EXPO Booth
Play Our Game

RSA developed RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of cyber security. Today, RSA Conference is still managed by RSA, with the support and input from industry. As the IT-security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated. RSA Conference event programming is judged and developed by information security practitioners and other related professionals.

Find out how you can redefine your security program and become more intelligence-driven by visiting RSA in booth 3021. An intelligence-driven security strategy provides the VISIBILITY, ANALYSIS, and ACTION that you need to comprehensively protect your organization.

At the RSA exhibit you can:

  • Receive a limited-edition “Security Redefined” baseball shirt
  • Test your security IQ by playing our “Security Intelligence Ops” game
  • Experience our interactive advanced Security Operations center demonstration
  • Visit conversation stations to learn more about RSA’s products and solutions
  • Participate in never-before-seen presentations by RSA product experts and partners in our interactive theatre

Opening Keynote

Redefining Identity in the Age of Intelligence-Driven Security
Arthur W. Coviello Jr., Executive Chairman, RSA

Identity lies at the heart of online security – determining what we are able to access and how – but the rapid growth of cloud, social and mobile technology is pushing how we protect and manage identity to the breaking point. Those same technologies combined with the insight of Big Data, however, point the way to how we can redefine and recreate identity for the Age of Intelligence-Driven Security.


Tuesday, February 25


8:00 a.m.


Moscone South Esplanade


Title Track Session ID (Abstract, Date, Time, Location) Speaker
Measurement as a Key to Confidence: Providing Assurance Governance, Risk & Compliance GRC-R02 » Daniel Reddy, Sr. Consultant Product Manager, EMC
Criticality Analysis & Supply Chain: Providing "Representation Assurance" Security Strategy STR-W04A » Daniel Reddy, Sr. Consultant Product Manager, EMC
Securing the Big Data Ecosystem RSA Conference Studio STU-T07A » Davi Ottenheimer, Senior Director of Trust, EMC
Evaluating the Security Of Purchased Software: Can We Find Common Ground? Application Security ASEC-T09 » Reeny Sondhi, Director, Product Security, EMC
Seven Habits of Highly Effective Security Products Application Security ASEC-F03A » Sandra Carielli, Principal Product Manager, RSA
Science Fiction is Here!! RSA Conference Studio STU-M04A » Sam Curry, Chief Technologist, RSA
'2nd-Wave' Advanced Threats: Preparing for Tomorrow's Sophisticated Attacks Analytics & Forensics ANF-W01 » Nikolaos Triandopoulos, Principal Research Scientist, RSA Laboratories
Honeywords: A New Tool for Protection from Password Database Breach Data Security & Privacy DSP-W02 » Kevin Bowers, Senior Research Scientist, RSA Laboratories; Ronald Rivest, MIT Professor, RSA Founder
Cryptography as a Service Cloud Security & Virtualization CSV-F02 » Peter Robinson, Senior Engineering Manager, RSA
Large Corporation Chief Information Security Officers on aligning cyber Cyber technologies, personnel, and processes. CISO Viewpoint CISO-T09 » Andrew Vautier, CISO, Accenture
Building a Mystery: Threat Intelligence in Modern Security Sponsor Panel SPO2-W03  » Berk Veral, Senior Product Marketing Manager, RSA

Experience interactive, never-before-seen presentations by RSA product experts and partners.



Intelligent Security for the Digital Enterprise

Tuesday 1:05 and 4:50
Wednesday 2:45 and 4:40
Thursday 1:25


See More, Know More: Access to Rapid Reporting

Tuesday 2:30 and 3:45
Wednesday 11:40 and 1:55
Thursday 11:10


Expand GRC Value Through an Asset-Centric Approach

Tuesday 12:00 and 3:20
Wednesday 10:35 and 12:05
Thursday 11:35


Identity Intelligence in IAM

Tuesday 4:10 and 5:40
Wednesday 4:15
Thursday 12:00


Payment Security Redefined

Tuesday 5:15
Wednesday 3:10



Tuesday 11:35


The Cloud and Identity: What, Why, and How

Tuesday 11:10
Thursday 1:50


Life After Passwords

Monday 7:40
Wednesday 11:00


The Identity Crisis: When Users Take Over

Monday 6:10
Tuesday 2:55
Wednesday 10:10 and 3:50
Thursday 2:40


Mitigating Account Takeover Through the Customer Lifecycle

Monday 7:00
Tuesday 12:40
Wednesday 1:30
Thursday 2:15


Unlocking Business Agility Through Identity Management

Monday 6:35
Wednesday 2:20

Expo Hours

Monday, February 24
6:00 PM - 8:00 PM (Welcome Reception - Delegates and Expo Plus Only)

Tuesday, February 25
11:00 AM - 6:00 PM

Wednesday, February 26
South Expo 11:00 AM - 6:00 PM (Pub Crawl - 5:00 PM - 6:00 PM)
North Expo 10:00 AM - 5:00 PM

Thursday, February 27
11:00 AM - 3:00 PM

Don't miss out on your opportunity to share in the collective intelligence of the best and brightest in the information security ecosystem.

Agenda sessions are now available! Be sure to check out this year's exciting lineup of topics!

RSA Conference 2014 will be held in San Francisco, CA at The Moscone Center.


Stop by the RSA booth (#3021) and play our Security Intelligence Ops game. Every day of the Conference there will be new adventures to play that will test your knowledge on how to defend against security attacks.

After registering, you will be able to play the game on your smart phone or at the kiosks at our RSA pavilion. In addition, there will be a live interactive adventure at our booth where RSA security experts will put you to the test.

The questions will be challenging but if you have the right IT security stuff, winning will be easy. The more questions you get right, the more points you will receive.