Menu

Blogs

  • RSA Conference Preview: Meet Your Guide

    by Tony Kontzer on April 20, 2015

    Leading image

    Hello, RSA Conference attendees. We haven't met before; my name is Tony, and I'll be one of your guides throughout this week. I am one of the contributors to the RSAC editorial team, and this year, we are going to take a different approach on how we cover the conference on the blog. This is a change for me, as in the past, I attended as a member of the technology media. As a journalist, I've always felt that the stories from the trenches are always the most interesting. I wasn't as interested…

  • RSAC 2015 Links Roundup: What to Watch

    by Fahmida Y. Rashid on April 20, 2015

    RSA Conference is huge. There is no other way to describe it. The problem with the size is that it’s impossible to catch everything at the show. The thing is, there is no reason why you should. Focus on areas you are interested in, and think about what kind of information you want to learn about. We pulled together curated lists from around the industry highlighting specific sessions that…

  • Breaking the Glass Firewall: The Changing Role of Women in IT Security

    by Tony Kontzer on April 20, 2015

    Despite notable progress in the acceptance and treatment of female IT security employees, the industry continues to struggle in establishing itself as a career track for women. During a panel discussion at the RSA Conference Monday, a few of the world's best-known female security executives made it clear that the challenges of yesteryear are dropping away, but that the industry still must do a…

  • RSA Conference 2015 Daily Recap: Monday

    by Fahmida Y. Rashid on April 20, 2015

    RSA Conference may not have officially started yet—the opening keynote is actually on Tuesday morning—but there were still plenty of great sessions and events on the agenda Monday. The Cloud Security Alliance held its CSA Summit, focusing on enterprise cloud adoption and security lessons learned. Trusted Computing Group had its panel discussion combining mobile computing, Internet of Things, and…

  • Waratek Named the Most Innovative Company at RSA Conference 2015

    by Tony Kontzer on April 20, 2015

    Note to future security entrepreneurs: Solving big enterprise problems is a good strategy. In a field full of innovative technology solutions, Waratek, an Irish startup that aims to make enterprise applications more secure, took the top prize in the RSA Conference's 10 th annual Innovation Sandbox contest. And it did so with a simple but compelling value proposition. "Enterprise applications are…

  • Pick Out Your Peer-2-Peer Sessions for RSA Conference

    by Fahmida Y. Rashid on April 17, 2015

    If you are interested in sitting in a room digging into a specific security topic with other people, the Peer-2-Peer sessions are for you. The goal is to get peers—people in other organizations with similar job functions and roles—in one place so that everyone can share what they are doing and have learned. Wondering which conversation will be the most relevant to your job role and concerns? We…

  • Dive into Deep Conversations at Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 16, 2015

    At RSA Conference, you can meet in a group to explore a specific security topic in-depth as part of a Peer-2-Peer session. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short summary to help you decide. This post highlights five P2P sessions (Scroll down for answers). Links to other session summaries are at the…

  • Which Peer-2-Peer Session at RSAC 2015 Interests You?

    by Fahmida Y. Rashid on April 15, 2015

    Have you checked out a Peer-2-Peer session yet? In a Peer2Peer session, you explore a specific security topic with other like-minded peers and a facilitator. There are quite a few sessions, covering enterprise defense, incident response, and privacy, just to name a few. We asked each session facilitator to provide a short summary to help you decide which session will be the most relevant to your…

  • Don’t Miss Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 15, 2015

    By all means, you should try to attend at least one Peer-2-Peer session while at RSA Conference this year. These sessions let you dig into a specific security topic you care about with your industry peers. It is a great opportunity to learn what other people are doing and walk away with new ideas. Wondering which conversation will be the most relevant to your job role and concerns? We asked each…

  • Picking Out Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 14, 2015

    It’s easy to overlook Peer-2-Peer sessions when making your plans, which is a pity. Think about it—you will be digging into a topic you really care about in a room with like-minded peers and a facilitator. We asked each session facilitator to provide a short summary to help you decide which ones to attend this year. This post highlights seven P2P sessions (Scroll down for answers). Links to other…

  • Securosis Guide: Security Management

    by Securosis Team on April 14, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Last year Big Data was all the rage at the RSAC in terms of security monitoring and management. So the big theme this year will be...(drum roll, please)...Big Data. Yes, it's more of the same, though we will see…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 20 Apr 2015 22:57:26 -0400.
© 2015 EMC Corporation. All rights reserved.