Menu

Sessions and Events

Sunday, February 23, 2014

  • SANS: The Critical Security Controls: Planning, Implementing and Auditing

    • 9:00am – 5:00pm | West | 3002 | TUT-S21

    This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Council on CyberSecurity. These Critical Security…

    Participant:
    James Tarala - Senior Faculty & Analyst, The SANS Institute, Principal Consultant, Enclave Security
  • SANS: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program

    • 9:00am – 5:00pm | West | 3004 | TUT-S22

    Organizations have invested in information security for years now. Unfortunately, almost all of this effort has been focused on technology with little, if any, effort on the human factor. As a result, …

    Participant:
    Lance Spitzner - Research &Community Director, SANS Securing The Human
  • SANS: Lethal Network Forensics

    • 9:00am – 5:00pm | West | 3006 | TUT-S23

    LETHAL NETWORK FORENSICS focuses on expanding your forensic mindset to include transient communications that occurred in the past or continue to occur. Even if the most skilled remote attacker…

    Participant:
    George Bakos - SANS Instructor, SANS Institute
  • SANS: Mobile Device Security

    • 9:00am – 5:00pm | West | 3008 | TUT-S24

    This course is designed to teach students about the threats organizations are exposed to via the mobile devices on which they depend. This two-day hands-on class uses lecture, labs and real world…

    Participant:
    Larry Pesce - SANS Certified Instructor, SANS Institute

Monday, February 24, 2014

  • (ISC)² CSSLP CBK Training Preview

    • 8:30am – 12:30pm | West | 2006 | ISC2-M01

    Build hacker resilient software! Attend this FREE half-day education session based on the (ISC)² CBK® for the Certified Secure Software Lifecycle Professional (CSSLP). Delivered by an (ISC)²…

    Participant:
    Stephen Kalman - Authorized Instructor, (ISC)2
  • Security Basics Seminar

    • 8:30am – 4:30pm | West | 3014 | SEM-M01

    The Security Basics Seminar explains some of the most important security principles and is designed for practitioners with three years or less of information security experience. It lays a foundation…

    Participants:
    Benjamin Jun - Chief Technology Officer, Chosen Plaintext
    Dana Wolf - Sr. Director of Products, OpenDNS
    Dennis Moreau - Senior Technologist, RSA
    Hugh Thompson - Program Committee Chairman, RSA Conference
    Jason Brvenik - VP Security Strategy, Sourcefire
    Michael Poitner - Global Marketing Segment Diretor, NXP Semiconductor
    Mike Janke - Chief Executive Officer, Silent Circle
    Tas Giakouminakis - Co-Founder and Chief Technology Officer, Rapid7
  • Information Security Leadership Development: Surviving as a Security Leader

    • 8:30am – 11:30am | West | 3018 | SEM-M02

    In conventional security training, there are few opportunities to learn how to develop and direct a successful information security program. Experienced security leaders deliver a morning seminar…

    Participants:
    Bruce Bonsall - Senior Security Strategist, BT US&C
    Dave Notch - President, Intensity Analytics
    Dennis Devlin - CISO, CPO and SVP of Privacy Practice, SAVANTURE
    Doug Graham - Sr. Director, Risk Management, EMC Corporation
    Evan Wheeler - Vice President, Operational Risk Management, Omgeo
    Jeff Bardin - Chief Intelligence Officer, Treadstone 71
    Justin Peavey - CISO, Omgeo LLC
    Robert West - Chief Security Officer, CipherCloud
  • CSA Summit 2014: In Global Clouds We Trust?

    • 9:00am – 1:00pm | West | 2014 | CSA-M01

    Join us for the CSA Summit, where global policy makers and industry debate our industry’s seminal issue: can we trust global cloud service providers to protect customers located anywhere in the world?…

  • SANS: The Critical Security Controls: Planning, Implementing and Auditing

    • 9:00am – 5:00pm | West | 3002 | TUT-S21

    This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Council on CyberSecurity. These Critical Security…

    Participant:
    James Tarala - Senior Faculty & Analyst, The SANS Institute, Principal Consultant, Enclave Security
  • SANS: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program

    • 9:00am – 5:00pm | West | 3004 | TUT-S22

    Organizations have invested in information security for years now. Unfortunately, almost all of this effort has been focused on technology with little, if any, effort on the human factor. As a result, …

    Participant:
    Lance Spitzner - Research &Community Director, SANS Securing The Human
  • SANS: Lethal Network Forensics

    • 9:00am – 5:00pm | West | 3006 | TUT-S23

    LETHAL NETWORK FORENSICS focuses on expanding your forensic mindset to include transient communications that occurred in the past or continue to occur. Even if the most skilled remote attacker…

    Participant:
    George Bakos - SANS Instructor, SANS Institute
  • SANS: Mobile Device Security

    • 9:00am – 5:00pm | West | 3008 | TUT-S24

    This course is designed to teach students about the threats organizations are exposed to via the mobile devices on which they depend. This two-day hands-on class uses lecture, labs and real world…

    Participant:
    Larry Pesce - SANS Certified Instructor, SANS Institute
  • Closing the Cybersecurity Skills Gap – It’s Past Time.

