Index of /rsaconference/usa-2013/


../
20-in-2013-The-Top-Privacy-Issues-to-Watch.pdf     29-May-2013 00:30             3993142
2012-The-Year-of-Geolocation-Privacy-Where-are-..> 31-May-2013 00:52             2708657
25-Years-of-Vulnerabilities-1988-2012.pdf          30-May-2013 23:01             2290328
7-Highly-Effective-Habits-of-a-Security-Awarene..> 29-May-2013 00:36             1961215
Actionable-Intelligence-for-the-Enterprise.pdf     29-May-2013 18:28             2753480
Adapting-OAuth-to-the-Enterprise.pdf               31-May-2013 00:43             1883129
Administration-Cyber-Security-Priorities-for-Fe..> 31-May-2013 00:38              700092
Advanced-Malware-Sinkholing.pdf                    30-May-2013 22:54              742569
Advancing-Information-Risk-Practices-Seminar.pdf   28-May-2013 20:43             4898144
Advancing-the-SOC-Agile-Intelligent-and-Context..> 22-May-2013 15:51               73115
Analytic-of-China-Cyber-Warfare.pdf                29-May-2013 15:30              416757
Application-Security-Everywhere-Getting-Over-th..> 29-May-2013 16:03             5342996
Application-Security-One-Size-Does-not-Fit-All.pdf 29-May-2013 17:29              934831
Application-Security-Response-When-Hackers-Come..> 29-May-2013 15:44             1668134
Are-the-20-Critical-Controls-a-New-Standard-of-..> 29-May-2013 00:47              122416
Artificial-Intelligence-The-Myth-Surrounding-Pe..> 29-May-2013 00:58              174987
Automating-the-20-Critical-Controls.pdf            22-May-2013 17:19             3788059
Banking-Fraud-Where-is-the-Liability-With-the-C..> 29-May-2013 18:30              596768
Best-Practices-for-Surviving-and-Thriving-throu..> 29-May-2013 15:02             1888124
Big-Brother-Greek-Tragedy-State-Deployed-Malwar..> 29-May-2013 15:23              130791
Big-Data-Calls-for-Big-Security.pdf                31-May-2013 00:35              869419
Big-Data-and-Security-At-the-Edge-of-Prediction..> 28-May-2013 21:13             2298467
Building-Your-Own-Central-Intelligence-System-i..> 31-May-2013 00:47             2499967
Can-You-Trust-Your-Mobile-Applications.pdf         29-May-2013 17:04             1450366
Certification-of-Products-or-Accreditation-of-O..> 29-May-2013 01:12             1046459
Chopping-Up-the-Cloud-How-Patchwork-Data-Rules-..> 29-May-2013 01:16             2007475
Combating-Next-Generation-Cyber-Crimes-An-ROI-P..> 22-May-2013 15:38              402140
Computer-Crime-Law-Recent-Developments.pdf         31-May-2013 00:53             1873513
Control-Quotient-Adaptive-Strategies-for-Gracef..> 30-May-2013 23:00             5389149
Controlling-Trust-and-Risk-Lessons-Learned-at-B..> 30-May-2013 22:36             3190420
Corporate-Espionage-Via-Mobile-Compromise.pdf      30-May-2013 22:58             2628428
Cracking-Cyber-Stress-How-to-Stay-Healthy-at-Wo..> 29-May-2013 18:19              433386
Cryptographic-Protocols-1.pdf                      29-May-2013 16:45              717676
Cryptographic-Protocols-2.pdf                      29-May-2013 23:15             1776659
Customers-Criminals-Use-Web-Session-Intelligenc..> 29-May-2013 16:40             3431893
Cyber-Attacks-The-Call-for-Retaliation-and-the-..> 29-May-2013 23:12              747524
Cyberpunk-Hacker-Culture-From-Fiction-to-Realit..> 29-May-2013 01:20             5166512
Cybersecurity-SLAs-Managing-Requirements-at-Arm..> 31-May-2013 00:41              523338
Data-Analysis-and-Visualization-for-Security-Pr..> 29-May-2013 00:49            13110529
Data-Breach-Intelligence-Does-History-Always-Re..> 31-May-2013 00:44             1089362
Data-Breach-Law-Update-Global-Trends-Legal-Comp..> 29-May-2013 17:03              817221
Deployment-Strategies-for-Effective-Encryption.pdf 29-May-2013 18:15              590301
