Menu

Blogs

Showing Blog Posts: 21–30 of 92 tagged Privacy

  • RSA Conference Asia Pacific Japan Sessions Thursday Preview

    by Fahmida Y. Rashid on July 23, 2015

    RSA Conference Asia Pacific Japan 2015 kicks off its first day of sessions Thursday morning. These speakers and sessions have been carefully curated because they provide a regional perspective to major security issues facing the Asia-Pacific region. There are plenty of sessions providing strategic security insights, such as Zulfikar Ramzan discussing strategic incident response planning in You’ve…

  • Protecting Children From Online Predators

    by Tony Kontzer on April 24, 2015

    Something totally unexpected happened to me at the RSA Conference in San Francisco Thursday: For the first time in my decades-long career, I cried at a technology event. And something tells me I wasn't the only one. RSAC attendees listened to Alicia Kozakiewicz tell, in amazing detail, of her nightmarish abduction by an Internet predator during the "In to the Woods" keynote panel. On New Year's Day, …

  • Which Peer-2-Peer Session at RSAC 2015 Interests You?

    by Fahmida Y. Rashid on April 15, 2015

    Have you checked out a Peer-2-Peer session yet? In a Peer2Peer session, you explore a specific security topic with other like-minded peers and a facilitator. There are quite a few sessions, covering enterprise defense, incident response, and privacy, just to name a few. We asked each session facilitator to provide a short summary to help you decide which session will be the most relevant to your…

  • Don’t Miss Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 15, 2015

    By all means, you should try to attend at least one Peer-2-Peer session while at RSA Conference this year. These sessions let you dig into a specific security topic you care about with your industry peers. It is a great opportunity to learn what other people are doing and walk away with new ideas. Wondering which conversation will be the most relevant to your job role and concerns? We asked each…

  • Picking Out Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 14, 2015

    It’s easy to overlook Peer-2-Peer sessions when making your plans, which is a pity. Think about it—you will be digging into a topic you really care about in a room with like-minded peers and a facilitator. We asked each session facilitator to provide a short summary to help you decide which ones to attend this year. This post highlights seven P2P sessions (Scroll down for answers). Links to other…

  • Which Peer-2-Peer Session Will You Attend at RSAC 2015?

    by Fahmida Y. Rashid on April 13, 2015

    What is a Peer-2-Peer session? Peer2Peer sessions enable groups that share a common interest to come together and explore a specific security topic. You will be digging into a topic you really care about in a room with like-minded peers and a facilitator. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short…

  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

    by Ben Rothke on March 9, 2015

    In Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, author Bruce Schneier could have justifiably written an angry diatribe full of vitriol against President Obama, his administration, and the NSA for their wholesale spying on innocent Americans and violations of myriad laws and the Constitution. Instead, he has written a thoroughly convincing and brilliant book…

  • Working With Government: Security Standards

    by Todd Inskeep on March 5, 2015

    This is the fifth post in a multi-part series following the President’s State of the Union speech back in January. The series examines how the information security community needs to engage with the government to shape laws which will affect the industry. You can see the first, second, third, and fourth posts. Let's take a look at prescriptive requirements. There has been little discussion of…

  • Working With Government: Privacy

    by Todd Inskeep on February 20, 2015

    This is the fourth post in a multi-part series about how the information security community needs to engage with the government to shape laws which will affect the industry. You can see the first, second, and third posts here. The President’s State of the Union addressed the need for increased cybersecurity investment, new laws, and even the issue of privacy for ourselves and our children. Since…

  • Data Privacy (or the Lack Thereof) in the Internet of Things

    by John Linkous on January 28, 2015

    At this year's Consumer Electronics Show (CES) in Las Vegas, new technologies ran the gamut from incremental changes for existing technologies to full-blown new market segments (here's looking at you, drones). While technologies such as drones and connected cars have significant implications for geo-positioning privacy and even kinetic threats, an even bigger threat comes from the impact they may…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 01 May 2016 15:22:35 -0400.
© 2016 EMC Corporation. All rights reserved.