Keynote: Applied Cryptography and Practical Example (E11a)

Najwa Aaraj, Senior Vice President, Special Projects, DarkMatter. Cryptographic bearings of rigorous mathematical theories are vital to modern networks and information systems. Cryptosystems are essential for the deployment of end-to-end secure communications protocols across multiple devices and platforms, for at-rest data storage, for enabling the standardization of multiple security ...

Keynote: From Heartbleed to Juniper and Beyond (Y30a)

Matthew Green, Assistant Professor, Johns Hopkins University. The past decade has seen enormous advances in the science of cryptography; yet the process of cryptographic module validation has become mostly stagnant. While this might have been acceptable in the past, in today's threat environment it is completely untenable. In this presentation I will review some of the new threats faced ...

Decrypting Crypto: Intro to Cryptography (W01a)

Steve Weingart, Manager of Public Sector Certifications, Aruba, a Hewlett Packard Enterprise company. Cryptography is an interesting subject and a very important one when you are talking about security. But it is also a complicated topic and with all of the different rules, standards, algorithms, key lengths and methods, it can be a daunting to learn. Cryptography is a basic tool we use ...