    • 9:15am – 10:15am | West | 3022 | PROF-M01

    This session will discuss how the evolving threat landscape is altering cybersecurity roles and what essential skills are needed (technical or not) in future leaders. Learn insights from a benchmark…

    Conference Track:
    Participants:
    Javvad Malik - Senior Analyst, 451 Research
    Andy Ellis - Chief Security Officer, Akamai Technologies
    Dwayne Melançon - Chief Technology Officer, Tripwire
    Jane Lute - President and Chief Executive Officer, Council on CyberSecurity
    Michael Assante - Director of ICS, SANS Institute
  • Get Proactive with Security – A Session on Using Trusted Computing to Free Security Resources for the Day-to-Day Fires

    • 10:00am – 2:00pm | West | 2018 | TCG-M01

    Let’s face it. Security is not easy. Every day brings a new wave of announcements for various tools...right alongside a slew of new malware, vicious attacks and holes in existing apps and software. …

  • The Future of Security Education

    • 10:30am – 11:30am | West | 3022 | PROF-M02

    The info sec community dumps huge amounts of money into training their professionals. For countless years, the industry has focused on written assessments and tests. This is changing. Attendees of…

    Conference Track:
    Participants:
    Christopher Bloor - Vice President, Federal Channel, Axzo Press LLC
    Ernest McDuffie - Lead for the National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology (NIST)
    Hord Tipton - Executive Director, (ISC)2
  • The Security Staff and Skills Shortage is Worse Than You Think

    • 11:40am – 12:00pm | West | 3022 | PROF-M03A

    The shortage of skilled security professionals has gotten worse. It now overshadows shortages in all other areas of IT. This session will detail ESG’s 2013 survey into IT security skills and hiring…

    Conference Track:
    Participant:
    Jon Oltsik - Senior Principal Analyst, Enterprise Strategy Group, Inc.
  • IAPP: Privacy Intensive for Security Professionals: Are You Prepared?

    • 1:00pm – 5:00pm | West | 2002 | IAPP-M01

    With the explosion of privacy-related news, there is increasing pressure on security pros to understand the flip side of data protection. This half-day Intensive will feature a full breadth of…

  • Innovation Sandbox

    • 1:00pm – 5:30pm | North | Sandbox at 134 | ISB-M01

    As a part of The Sandbox, this half-day program promotes new technology thinking, provides advice and counsel for entrepreneurs and exposes the RSA Conference community to venture capital…

  • Advancing Information Risk Practices Seminar

    • 1:00pm – 4:30pm | West | 3018 | SEM-M03

    Many challenges face today’s Risk Management programs, including how to risk rank security gaps, handling business interactions and building a qualified resource pool. This half day seminar will be…

    Participants:
    Brad Keller - Senior Vice President & Program Director, The Santa Fe Group
    Evan Wheeler - Vice President, Operational Risk Management, Omgeo
    Irfan Saif - Principal, Deloitte & Touche LLP
    Jeff Lowder - Director, Global Information Security and Privacy, Open Market
    Julie Fitton - Chief Information Security Officer, EMC Cloud Services
    Scott Andersen - Director, Global Information Security, Citi
    Summer Fowler - Deputy Technical Director, Carnegie Mellon University - CERT
  • VMware: The Goldilocks Zone: Security in the Era of the Software Defined Datacenter

    • 1:00pm – 3:00pm | West | 2022 | VMW-M01

    Often treated as an afterthought during periods of architectural change, this time security is being built-in to the foundation of modern computing, creating extraordinary opportunities for those…

  • Right Skills, Right Time, Right Industry: Women in Security

    • 1:15pm – 2:15pm | West | 3022 | PROF-M04

    Women account for 11% of the global information security workforce. Yet their diverse voice and problem solving approaches represent an opportunity while attempting to optimize the “people” part of…

    Conference Track:
    Participants:
    Julie Peeler - Foundation Director, (ISC)2
    Cecily Joseph - VP of Corporate Responsibility and Chief Diversity Officer, Symantec
    Marene Allison - VP, Worldwide Information Security, Johnson & Johnson
    Patricia Goforth - Officer MI Cyber, Booz Allen Hamilton
  • Science Fiction is Here!!

