×
您的位置:
RSA 2024:the Art of Possible会议

RSA 2024:the Art of Possible会议(共281套打包)

  • 文件数量:281套
  • 合集大小:1 GB
  • 更新时间:2024-06-17 00:06
  • 下载方式:浏览器/迅雷下载
  • 合集人气:166

RSA 2024:the Art of Possible会议的相关介绍

    5月6日至9日,2024年RSA大会在旧金山盛大召开。本届大会以“可能的艺术”(the Art of Possible)为核心主题,鼓励我们为曾被认为不可能实现的梦想而奋斗——通过突破性的创新来彻底改变技术,同时加强防御,应对不断变化的威胁形势。

    大会聚焦的关键议题涵盖了量化网络风险、运营技术保护、超越技术层面的协作与社区建设,以及创新和学习机会等多个维度,其中“人工智能的双刃剑”议题尤为引人注目,它强调了AI在改变网络安全格局的同时,也带来了潜在的风险。


合集包含281个文档:
2024_USA24_LAB2 W01_01:Materiality Matters(27页).pdf 2024-06-21
2024_USA24_LAW T01_01:Pitfall or Opportunity GenAI Legal Case Studies Revealing Practical Advice(23页).pdf 2024-06-21
2024_USA24_PNG2-T02_01_Translating-National-Security-Excellence-into-Private-Sector-Vigilance_17144_1714430339629001Hjjq(9页).pdf 2024-06-21
2024_USA24_HT M05_01:Leveraging MacOS Networking Frameworks to Heuristically Detect Malware(60页).pdf 2024-06-21
2024_USA24_SIR T10_02_Threat Handlers Checklist(5页).pdf 2024-06-21
2024_USA24_IAIS M05_01:Building AI Security In MLSecOps in Practice(36页).pdf 2024-06-21
2024_USA24_BR T10_01:Private Web Search With Tiptoe(38页).pdf 2024-06-21
2024_USA24_SIR M01_01:Creating an AI Security and Incident Response Team(24页).pdf 2024-06-21
2024_USA24_FRP W08_01:AI at the Gates Combating AI Driven Assaults on the Customer Experience(27页).pdf 2024-06-21
2024_USA24_SAT M03_01:The Price Is Wrong Analysis of Security Complexity(60页).pdf 2024-06-21
2024_USA24_CID-R01_01_Dead-Man's-PLC-Ransoming-the-Physical-World-Via-Operational-Technology(70页).pdf 2024-06-21
2024_USA24_CID M06_01:Hiding In Plain Sight Hunting Volt Typhoon Cyber Actors(14页).pdf 2024-06-21
2024_USA24_NIS M01_01:Security Challenges in Direct Threat Environments(5页).pdf 2024-06-21
2024_USA24_DAS W01_01:SBOMs for Evil(29页).pdf 2024-06-21
2024_USA24_SAT T02_01:Anatomy of a Vulnerability Response A View from the Inside(30页).pdf 2024-06-21
2024_USA24_DAS M03_01:Securing AI Apps with the OWASP Top 10 for Large Language Models(42页).pdf 2024-06-21
2024_USA24_PART4 W02_01:AI equipped Threat Actors Versus AI enhanced Cyber Tools Who Wins(25页).pdf 2024-06-21
2024_USA24_GRC M03_01:Building Your Roadmap to Cyber Resilience(48页).pdf 2024-06-21
2024_USA24_LAB3 W08_01:Guardians of Trust(73页).pdf 2024-06-21
2024_USA24_CLS R01_01:Avoiding Common Design and Security Mistakes in Cloud AI ML Environment(32页).pdf 2024-06-21
2024_USA24_NIS T10_01:Data Backup and Recovery An Unexplored Corner of Zero Trust(26页).pdf 2024-06-21
2024_USA24_HTA W08_01 From Chatbot to Destroyer of Endpoints Can ChatGPT Automate EDR Bypasses(46页).pdf 2024-06-21
2024_USA24_PART4 T09_01:AI in Cyber Is the Cyber Profession Ready for Its Impact(45页).pdf 2024-06-21