Detecting-the-One-Percent-Advanced-Targeted-Mal..> 22-May-2013 17:35             3026287
Did-Anyone-Get-the-Name-of-that-Hacker-Who-PWNE..> 31-May-2013 00:59            12024270
Digital-Signatures.pdf                             29-May-2013 15:57             4333559
Do-We-Have-the-Authority-Legal-Issues-in-Protec..> 29-May-2013 15:51              843041
Do-Your-Business-Partners-Web-Sites-Put-You-at-..> 31-May-2013 00:54              675786
Doxing-and-Anti-Doxing-Information-Recon-for-th..> 22-May-2013 17:24              916365
ENCORE-Studio-When-State-Actors-and-Cybercrimin..> 29-May-2013 18:20             1501598
Everything-You-Wanted-to-Know-About-Cyber-Insur..> 29-May-2013 18:28              864059
Evolving-Security-of-Electronic-Patient-Data.pdf   29-May-2013 15:03              690954
Exploding-the-Phone-The-Story-of-the-Teenagers-..> 29-May-2013 15:43              606703
Extreme-Cyber-Scenario-Planning-Fault-Tree-Anal..> 29-May-2013 00:26             2121089
FPKIMA-The-Dial-Tone-for-FPKI.pdf                  30-May-2013 17:05             3878986
Foolish-Zebras-Log-tracking-Your-Riskiest-Users..> 31-May-2013 00:50             2057751
From-Hours-to-Seconds-Managing-Security-in-Real..> 29-May-2013 16:58             4075509
Hacking-Exposed-Embedded.pdf                       29-May-2013 16:29             2477750
Hot-Topics-in-Information-Security-Law-2013.pdf    29-May-2013 00:31              799345
How-the-Constitution-Protects-your-Cell-Phone-a..> 31-May-2013 00:40             1873448
How-to-Get-the-Budget-and-Resources-Needed-for-..> 29-May-2013 14:58              433386
Hunting-for-Indicators-of-Compromise.pdf           29-May-2013 15:01             1035618
I-Mr-Techie-Got-the-CISO-Job-Should-I-Prepare-3..> 31-May-2013 00:54              925017
Identity-Based-Encryption.pdf                      31-May-2013 00:34             3782808
Implicit-Risk-Management-When-is-Good-Enough-Su..> 29-May-2013 18:14             1208656
Incident-Scene-Authorization-using-a-Mobile-Han..> 31-May-2013 00:46             4150721
Indian-Airlines-Flight-814-Hijack-Mission-Faile..> 31-May-2013 00:39             1071967
Information-Security-Leadership-Development-Sur..> 28-May-2013 20:06             5101520
Infosec-Intelligence-and-Regulatory-Filings-Has..> 30-May-2013 22:38             2472470
Integrating-OpenStack-Keystone-Service-with-an-..> 31-May-2013 01:04             1519776
Invited-Talk-1.pdf                                 29-May-2013 00:33             2405186
Invited-Talk-2.pdf                                 29-May-2013 01:10              641495
Is-Your-Design-Leaking-Keys-Efficient-Testing-f..> 30-May-2013 22:49              898352
Is-a-Privacy-Compliant-Public-Cloud-Solution-an..> 30-May-2013 22:53              503528
It-Takes-a-Village-CSR-Programs-For-the-Next-Ge..> 30-May-2013 22:58              754579
Just-In-Time-Security-Difficulty-of-Being-Proac..> 30-May-2013 00:07              232396
Less-is-More-PCI-DSS-Scoping-Demystified.pdf       29-May-2013 00:59             1424351
Life-as-a-Target.pdf                               31-May-2013 00:43              178621
Living-Below-the-Security-Poverty-Line-Coping-M..> 30-May-2013 22:57              939337
Locking-Down-the-Cloud-Security-is-not-a-Myth.pdf  30-May-2013 22:39             1443842
Making-the-Cloud-a-Secure-Extension-of-Your-Dat..> 29-May-2013 17:27             6295275
Managing-Daily-Security-Operations-with-Lean-an..> 29-May-2013 16:48             2046230
Managing-Enterprise-Risk-Y-U-NO-HAZ-METRICS.pdf    29-May-2013 16:54             1346346
Managing-Risk-When-Everything-is-Changing.pdf      31-May-2013 00:49             2621337
Managing-Security-Risk-The-CSO-Panel.pdf           29-May-2013 17:19             1118451
