Keynotes and Special Government Sessions

February 26, 2013

  • KEY-101 - Big Data Transforms Security

    • 8:00 AM – 8:45 AM

    Welcome to a universe of Big Data, the next wave in Information Technology. Big data has the potential to transform our lives for the better; our health, environment, our livelihood, almost every…

    Speaker:
    Arthur W. Coviello - Executive Vice President, EMC Corporation / Executive Chairman, RSA
  • KEY-102 - Making a Case for Security Optimism

    • 8:50 AM – 9:30 AM

    Security issues have always been industry issues. There is no silver bullet and there is no single company that can solve all the security problems confronted by computer users. While our industry…

    Speaker:
    Scott Charney - Corporate Vice President, Trustworthy Computing, Microsoft
  • KEY-103 - Building a Higher Order of Security Intelligence

    • 9:40 AM – 10:10 AM

    Security professionals have reached a turning point where the solutions and methods of the past are no longer enough. In order to meet the increasingly sophisticated attacks of today, companies must…

    Speaker:
    Francis deSouza - President, Products and Services, Symantec
  • KEY-104 - The Cryptographers' Panel

    • 10:20 AM – 11:00 AM

    Join the founders and leaders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2013 and practical insights that continue to be drawn from…

    Speakers:
    Ari Juels - Chief Scientist, RSA, The Security Division of EMC
    Adi Shamir - Professor, Computer Science Department, Weizmann Institute of Science, Israel
    Dan Boneh - Professor, Stanford University
    Ronald Rivest - Vannevar Bush Professor, MIT
    Whitfield Diffie - Advisory Board, SafeLogic
  • KEY-105 - Building and Securing Aadhaar – the World's Largest National ID System

    • 11:10 AM – 12:00 PM

    The Government of India embarked on an ambitious National ID project in 2009 called Aadhaar in order to improve service delivery for its 1.2 billion residents. Since then Aadhaar has enrolled over 250…

    Speaker:
    Srikanth Nadhamuni - Advisor to UID Authority of India and Chief Executive Officer, Khosla Labs

February 27, 2013

February 28, 2013

  • KEY-301 - Pandora's Box Meets the Sword of Damocles: Curtailing Cyber Abuse

    • 2:20 PM – 2:50 PM

    Six years ago RSA Conference featured a panel in which the danger to children from sexual predators online was discussed. It's now 2013 and this danger has expanded. What can we do as information…

    Speakers:
    David Kirkpatrick - CEO and Chief Techonomist, Techonomy Media
    Jaana Juvonen - Professor of Developmental Psychology, UC Los Angeles Department of Psychology
    Joe Sullivan - Director of Security, Facebook
    Mark Krause - Senior Compliance and Litigation Counsel, Warner Bros. Entertainment Inc.
    Sameer Hinduja - Co-Director, Cyberbullying Research Center, School of Criminology and Criminal Justice, Florida Atlantic University
  • KEY-302 - Criminal Education: Lessons from the Criminals and their Methods

    • 3:00 PM – 3:20 AM

    Market forces are organizing our adversaries, driving cooperation, specialization and efficient predatory behavior. Their rapid adoption of new technologies and efficacy in information sharing have…

    Speaker:
    Art Gilliland - Senior Vice President, HP Software Enterprise Security Products, Hewlett-Packard Company
  • KEY-303 - The Lifecycle of Cybercrime

    • 3:30 PM – 3:50 PM

    Trustwave and the U.S. Secret Service will highlight cybercrime trends from forensic investigations compiled in the 2013 Trustwave Global Security Report. The presentation will discuss the lifecycle…

    Speakers:
    Erik Rasmussen - Special Agent, U.S. Secret Service
    Nicholas Percoco - Senior Vice President, Trustwave SpiderLabs
  • KEY-304 - Mind over Matter: Managing Risk with Psychology Instead of Brute Force

    • 4:00 PM – 4:20 PM

    Risk management is not a science... it's an art. To manage risk effectively, we need to understand how people feel about, and react to risk. Akamai's CISO Andy Ellis will talk about how research into…

