Keynotes and Special Government Sessions
February 26, 2013
Welcome to a universe of Big Data, the next wave in Information Technology. Big data has the potential to transform our lives for the better; our health, environment, our livelihood, almost every…
Participant: Arthur Coviello, Jr.
Security issues have always been industry issues. There is no silver bullet and there is no single company that can solve all the security problems confronted by computer users. While our industry…
Participant: Scott Charney
Security professionals have reached a turning point where the solutions and methods of the past are no longer enough. In order to meet the increasingly sophisticated attacks of today, companies must…
Participant: Francis deSouza
Join the founders and leaders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2013 and practical insights that continue to be drawn from…
The Government of India embarked on an ambitious National ID project in 2009 called Aadhaar in order to improve service delivery for its 1.2 billion residents. Since then Aadhaar has enrolled over 250…
Participant: Srikanth Nadhamuni
February 27, 2013
KEY-202 – The Freedom to Be Who You Want to Be: Strong Authentication and Pseudonymity on the Internet
There are different ways people choose to identify themselves (or not) on the Internet. Attribution can be very important, but pseudonyms and anonymity are also an established part of many cultures --…
Participant: Vint Cerf
The hyperconnected world of intelligent devices is now today's reality. We live in a new era where everyone and everything is powered by devices that collect and process information with context from…
Virtualization and Software Defined Networking are game changers for the next generation data center, enabling profound shifts in IT services, business models and architectures. However, immature…
Participant: Christopher Young
McAfee's Worldwide CTO, Michael Fey, warns the current trajectory of the security landscape will lead to industry failure. Security experts must apply a new set of fundamentals to protect the…
Participant: Mike Fey
Freedom of speech and the distribution of knowledge is the foundation of Wikipedia. Jimmy Wales predicts that the Internet will democratise developing countries by making the world 'flat,' opening…
Participant: Jimmy Wales
February 28, 2013
Six years ago RSA Conference featured a panel in which the danger to children from sexual predators online was discussed. It's now 2013 and this danger has expanded. What can we do as information…
Market forces are organizing our adversaries, driving cooperation, specialization and efficient predatory behavior. Their rapid adoption of new technologies and efficacy in information sharing have…
Participant: Art Gilliland
Trustwave and the U.S. Secret Service will highlight cybercrime trends from forensic investigations compiled in the 2013 Trustwave Global Security Report. The presentation will discuss the lifecycle…
Risk management is not a science... it's an art. To manage risk effectively, we need to understand how people feel about, and react to risk. Akamai's CISO Andy Ellis will talk about how research into…
Participant: Andy Ellis
Drawing on the latest findings in psychology, cognitive science and sociology, video game developer Jane McGonigal is turning gameplay to socially positive ends, developing new reality–based games…
Participant: Jane McGonigal
March 1, 2013
Internet security guru and bestselling author Dr. Herbert "Hugh" Thompson has seen it all –– hacked voting machines, exposed airline computer insecurities and devised cell phone exploits. For the…
In this inspiring presentation, Rice provides a sweeping look at global affairs discussing how recent events have changed the way we view political, economic, and social issues. She highlights the…
Participant: Dr. Condoleezza Rice
Special Government Sessions
Government Forum: New Directions from the White House
Tuesday, February 26 | 12:00 PM - 12:50 PM
Moderator: Jim Lewis, CSIS
Panelists: Michael Chertoff, Former DHS Secretary; Michael Daniel, Cybersecurity Coordinator, The White House; Eric Rosenbach, Deputy Assistant Secretary of Defense
The last three months have seen major developments in U.S. cybersecurity policy with a Presidential Decision Directive on the Military's role in cyber defense and offense and a new executive order on protecting critical infrastructure. After years of debate, this is a new game for cybersecurity with very different rules. Join us for an active discussion with leading experts from the administration and the private sector.
*007 or DDOS: What is Real-world Cyber Policy?
Thursday, February 28 | 10.40 AM - 11.00 AM
Speaker: Michael Daniel, Cybersecurity Coordinator, The White House
Special Assistant to the President and White House Cybersecurity Coordinator Michael Daniel, discusses the Administration's cybersecurity agenda, and the application of national power with respect to cyber incidents. What can and should the government do about cyber espionage and attacks?
*Open to Delegate registrants only
*The FBI and the Private Sector: Safeguarding Our Cyber Security
Thursday, February 28 | 11:20 AM – 11:40 AM
Speaker: Robert S. Mueller, III, Director, Federal Bureau of Investigation
Director Mueller will address the cyber threat to our national security. Intrusions and network attacks are the FBI's top cyber priority. Yet the FBI cannot confront cyber threats on its own. Private sector partnerships are crucial. We must continue to push forward, together, to protect our critical infrastructure - our ideas, our innovation, and our intellectual property.
*Open to Delegate registrants only
Ten Years Later: The National Mission to Secure Cyberspace
Thursday, February 28 | 12:00 PM - 12:50 PM
Speakers: Tom Ridge, First Secretary of the U.S. Department of Homeland Security, 43rd Governor of Pennsylvania; Howard Schmidt, Former Cybersecurity Advisor for President Bush, former Cybersecurity Coordinator for President Obama
Moderator: Scott Hartz, CEO, Taasera, Inc., former CEO of PwC Consulting.
The US established the Department of Homeland Security in 2003, and in the same year, launched the first National Strategy to Secure Cyberspace. In this 10-year anniversary discussion, Secretary Tom Ridge and former Cybersecurity Czar Howard Schmidt will look at the growing sophistication of cyber attacks over the last decade, and how industry and government can work together to secure a very complex and dynamic cyber frontier.