Menu

Sessions & Workshops

Tuesday, February 26, 2013

  • Big Data Transforms Security

    • 8:00am – 8:45am | KEY-101

    Welcome to a universe of Big Data, the next wave in Information Technology. Big data has the potential to transform our lives for the better; our health, environment, our livelihood, almost every…

    Conference Track:
    Participant:
    Arthur W. Coviello Jr. - Executive Chairman (retired), RSA, The Security Division of EMC
  • Making a Case for Security Optimism

    • 8:50am – 9:30am | KEY-102

    Security issues have always been industry issues. There is no silver bullet and there is no single company that can solve all the security problems confronted by computer users. While our industry…

    Conference Track:
    Participant:
    Scott Charney - Corporate Vice President, Trustworthy Computing, Microsoft
  • Building a Higher Order of Security Intelligence

    • 9:40am – 10:10am | KEY-103

    Security professionals have reached a turning point where the solutions and methods of the past are no longer enough. In order to meet the increasingly sophisticated attacks of today, companies must…

    Conference Track:
    Participant:
    Francis deSouza - President, Products and Services, Symantec
  • The Cryptographers' Panel

    • 10:20am – 11:00am | KEY-104

    Join the founders and leaders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2013 and practical insights that continue to be drawn from…

    Conference Track:
    Participants:
    Ari Juels - Chief Scientist, RSA, The Security Division of EMC
    Adi Shamir - Professor, Computer Science Department, Weizmann Institute of Science, Israel
    Dan Boneh - Professor, Stanford University
    Ronald Rivest - Vannevar Bush Professor, MIT
    Whitfield Diffie - Cryptographer & Security Expert, Cryptomathic
  • Building and Securing Aadhaar – the World's Largest National ID System

    • 11:10am – 12:00pm | KEY-105

    The Government of India embarked on an ambitious National ID project in 2009 called Aadhaar in order to improve service delivery for its 1.2 billion residents. Since then Aadhaar has enrolled over 250…

    Conference Track:
    Participant:
    Srikanth Nadhamuni - Advisor to UID Authority of India and Chief Executive Officer, Khosla Labs

Wednesday, February 27, 2013

Thursday, February 28, 2013

  • Pandora's Box Meets the Sword of Damocles: Curtailing Cyber Abuse

    • 2:20pm – 2:50pm | KEY-301

    Six years ago RSA Conference featured a panel in which the danger to children from sexual predators online was discussed. It's now 2013 and this danger has expanded. What can we do as information…

    Conference Track:
    Participants:
    David Kirkpatrick - CEO and Chief Techonomist, Techonomy Media
    Jaana Juvonen - Professor of Developmental Psychology, UC Los Angeles Department of Psychology
    Joe Sullivan - Director of Security, Facebook
    Mark Krause - Senior Compliance and Litigation Counsel, Warner Bros. Entertainment Inc.
    Sameer Hinduja - Co-Director, Cyberbullying Research Center, School of Criminology and Criminal Justice, Florida Atlantic University
  • Criminal Education: Lessons from the Criminals and their Methods

    • 3:00pm – 3:20am | KEY-302

    Market forces are organizing our adversaries, driving cooperation, specialization and efficient predatory behavior. Their rapid adoption of new technologies and efficacy in information sharing have…

    Conference Track:
    Participant:
    Art Gilliland - Senior Vice President & General Manager of Enterprise Security Products, HP
  • The Lifecycle of Cybercrime

    • 3:30pm – 3:50pm | KEY-303

    Trustwave and the U.S. Secret Service will highlight cybercrime trends from forensic investigations compiled in the 2013 Trustwave Global Security Report. The presentation will discuss the lifecycle…

    Conference Track:
    Participants:
    Erik Rasmussen - Special Agent, U.S. Secret Service
    Nicholas Percoco - Vice President, Strategic Services, Rapid7
  • Mind over Matter: Managing Risk with Psychology Instead of Brute Force

    • 4:00pm – 4:20pm | KEY-304

    Risk management is not a science... it's an art. To manage risk effectively, we need to understand how people feel about, and react to risk. Akamai's CISO Andy Ellis will talk about how research into…

    Conference Track:
    Participant:
    Andy Ellis - Chief Security Officer, Akamai Technologies
  • How Gaming Can Make a Better World

    • 4:30pm – 5:00pm | KEY-305

    Drawing on the latest findings in psychology, cognitive science and sociology, video game developer Jane McGonigal is turning gameplay to socially positive ends, developing new reality–based games…

    Conference Track:
    Participant:
    Jane McGonigal - Author of the New York Times bestseller, Reality Is Broken, World-renowned Game Designer, Inventor of SuperBetter

Friday, March 1, 2013

  • The Hugh Thompson Show

    • 1:00pm – 1:35pm | KEY-401

    Internet security guru and bestselling author Dr. Herbert "Hugh" Thompson has seen it all –– hacked voting machines, exposed airline computer insecurities and devised cell phone exploits. For the…

    Conference Track:
    Participants:
    Billy Beane - Author: Moneyball: The Art of Winning an Unfair Game
    Gary Wolf - Contributing Editor, Wired
    Hugh Thompson - Program Committee Chairman, RSA Conference
  • Remarks by Dr. Condoleezza Rice

    • 1:40pm – 2:00pm | KEY-402

    In this inspiring presentation, Rice provides a sweeping look at global affairs discussing how recent events have changed the way we view political, economic, and social issues. She highlights the…

    Conference Track:
    Participant:
    Dr. Condoleezza Rice - 66th Secretary of State of the United States

This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions on Thu, 03 Sep 2015 17:21:41 -0400.
© 2015 EMC Corporation. All rights reserved.