Title: New Technology Innovation Sandbox 1:00 p.m. – 6:00 p.m.Paul Kocher, president and chief scientist at CRI, and executives at Greylock Partners, In-Q-Tel, Red Cross, Sophos and The McGraw-Hill Companies
In this half-day program, Paul Kocher and other leading security leaders will explore and evaluate new technologies that promise to transform the information security industry, now and in the future, including the “Most Innovative Company at RSA Conference 2012” contest.
Wednesday, February 29, 2012
Title: Innovation and Technology Transfer in Security: From the Lab to General Use 8:00 a.m. – 9:10 a.m. – Room 310Paul Kocher, president and chief scientist at CRI, and executives at Cigital, Fortify Software, the National Science Foundation, and the Naval Postgraduate SchoolIn this session, Paul Kocher will join other distinguished innovation experts and entrepreneurs to discuss their experiences in making technology transfer work; exploring key gaps in a system where security technologies move from start-ups, to early adopters, to global technologies. Title: Minding the App Store - Protecting Software and Device Features 9:30 a.m. – 10:10 a.m. – Room 302Benjamin Jun, vice president & chief technology officer at CRI This talk focuses on “app store” business models—the shiny new platform capabilities that can be unleashed with simple enablement messages, and the potential vulnerabilities that occur when locked features are valuable. Learn developer techniques for protecting platform features, building infrastructure for cryptographic authorization management, and defending software clients from unauthorized upgrades. Friday, March 2, 2012 Title: Is Your Mobile Device Radiating Keys? 8:00 a.m. – 8:50 a.m. – Room 305Benjamin Jun, vice president & chief technology officer at CRI and Gary Kenworthy, senior principal engineer at CRI In this session, CRI will explain why EM emission from mobile devices may be leaking cryptographic keys. A mobile app can inadvertently radiate secret data as cryptographic processing is done by the CPU. The session will include a live demonstration where a simple antenna and radio are used to perform key extractions from several modern handheld devices. Participants will learn several techniques developers can use to mitigate risk whenever applications use high-valued cryptographic keys.
Select the service that is right for you!COMPARE ALL SERVICES
- $2.5+ million portfolio
- Large-cap and dividend focus
- Intraday trade alerts from Cramer
- Weekly roundups
Access the tool that DOMINATES the Russell 2000 and the S&P 500.
- Buy, hold, or sell recommendations for over 4,300 stocks
- Unlimited research reports on your favorite stocks
- A custom stock screener
- Upgrade/downgrade alerts
- Diversified model portfolio of dividend stocks
- Alerts when market news affect the portfolio
- Bi-weekly updates with exact steps to take - BUY, HOLD, SELL
- Real Money + Doug Kass Plus 15 more Wall Street Pros
- Intraday commentary & news
- Ultra-actionable trading ideas
- 100+ monthly options trading ideas
- Actionable options commentary & news
- Real-time trading community
- Options TV