RSA developed RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of cyber security. Today, RSA Conference is still managed by RSA, with the support and input from industry. As the IT-security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated. RSA Conference event programming is judged and developed by information security practitioners and other related professionals.
Find out how you can redefine your security program and become more intelligence-driven by visiting RSA in booth 3021. An intelligence-driven security strategy provides the VISIBILITY, ANALYSIS, and ACTION that you need to comprehensively protect your organization.
At the RSA exhibit you can:
- Receive a limited-edition “Security Redefined” baseball shirt
- Test your security IQ by playing our “Security Intelligence Ops” game
- Experience our interactive advanced Security Operations center demonstration
- Visit conversation stations to learn more about RSA’s products and solutions
- Participate in never-before-seen presentations by RSA product experts and partners in our interactive theatre
Redefining Identity in the Age of Intelligence-Driven Security
Arthur W. Coviello Jr., Executive Chairman, RSA
Identity lies at the heart of online security – determining what we are able to access and how – but the rapid growth of cloud, social and mobile technology is pushing how we protect and manage identity to the breaking point. Those same technologies combined with the insight of Big Data, however, point the way to how we can redefine and recreate identity for the Age of Intelligence-Driven Security.
Tuesday, February 25
Moscone South Esplanade
|Title||Track||Session ID (Abstract, Date, Time, Location)||Speaker|
|Measurement as a Key to Confidence: Providing Assurance||Governance, Risk & Compliance||GRC-R02 »||Daniel Reddy, Sr. Consultant Product Manager, EMC|
|Criticality Analysis & Supply Chain: Providing "Representation Assurance"||Security Strategy||STR-W04A »||Daniel Reddy, Sr. Consultant Product Manager, EMC|
|Securing the Big Data Ecosystem||RSA Conference Studio||STU-T07A »||Davi Ottenheimer, Senior Director of Trust, EMC|
|Evaluating the Security Of Purchased Software: Can We Find Common Ground?||Application Security||ASEC-T09 »||Reeny Sondhi, Director, Product Security, EMC|
|Seven Habits of Highly Effective Security Products||Application Security||ASEC-F03A »||Sandra Carielli, Principal Product Manager, RSA|
|Science Fiction is Here!!||RSA Conference Studio||STU-M04A »||Sam Curry, Chief Technologist, RSA|
|'2nd-Wave' Advanced Threats: Preparing for Tomorrow's Sophisticated Attacks||Analytics & Forensics||ANF-W01 »||Nikolaos Triandopoulos, Principal Research Scientist, RSA Laboratories|
|Honeywords: A New Tool for Protection from Password Database Breach||Data Security & Privacy||DSP-W02 »||Kevin Bowers, Senior Research Scientist, RSA Laboratories; Ronald Rivest, MIT Professor, RSA Founder|
|Cryptography as a Service||Cloud Security & Virtualization||CSV-F02 »||Peter Robinson, Senior Engineering Manager, RSA|
|Large Corporation Chief Information Security Officers on aligning cyber Cyber technologies, personnel, and processes.||CISO Viewpoint||CISO-T09 »||Andrew Vautier, CISO, Accenture|
|Building a Mystery: Threat Intelligence in Modern Security||Sponsor Panel||SPO2-W03 »||Berk Veral, Senior Product Marketing Manager, RSA|
Experience interactive, never-before-seen presentations by RSA product experts and partners.
RSA THEATER PRESENTATIONS
Intelligent Security for the Digital Enterprise
Tuesday 1:05 and 4:50
Wednesday 2:45 and 4:40
See More, Know More: Access to Rapid Reporting
Tuesday 2:30 and 3:45
Wednesday 11:40 and 1:55
Expand GRC Value Through an Asset-Centric Approach
Tuesday 12:00 and 3:20
Wednesday 10:35 and 12:05
Identity Intelligence in IAM
Tuesday 4:10 and 5:40
Payment Security Redefined
The Cloud and Identity: What, Why, and How
Life After Passwords
The Identity Crisis: When Users Take Over
Wednesday 10:10 and 3:50
Mitigating Account Takeover Through the Customer Lifecycle
Unlocking Business Agility Through Identity Management
Monday, February 24
6:00 PM - 8:00 PM (Welcome Reception - Delegates and Expo Plus Only)
Tuesday, February 25
11:00 AM - 6:00 PM
Wednesday, February 26
South Expo 11:00 AM - 6:00 PM (Pub Crawl - 5:00 PM - 6:00 PM)
North Expo 10:00 AM - 5:00 PM
Thursday, February 27
11:00 AM - 3:00 PM
Don't miss out on your opportunity to share in the collective intelligence of the best and brightest in the information security ecosystem.
Agenda sessions are now available! Be sure to check out this year's exciting lineup of topics!
RSA Conference 2014 will be held in San Francisco, CA at The Moscone Center.
TEST YOUR SECURITY INTELLIGENCE IQ AT THE RSA CONFERENCE
Stop by the RSA booth (#3021) and play our Security Intelligence Ops game. Every day of the Conference there will be new adventures to play that will test your knowledge on how to defend against security attacks.
After registering, you will be able to play the game on your smart phone or at the kiosks at our RSA pavilion. In addition, there will be a live interactive adventure at our booth where RSA security experts will put you to the test.
The questions will be challenging but if you have the right IT security stuff, winning will be easy. The more questions you get right, the more points you will receive.