2024_USA24_LAW M06_01:Regulation on the Horizon What You Wish Your Lawyer Had Told You About(12页).pdf 2024-06-21
2024_USA24_ANI R03_01:Connecting the Dots Threat Intelligence Cyber Incidents and Materiality(42页).pdf 2024-06-21
2024_USA24_PART1 W02_01:Innovate Now Secure Later Decisions Decisions(22页).pdf 2024-06-21
2024_USA24_ANI M01_01:I Screwed Up Threat Hunting a Decade Ago and Now We're Fixing it With PEAK(15页).pdf 2024-06-21
2024_USA24_ANI M03_01:Agents of Chaos Hacktivism Spreads Fear Disinformation and Propaganda(37页).pdf 2024-06-21
2024_USA24_PART4 T02_01:Global Threat Overview(21页).pdf 2024-06-21
2024_USA24_IAIS W02_01:Phishing LLMs Reeling in the Machine(25页).pdf 2024-06-21
2024_USA24_HT R01_01:Autonomous Hacking Systems Future Risk or FUD(37页).pdf 2024-06-21
2024_USA24_HT R06_01:EXPOSURE The 5th Annual RSAC SOC Report(37页).pdf 2024-06-21
2024_USA24_HT T02_01:Crush Cred Stuffing A Method For Neutralizing Credential Stuffing Attacks(22页).pdf 2024-06-21
2024_USA24_HUM W02_01:Risk Profiles Why Some Employees Attract Danger and Others Dodge It(48页).pdf 2024-06-21
2024_USA24_PART4 W08_01:Everything Everywhere All at Once The European ID Wallet Ecosystem(16页).pdf 2024-06-21
2024_USA24_LAB1 R01_01:Blueprint for Data Defense in the Public Cloud(47页).pdf 2024-06-21
2024_USA24_PART4 W01_01:From Boardrooms to Polling Places Securing Critical Infrastructure in 2024(24页).pdf 2024-06-21
2024_USA24_DAS M06_01:A Walkthrough AppSec Tool Selection Procurement and Implementation(54页).pdf 2024-06-21
2024_USA24_ANI W09_01:Prevention vs Response Cybersec Economics in the Modern Era(43页).pdf 2024-06-21
2024_USA24_LAB1 W01_01:Threat Modeling Championship(25页).pdf 2024-06-21
2024_USA24_TPV T09_01:All Good Things End of Life and End of Support in Policy and Practice(64页).pdf 2024-06-21
2024_USA24_SIR R01_01:Top 10 Security Products That Would Be Elevated or Eliminated by GenAI(43页).pdf 2024-06-21
2024_USA24_PART1 T09_01:Bye Bye DIY Fictionless Security Operations with Google(46页).pdf 2024-06-21
2024_USA24_TPV M06_01:AI the Software Supply Chain, and Other Not So Puzzling Pieces(44页).pdf 2024-06-21
2024_USA24_HTA M03_01:The Always On Purple Team An Automated CICD for Detection Engineering(34页).pdf 2024-06-21
2024_USA24_TPV W08_01:Navigating Third Party Risk in OT Environments(25页).pdf 2024-06-21
2024_USA24_HUM M06_01:Criminal Minds World’s Most Wanted Cybercriminals Interview Insights(30页).pdf 2024-06-21
2024_USA24_LAW M01_01:Cybersecuritys Next Legal and Policy Frontier Software Liability(25页).pdf 2024-06-21
2024_USA24_SBX W10_01:RFID Flippers and Access Control(96页).pdf 2024-06-21
2024_USA24_LAW T10_01:When Lightning Strikes The Latest Cyber Law Hot Topics(26页).pdf 2024-06-21