Menu

Sessions and Events

Tuesday, February 25, 2014

Wednesday, February 26, 2014

  • Implementing PCI DSS 3.0 for Success: Challenges and Best Practices

    • 8:00am – 9:00am | West | 2015 | P2P-W01A

    How is your organization approaching implementation and maintenance of PCI DSS version 3.0 to reduce the effort for compliance while increasing security to protect card data? Participate in this…

    Conference Track:
    Participant:
    Troy Leach - Chief Technology Officer, PCI Security Standards Council
  • Privacy Enhancing Technologies: Pipe Dream or Unfulfilled Promise?

    • 8:00am – 9:00am | West | 2017 | P2P-W01B

    The National Strategy for Trusted Identities in Cyberspace envisions an “identity ecosystem” that doesn’t overshare personal data or comprehensively track people by their identity transactions. …

    Conference Track:
    Participant:
    Naomi Lefkovitz - Senior Policy Advisor, National Institute of Standards and Technology
  • You Shared WHAT?! Risks and Strategies of Securing Employee File Sharing

    • 8:00am – 9:00am | West | 2021 | P2P-W01C

    Employees are self-provisioning a variety of consumer grade file sharing tools to get their jobs done. However, these tools don’t have necessary enterprise ready safeguards such as strong encryption, …

    Conference Track:
    Participant:
    David Butcher - Director, Solutions Architecture, Axway, Inc.
  • Mobile Security in the Enterprise

    • 8:00am – 9:00am | West | 2023 | P2P-W01D

    Creating a mobile security policy and infrastructure in the Enterprise can be a daunting task. There are many risks associated that go along with management and users pressuring for supporting tablets…

    Conference Track:
    Participant:
    Nathan King - Senior Manager, United Airlines
  • Hero to Zero: Can Government Catch-up in Mobility?

    • 9:20am – 10:20am | West | 2015 | P2P-W02A

    Government was one of the first enterprises to embrace mobility. However the marketplace has become increasingly consumer driven and government focused approaches haven’t kept pace. The DHS Science &…

    Conference Track:
    Participant:
    Luke Berndt - Program Manager, DHS S&T Cyber Security Division
  • Training CIRTs for the IRL Trenches

    • 9:20am – 10:20am | West | 2017 | P2P-W02B

    The time to realize that your Incident Response team's SOPs are broken is NOT when you are dealing with an "in real life" intrusion. Often team members will expose skill deficits, process failure and…

    Conference Track:
    Participant:
    Alissa Torres - Certified SANS Instructor, SANS Institute
  • Baseline Security: A Risk-Based ISMS Implementation

    • 9:20am – 10:20am | West | 2021 | P2P-W02C

    Implementing InfoSec policies for a baseline level of protection is one of the key pillars in a healthy IT environment. An extensive set of InfoSec policies and the global implementation poses a…

    Conference Track:
    Participant:
    Peter Kunz - Manager Information Security Standards, Daimler
  • Enterprise IAM Strategies in Banking

    • 9:20am – 10:20am | West | 2023 | P2P-W02D

    What are the key components of an IAM strategy in banking? What puzzle pieces do you focus on first? How do you maintain sponsorship and momentum? Let’s discuss our experiences in implementing IAM…

    Conference Track:
    Participant:
    Jim Weaver - Senior Enterprise Architect, TD Bank Group
  • The 900 Days: Battles with NAC and Access Control

    • 10:40am – 11:40am | West | 2015 | P2P-W03A

    War stories, roadblocks and recovery plans. In the last 3 years, we’ve dumped volumes of time and money in to NAC solutions. Failures outnumber successes, and teams everywhere are trying to determine…

    Conference Track:
    Participant:
    Jennifer Minella - Vice President of Engineering & Consulting Chief Information Security Officer, Carolina Advanced Digital
  • How to Quickly Achieve the HIPAA Compliance Now Required for Most Companies

    • 10:40am – 11:40am | West | 2017 | P2P-W03B

    HIPAA now covers a surprising swath of businesses. Who is covered? What does achieving compliance mean? Senior business InfoSec leader & senior legal HIPAA authority will facilitate discussions…

    Conference Track:
    Participant:
    Mike McAlpen - Executive Director of Security, Compliance and Data Privacy, 8x8, Inc.(Largest Hosted VoIP WW)
  • Mobile Payments: Winning the Fraud Battle

    • 10:40am – 11:40am | West | 2021 | P2P-W03C

    Explore how technologies like single sign in, one-click payments and the disposability of mobile devices actually enable fraud. In seeking ways to reduce buying friction on mobile, retailers are…

    Conference Track:
    Participant:
    Rajesh Ramanand - Chief Executive Officer, Signifyd
  • Big Data and Hadoop: New Security Challenge

    • 10:40am – 11:40am | West | 2023 | P2P-W03D

    A discussion around the new type of approach necessary in order for organizations to take advantage of Hadoop without a compromise on security standards.

    Conference Track:
    Participant:
    Seshadri Ramaswami - Senior Director of Engineering Services and Product Line Management, Zettaset

Thursday, February 27, 2014

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions on Sun, 19 Apr 2015 08:38:28 -0400.
© 2015 EMC Corporation. All rights reserved.