Managing-Trust-and-Risk-at-CME-Group-and-Blue-S..> 29-May-2013 16:03             3531329
Mega-Trends-in-Information-Risk-Management-for-..> 29-May-2013 00:54              570498
Microsoft-Security-Intelligence-Report.pdf         30-May-2013 00:08             2479988
Mitigating-the-Top-Human-Risks.pdf                 29-May-2013 17:28             3471599
NSA-Suite-B-Crypto-Keys-and-Side-Channel-Attack..> 29-May-2013 16:49             2243975
NSTIC-Report-Path-from-Cyber-Identity-Puzzle-to..> 29-May-2013 16:31             1727895
New-German-BYOD-Security-and-Infrastructure-Sol..> 29-May-2013 16:33             4260271
New-Ways-of-Mitigating-Botnets.pdf                 29-May-2013 23:13             3728044
Next-Generation-Threat-Protection-to-Counter-Ad..> 29-May-2013 18:21             1888124
OASIS-Privacy-Management-Reference-Model-PMRM.pdf  30-May-2013 22:47             1003065
Offensive-Security-Hope-or-Hype.pdf                29-May-2013 17:25              329481
Patching-Stupidity.pdf                             22-May-2013 17:30             3604404
Privacy-Compliance-and-Oversight-in-the-Nationa..> 29-May-2013 23:10              578837
Privacy-is-Not-Dead-You-Just-Need-to-Try-Harder..> 30-May-2013 22:55             1864658
Psychographics-of-the-CISO.pdf                     29-May-2013 01:06             1295412
Public-Key-Encryption-1.pdf                        29-May-2013 16:02             8600523
Public-Key-Encryption-2.pdf                        30-May-2013 22:35             3489467
Public-Sector-Identity-The-Evolution-of-an-Idea..> 30-May-2013 22:50             1015188
Public-vs-Private-Sector-Funding-a-Successful-S..> 30-May-2013 22:52             1856505
README.txt                                         12-Feb-2015 15:26                  76
Real-Time-Forensics-Finding-the-Culprit-While-t..> 29-May-2013 01:14              617511
Riot-Control-The-Art-of-Managing-Risk-and-the-I..> 31-May-2013 01:02              824884
Risk-Management-How-to-Put-Theory-into-Practice..> 29-May-2013 01:05              290560
Roadmap-Toward-a-More-Secure-and-Resilient-Cybe..> 30-May-2013 00:06              576327
Rugged-Identity-Management-Avoiding-Single-Poin..> 30-May-2013 22:40             2184066
SAST-DAST-and-Vulnerability-Assessments-1+1+1=4..> 29-May-2013 17:27             1229965
Secure-Implementation-Methods.pdf                  29-May-2013 17:26             1652436
Security-Culture-Figuring-Out-How-Bad-Your-Comp..> 29-May-2013 17:21             3170988
Security-Leadership-Your-Secret-Weapon.pdf         28-May-2013 20:53             3801075
Security-Looking-Forward-Protecting-Critical-Ap..> 31-May-2013 00:49             2212451
Sharing-Indicators-of-Compromise-An-Overview-of..> 29-May-2013 17:20              424611
Side-Channel-Attacks-1.pdf                         29-May-2013 15:50             2876362
Side-Channel-Attacks-2.pdf                         29-May-2013 15:32             2722625
Social-Media-in-Marketing-and-the-Workplace-Leg..> 22-May-2013 17:39             4135408
SocialKlepto-Corporate-Espionage-with-Fake-Soci..> 29-May-2013 18:27             7608111
Solving-the-Cyber-Security-Hiring-Crisis-Hiring..> 29-May-2013 17:00             5425337
Special-Operations-Tactics-Applied-to-BYOD-Defe..> 30-May-2013 22:42             1247321
Standards-Based-Secure-Single-Sign-On-for-Nativ..> 31-May-2013 00:51              581656
Stateless-Architecture-for-Smaller-IT-and-Risk-..> 30-May-2013 22:48             1660605
Stay-Relevant-Move-Security-From-the-Back-Offic..> 29-May-2013 23:12             1399121
Studio-20-in-2013-The-Top-Privacy-Issues-to-Wat..> 29-May-2013 15:28             1732091
Studio-Application-Security-Response-When-Hacke..> 29-May-2013 16:15             1294247
Studio-Extreme-Cyber-Scenario-Planning-Fault-Tr..> 29-May-2013 16:35             5050270
