Given the increasing use of applications outside the enterprise via the web and cloud computing infrastructures, Application Security focuses on topics such as secure design, development, implementation and operation of packaged and custom-developed applications. This track will cover current threats and preventive measures.
Association Special Topics
Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.
Breaking Research –
You won’t find slides for this session online. We don’t even know what topics it will cover. This half track is dedicated to the hottest research and most pressing threats from the top researchers in the field.
CISO Viewpoint –
Come hear the opinions of CISOs in a variety of panels featuring the latest trends and issues in information security.
Cloud Security & Virtualization
Cloud Security includes security architecture in the cloud, cloud security governance, risks,migration issues, vendor Service Level Agreements (SLAs), and case studies. This half track also includes sessions on the security aspects of virtualization such as deployment models, VM integrity, and virtualization security architecture.
Cryptography is ever-changing and this academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.
Data Security & Privacy
Data Security covers strategies, practices, and technologies to classify, track and protect data. Sessions include Data Leakage Prevention (DLP), database security, data classification, and new threats to sensitive data. Privacy issues, big data trends, regulations and strategies are key to this track. Related sessions include applied cryptography.
Enterprise Defense -
Enterprise Defense covers the policy, planning, and emerging areas of enterprise security architecture and strategy. This track includes advanced sessions on ways to protect corporate assets from unwanted intrusion, vulnerability research, forensics, security policies, security assessment, and bridges the disciplines of data security, network security, access control and threat management.
Governance, Risk & Compliance
This track includes enterprise risk management, compliance and governance. GRC covers the creation and implementation of risk management frameworks as well as the quantification and management of risk. Sessions on governance cover communication and enforcement of policies and standards. Compliance-related sessions will include standards such as PCI, Sarbanes Oxley, HIPAA, GLBA and others.
Hackers & Threats
Hackers and Threats sessions include discussions about the underground economy, advanced threats, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. Sessions will include information sharing, threat intelligence and intelligence-driven security. The second track is technically advanced and will include live demos and code dissection.
Human Element -
The Human Element is a new frontier for security. This half track will cover insider threats, social networking, social engineering and security awareness programs. Sessions will explore how people make trust choices with technology, innovative ways to secure the human, and how classic attacks are being rearchitected to include a human element.
Identity & Access Management -
This half track will cover the processes, technologies and policies for managing digital identities, their authentication, authorization, roles and privileges/permissions within or across system and enterprise boundaries and controlling how identities can be used to access resources.
Listen to leading information security professionals talk about today's most pressing matters.
Security and the battle for justice go hand-in-hand. Topics in Law range from unintended consequences due to legislation and legal rulings, to liability from negligence claims by private litigants.
This track tackles the security of mobile devices in the enterprise. Sessions focus on managing employee-owned devices, smartphone/tablet security and mobile security policies. In this track you'll find information on mobile malware, handling eDiscovery on employee-owned devices, mobile application threats, managing consumerization, and emerging mobile threats to devices and workers.
Policy & Government
Cyber security is a major national and economic security issue. Governments worldwide are implementing strategies, policies and risk management processes that affect security professionals in the public/private sectors. This track includes legislation, military and law enforcement initiatives/coordination, APTs, active defense, critical infrastructure protection and the role of government.
Professional Development(Monday afternoon)
Professional Development covers individuals’ technical and business/management training and career development, as well as staff and personnel management. This track is scheduled for Monday afternoon.
RSA Conference Studio
Become part of our studio audience for encore track sessions and exclusive content from some of our top speakers – see it live!
Note – no late arrivals or early departures permitted for these 20 minute sessions.
Security Mashup –
Interesting speakers and sessions on a wide range of topics not found anywhere else during the week.
Security Trends & Innovation –
Security Trends covers emerging technology/business trends with an emphasis on new developments and business environment impact. This half track includes non-implementation security issues, such as strategic trends and financing . It also contains forward-looking sessions that help organizations prepare for changes in the IT security ecosystem.
Sponsor Special Topics
Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.
Technology Infrastructure covers network and endpoint security, IDS/IPS and physical security. This track focuses on the core elements of security architecture. Many sessions are highly technical and dive deep into a particular area. These sessions will cover the latest trends and experiences in building systems that are resilient to attack.
Track Sessions – Uncover a wealth of knowledge from varying perspectives and take away lessons during speaker and panel hosted sessions offered in both 20-minute and 60-minute formats.
Peer2Peer Sessions – Interested in up-to-the minute information from your colleagues? P2P sessions enable groups of no more than 25 people that share a common interest to come together and productively explore a specific security topic.
Briefing Center – Get tactical help with the pressing challenges you face each day. Technical experts present 30-minute demonstrations to help you make strategic plans and purchase decisions for your organization.
RSA Conference Studio – Be a part of the audience during these exclusive 20-minute recorded studio sessions featuring some of our top speakers.
Encore Sessions – Missed that session earlier in the day? Highly attended sessions will be repeated for those unable to attend the initial presentation.
General Interest - Used for strategic sessions or sessions introducing new technologies or concepts.
Intermediate - Focused on principles and concepts related to the track that would appeal to attendees with more than 5 years of experience.
Advanced - Geared toward attendees with deep subject knowledge related to the track with 10 or more years of experience.