualization-Security-Landscape-What-is-C..> 28-Sep-2013 21:51             1258450
Three-Ways-to-Lose-Data-and-One-Way-to-Stop-It.pdf 03-Oct-2013 01:48             6118849
Update-Your-Software-or-Die.pdf                    28-Sep-2013 21:23             8478816
Updating-the-Law-on-Government-Access-to-User-D..> 28-Sep-2013 21:50             3635885
Victimless-Malware-How-Blackhats-Make-a-Killing..> 01-Oct-2013 16:51             1396204
What-Happens-in-Vegas-Goes-on-YouTube-Using-Soc..> 23-Sep-2013 15:58             5157720
When-the-Cloud-Goes-Bust-Data-Breaches-in-the-C..> 02-Oct-2013 16:08             2251661
Why-is-Search-Engine-Poisoning-Still-the-1st-We..> 01-Oct-2013 16:47             3973811
Zero-Day-A-Non-Fiction-View.pdf                    02-Oct-2013 15:44             3095684
iOS-Security-Internals.pdf                         28-Sep-2013 21:55             7699904