    Speaker:
    Andy Ellis - Chief Security Officer, Akamai Technologies, Inc.
  • KEY-305 - How Gaming Can Make a Better World

    • 4:30 PM – 5:00 PM

    Drawing on the latest findings in psychology, cognitive science and sociology, video game developer Jane McGonigal is turning gameplay to socially positive ends, developing new reality–based games…

    Speaker:
    Jane McGonigal - Author of the New York Times bestseller, Reality Is Broken, World-renowned Game Designer, Inventor of SuperBetter

March 1, 2013

  • KEY-401 - The Hugh Thompson Show

    • 1:00 PM – 1:35 PM

    Internet security guru and bestselling author Dr. Herbert "Hugh" Thompson has seen it all –– hacked voting machines, exposed airline computer insecurities and devised cell phone exploits. For the…

    Speakers:
    Billy Beane - Author: Moneyball: The Art of Winning an Unfair Game
    Gary Wolf - Contributing Editor, Wired
    Hugh Thompson - Program Committee Chairman, RSA Conference
  • KEY-402 - Remarks by Dr. Condoleezza Rice

    • 1:40 PM – 2:00 PM

    In this inspiring presentation, Rice provides a sweeping look at global affairs discussing how recent events have changed the way we view political, economic, and social issues. She highlights the…

    Speaker:
    Dr. Condoleezza Rice - 66th Secretary of State of the United States

Special Government Sessions

Government Forum: New Directions from the White House
Tuesday, February 26 | 12:00 PM - 12:50 PM
Room 134

Moderator: Jim Lewis, CSIS
Panelists: Michael Chertoff, Former DHS Secretary; Michael Daniel, Cybersecurity Coordinator, The White House; Eric Rosenbach, Deputy Assistant Secretary of Defense

The last three months have seen major developments in U.S. cybersecurity policy with a Presidential Decision Directive on the Military's role in cyber defense and offense and a new executive order on protecting critical infrastructure. After years of debate, this is a new game for cybersecurity with very different rules. Join us for an active discussion with leading experts from the administration and the private sector.


 

*007 or DDOS: What is Real-world Cyber Policy?
Thursday, February 28 | 10.40 AM - 11.00 AM
Room 134

Speaker: Michael Daniel, Cybersecurity Coordinator, The White House

Special Assistant to the President and White House Cybersecurity Coordinator Michael Daniel, discusses the Administration's cybersecurity agenda, and the application of national power with respect to cyber incidents. What can and should the government do about cyber espionage and attacks?

*Open to Delegate registrants only


 

*The FBI and the Private Sector: Safeguarding Our Cyber Security
Thursday, February 28 | 11:20 AM – 11:40 AM
Room 134

Speaker: Robert S. Mueller, III, Director, Federal Bureau of Investigation

Director Mueller will address the cyber threat to our national security. Intrusions and network attacks are the FBI's top cyber priority. Yet the FBI cannot confront cyber threats on its own. Private sector partnerships are crucial. We must continue to push forward, together, to protect our critical infrastructure - our ideas, our innovation, and our intellectual property.

*Open to Delegate registrants only


 

Ten Years Later: The National Mission to Secure Cyberspace
Thursday, February 28 | 12:00 PM - 12:50 PM
Room 134

Speakers: Tom Ridge, First Secretary of the U.S. Department of Homeland Security, 43rd Governor of Pennsylvania; Howard Schmidt, Former Cybersecurity Advisor for President Bush, former Cybersecurity Coordinator for President Obama
Moderator: Scott Hartz, CEO, Taasera, Inc., former CEO of PwC Consulting.

The US established the Department of Homeland Security in 2003, and in the same year, launched the first National Strategy to Secure Cyberspace. In this 10-year anniversary discussion, Secretary Tom Ridge and former Cybersecurity Czar Howard Schmidt will look at the growing sophistication of cyber attacks over the last decade, and how industry and government can work together to secure a very complex and dynamic cyber frontier.

This document was retrieved from http://www.rsaconference.com/events/us13/keynotes on Tue, 21 Oct 2014 20:00:08 -0400.
© 2014 EMC Corporation. All rights reserved.