RSA Session Todos

So I’m here at RSA 2012 and I was able to snag a delegate pass and actually attend some sessions this year. It looks to be a pretty great year content-wise and there were scores of sessions I couldn’t attend but wished I could. Most of them are in the APT, cloud, mobility or risk space. Here’s the list that I’m going to slowly work through via recordings after the fact (apologies for all caps):

GRC-106 RISK MANAGEMENT
HT1-106 ADVANCED PERSISTENT THREATS
HOT-106 JOINING FORCES; PUBLIC-PRIVATE
PNG-106 GOOD SECURITY ON A GIVERNMENT BUDGET?
SECT-106 GIVE ME MY CLOUD BACK: PANEL DISCUSSION OF DATA PRIVACY CONCERNS
SP01-106: OPTIMIZING SECURITY FOR SITUATIONAL AWARENESS
STAR-106: FIREWALLS: SECURITY, ACCESS, THE CLOUD — PAST, PRESENT AND FUTURE
TECH-106: REVOCATION CHECKING FOR DIGITAL CERTIFICATES
DAS-107: THE FIRST 24
GRC-107: TAKING INFORMATION SECURITY RISK MANAGEMENT BEYOND SMOKE & MIRRORS
EXP-107: NEW THREATS TO THE INTERNET
TECH-107: STOP THE MALESTROM: USING ENDPOINT SENSOR DATA IN A SIEM TO ISOLATE THREATS
STAR-108: COMBATING ADVANCED PERSISTENT THREATS (APTS)
HT1-201: CYBER WAR: YOU’RE DOING IT WRONG!
HT2-201: THAT DOESN’T ACTUALLY WORK
EXP-201: CYBER BATTLEFIELD: THE FUTURE OF CONFLICT
PNG-201: SECURE THE SMART GRID
GRC-202: ADVERSARY ROI
PNG-202: NSA’S SECURE MOBILITY STRATEGY
STAR-202: CAN WE RECONSTRUCT HOW IDENTITY IS MANAGED ON THE INTERNET?
TECH-202: DEPLOYING IPV6 SECURELY
TECH-203: BUILDING A SECURITY OPERATIONS CENTER (SOC)
HT2-204: LIVE FORENSICS OF A MALWARE INFECTION
EXP-204: THE ROLE OF SECURITY IN COMPANY 2.0
P2P-201C: EVALUATING GARTNER
HT1-301: CODE RED TO ZBOT
SP01-301: MANAGING ADVANCED SECURITY PROBLEMS USING BIG DATA ANALYTICS
EXP-302: HACKING EXPOSED: EMBEDDED — THE DARK WORLD OF TINY SYSTEMS AND BIG HACKS
HT1-303: MODERN CYBER GANGS: WELL-ORGANIZED, WELL-PROTECTED, AND A SMART ADVERSARY
MBS-303: SECURING THE MOBILE DEVICE
PNG-303: CYBER INCIDENTS CENTERS
SECT-303: MAKING WORLD CLASS CLOUD SECURITY THE RULE
TECH-303: SECURITY DATA DELUGE — ZIONS BANK’S HADOOP BASED SECURITY DATA WAREHOUSE
GRC-304: COLLECTIVE DEFENSE: HOW THE DEFENDERS CAN PLAY TO WIN
EXP-304: GRILLING CLOUDICORNS
AST2-401: GETTING YOUR SESSION PROPOSAL ACCEPTED
LAW-401: FRAUD AND DATA EXFILTRATION
TECH-401: SCADA AND ICS SECURITY IN A POST-STUXNET WORLD
HT1-402: THE THREE MYTHS OF CYBERWAR
MBS-402: IOS SECURITY INTERNALS
EXP-402: ZERO DAY: A NON-FICTION VIEW
HT1-403: ESTIMATING THE LIKELIHOOD OF CYBER ATTACKS WHEN THERE’S “INSUFFICIENT DATA”