Studio-Nation-State-Attacks-on-PKI.pdf             29-May-2013 17:30              769553
Studio-The-Cyber-Threat-Landscape-New-Themes-in..> 29-May-2013 01:07             1856818
Studio-The-Five-Habits-of-Highly-Secure-Organiz..> 30-May-2013 22:51             1170342
Studio-Trickle-Down-Cyber-Warfare.pdf              29-May-2013 15:53              587712
Studio-Who-What-Where-and-How-Five-Big-Question..> 30-May-2013 22:33             1192330
Symmetric-Key-Primitives-1.pdf                     29-May-2013 15:22             8446058
Symmetric-Key-Primitives-2.pdf                     31-May-2013 00:51             2269009
The-Art-of-Partnership-Global-Security-Org-Meet..> 30-May-2013 17:08              989511
The-Call-for-a-Comprehensive-Privacy-Program.pdf   30-May-2013 23:03             1502384
The-Cyber-Security-Industry-Survival-in-the-Age..> 22-May-2013 17:13              504025
The-Cyber-Threat-Landscape-New-Themes-in-Preven..> 29-May-2013 15:45             3174418
The-First-48-The-Early-Hours-of-Incident-Respon..> 29-May-2013 17:01             5664965
The-Five-Most-Dangerous-New-Attack-Techniques-a..> 29-May-2013 16:51             4568544
The-Future-of-Mass-Mobile-Threats-Coming-to-a-P..> 29-May-2013 16:53             3131861
The-Internet-Health-Model-for-Cyber-Security.pdf   29-May-2013 15:52             1513586
The-Probability-of-Exploit-Predictive-Analytics..> 29-May-2013 01:01             3348827
The-Real-Economics-of-Cybercrime.pdf               29-May-2013 16:59             1168891
The-Secret-to-Effective-Cyber-Threat-Intelligen..> 29-May-2013 15:25             2913987
The-Security-Plateau-Effect.pdf                    22-May-2013 15:20             2071162
The-Threat-Horizon-The-2013-Global-Information-..> 28-May-2013 20:41             1748888
The-Top-Ten-Things-I-Wish-Static-Analysis-Tools..> 30-May-2013 17:01             1241308
Thin-Slicing-a-Black-Swan.pdf                      30-May-2013 23:01             1000942
To-the-Cloud-Software-Security-Evolution-at-Ado..> 29-May-2013 18:29              789130
Tracking-Employees-via-Mobile-Devices-Legal-or-..> 29-May-2013 01:08              607902
Trojan-Horse-The-Widespread-Use-of-Internationa..> 30-May-2013 22:31             3010520
Trust-Frameworks-Alternative-Approaches-to-Achi..> 30-May-2013 23:02             1851264
Updating-the-Rules-for-Government-Access-to-You..> 29-May-2013 01:17             2459859
Using-HTML5-WebSockets-Securely.pdf                30-May-2013 22:59             1737041
Waiter-There-is-a-Fly-in-My-Code.pdf               31-May-2013 01:05             1796149
What-Me-Worry-I-have-Already-Been-Hacked-Have-n..> 31-May-2013 00:55              672883
When-I-Need-You-to-Know-Who-I-Am.pdf               30-May-2013 22:52             1865100
Who-What-Where-and-How-Five-Big-Questions-in-Mo..> 29-May-2013 15:27             1428087
Why-Companies-Fail-with-Compliance-Initiatives.pdf 29-May-2013 17:06             6982398
Why-Have-not-We-Stamped-Out-SQL-Injection-and-X..> 31-May-2013 00:45             1587382
Why-the-Scarecrow-of-Oz-Had-It-Right.pdf           29-May-2013 00:14             2298467
Will-They-EVER-Get-Security.pdf                    28-May-2013 20:45             2347074
Winchester-House-Security-Why-Enterprise-Securi..> 31-May-2013 01:03             1127521
Windows-8-Security-The-Unsung-Hero.pdf             22-May-2013 15:23             5467926
Writing-Applications-that-are-Easier-to-Defend-..> 29-May-2013 00:21             3773993
Your-Honor-it-Was-Self-Defense-a-Mock-Trial.pdf    29-May-2013 16:28             3224179
Your-Honor-it-Was-Self-Defense-a-Panel-Discussi..> 29-May-2013 16:52             2834688
libinjection-New-Directions-in-SQLi-Detection.pdf  29-May-2013 01:13             2358138