    • 1:15pm – 1:35pm | West | 3012 | STU-M04A

    We've been reading about them in Sci-Fi books, and followed them in Sci-Fi movies. Well, folks, they're here! The security controls that can read your mind, profile your cognitive traits, project your…

    Conference Track:
    Participants:
    Sam Curry - Chief Technology and Security Officer, Arbor Networks
    Uri Rivner - Head of Cyber Strategy, BioCatch
  • (ISC)² CCFP CBK Training Preview

    • 1:30pm – 5:30pm | West | 2006 | ISC2-M02

    Certified Cyber Forensics Professional (CCFP) provides a comprehensive validation of your knowledge and skills as a digital forensics expert. Attend this FREE half-day education session based on the…

    Participant:
    Stephen Kalman - Authorized Instructor, (ISC)2
  • Cyber Security Canon: You Should Have Read These Books by Now

    • 1:55pm – 2:15pm | West | 3012 | STU-M04B

    “Canon: a body of the most influential works.” This short talk will review some of the most influential fiction and non-fiction books that have captured the cyber security culture. These are not the…

    Conference Track:
    Participant:
    Rick Howard - Chief Security Officer, Palo Alto Networks
  • So Why on Earth Would You WANT to be a CISO?

    • 2:25pm – 2:45pm | West | 3022 | PROF-M05A

    You have been working in security for a few years, learning how to hack into systems. Or maybe you came up from the risk management, governance or compliance side of the house. Are you at a…

    Conference Track:
    Participant:
    Todd Fitzgerald - Global Director Information Security, Grant Thornton International, Ltd.
  • Internet of Things... Promising but Let's Not Forget Security Please!

    • 2:25pm – 2:45pm | West | 3012 | STU-M05A

    Internet of Things (IoT) brings a lot of promises of a fully connected world: from city lights to smart cars. It consists of a huge network of small and cheap endpoints (things). What are the…

    Conference Track:
    Participant:
    Eric Vyncke - Distinguished Engineer, Cisco
  • Security: The Hardest Career

    • 3:00pm – 4:00pm | West | 3022 | PROF-M06

    Media constantly claims we have a lack of qualified information security professionals, yet we are an industry that has a huge number of training venues and certs. Drawing on many years examining and…

    Conference Track:
    Participant:
  • Cyber Vigilante or Self Defense?

    • 3:00pm – 3:20pm | West | 3012 | STU-M06A

    As attacks on private-sector critical cyber infrastructure increase in frequency and sophistication, affected companies must adapt. How can companies better work with government during an attack? With…

    Conference Track:
    Participant:
    Bruce Heiman - Partner, K&L Gates LLP
  • Running Secure Server Software on Insecure Hardware without a Parachute

    • 3:40pm – 4:00pm | West | 3012 | STU-M06B

    In this session we will look in depth into what happens when we throw away the assumption that server hardware is trusted. We discuss advanced techniques for protecting software on untrusted clients…

    Conference Track:
    Participant:
    Nicholas Sullivan - Security Engineering Lead, CloudFlare Inc.
  • Be a DREAMR: Obtain Business Partnership, Not Just Buy-in

    • 4:10pm – 4:30pm | West | 3022 | PROF-M07A

    The Security DREAMR framework provides organizations with a systematic approach to remove the impression that security is keeping the business from “getting work done.” DREAMR is about helping you get…

    Conference Track:
    Participants:
    Benjamin Meader - Senior IT Information Security Analyst, Principal Financial Group
    Jessica Hebenstreit - Manager - Security Informatics - Threat Analysis and Response Center, Mayo Clinic
  • Making Penetration Tests Actually Useful

    • 4:10pm – 4:30pm | West | 3012 | STU-M07A

    Penetration tests are a staple among most security programs. They prove that problems exist, which most people already know, and potentially demonstrate the value of a compromise. However they do…

    Conference Track:
    Participant:
    Ira Winkler - President, Secure Mentem
  • Orientation

    • 5:30pm – 6:00pm | The Viewing Point

    Join us at Orientation to discover what's new at RSA Conference 2014 and how to make the most out of your week. Meet other first timers and learn from return attendees. Join discussion groups, learn…

  • Welcome Reception

    • 6:00pm – 8:00pm | North & South | Expo

    Kick off your RSA Conference 2014 experience at the Welcome Reception in both North and South Expos. Enjoy food and drinks and get exclusive access to the exhibitors you've been waiting to meet;…

Tuesday, February 25, 2014

Wednesday, February 26, 2014

Thursday, February 27, 2014

Friday, February 28, 2014

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions on Sat, 01 Aug 2015 03:47:25 -0400.
© 2015 EMC Corporation. All rights reserved.