- Mar 03, 2014
RSA CONFERENCE 2014 GATHERED TOP INFORMATON SECURITY EXPERTS TO ADDRESS CRITICAL CYBERSECURITY ISSUES THROUGH DEBATE AND SHARED LEARNING
Record Number of Attendees Filled the Moscone Center, North, South and West, to Set the Industry Agenda for 2014
San Francisco — March 3, 2012
- RSA Conference, the world’s leading information security conference and exposition, concluded its 23rd annual event last Friday at the Moscone Center in San Francisco.
o Keynotes, sessions and debates focused on big data, mobile security, privacy, policy and more.
o A record number of more than 28,500 attendees experienced more than 410 sessions, keynotes, peer-to-peer sessions, track sessions, tutorials and seminars, which featured 604 speakers.
- 400 companies across the cybersecurity landscape showcased the tools and technologies that will protect personal and professional assets now and in the future.
- RSA Conference 2014 highlights include:
o RedOwl Analytics was named Most Innovative Company at RSA Conference 2014 by the Innovation Sandbox’s judges’ panel, which was comprised of technology, venture and security industry thought leaders.
o Over three days conference attendees participated in a charity: water challenge, funding two water projects for schools in Nepal that will serve 800 students .
o On the heels of Taylor Wilson’s inspiration session on encouraging tech education in classrooms, two great companies, Tripwire and ThreatTrack, answered the challenge to join RSA Conference in its educational partnership with the STEM Education Coalition.
o Hot session topics and presentations:
o Lance Spitzner, Training Director at SANS Securing the Human, spoke about the different ways organizations are effectively measuring human risk and the impact of their security awareness program in his session "Security Awareness Metrics – Measuring Change in Human Behavior.
o Mike Shema, Director of Engineering at Qualys, advised attendees that privacy shouldn’t be an afterthought in the browser, in his presentation "Is Your Browser a User Agent, or a Double Agent?"
o In their session "Shifting Roles for Security in the Virtualized Data Center: Who Owns What?" Malcolm Rieke of Catbird and Rob Randell of VMware explored how virtualization technologies are changing the operational and architecture roles in IT Networking and Security, and the skill sets required of these updated roles.
o Discussions abound surrounding Software Defined Networks (SDN). In his session "SDN & Security: Why Take Over the Hosts When You Can Take Over the Network," Check Point Fellow Robert Hinden discussed SDN’s possibilities, and also its security concerns.
o James Shreve of BuckleySandler LLP and Christopher Pierson CISO of Viewpost hosted a lively discussion answering the question "Security vs. Privacy: Who is Winning?"
o The 17th Annual RSA Conference Awards program highlighted the work of five security professionals in the fields of mathematics, public policy and security practices. This year’s winners included:
o Lt Col. Frederick Lynn McNulty, Lifetime Achievement Award (posthumously)
o Zurich Insurance Group, Excellence in the Field of Information Security
o Prof. Bart Preneel, COSIC, University of Leuven, Excellence in the Field of Mathematics
o Dr. Patrick Gallagher, Under Secretary of Commerce for Standards and Technology, Excellence in the Field of Public Policy
- RSA Conference Asia Pacific & Japan 2014 will take place on July 22 – 23, 2014 at Marina Bay Sands in Singapore.
- In Q2’14, RSA Conference will announce a series of industry events across Europe that addresses how our audience wants to learn and consume information. A new regional focus is being created to provide security professionals with content and expertise tailored to their location and regulatory needs.
- RSA Conference 2015 will take place April 20 – 24, 2015 at the Moscone Center in San Francisco.
"Leading up to RSA Conference 2014 it could have been argued that this event was the most important in our 23 year history," said Alex Bender, General Manager of RSA Conference. "Over the last twelve months information security has experienced tremendous highs, weathered scrutiny and realized growing credibility on Wall Street. As a result of this increased exposure, it was critical to have an RSA Conference full of constructive dialog, discussion and debate that will form the information security agenda and continue to move our industry into a positive, successful future. We look forward to continue to share, learn and secure with our attendees throughout 2014. "
"The RSA conference is a tremendous place to share information with others and improve your situational awareness by learning what's happening outside of your own walls. In a year when security is top of mind for every enterprise, the number and quality of the presentations at the conference this year really raised the bar.
Additionally, we're proud to be part of the RSA Conference effort to develop future generations of technology experts through the STEM coalition. Tripwire has been actively involved in the development and support of STEM programs for a long time, and we urge the technology industry to become more involved in this important cause."
Dwayne Melancon, CTO, Tripwire
"RSA Conference provided Cigital with the ability to network with peers and customers during a critical time in the security business. The conference offered our security experts, including Gary McGraw and Caroline Wong, an opportunity to share their most recent research and opinions in conference sessions then have direct conversations with attendees during their respective book signings. Having a presence at the podium and on the exhibitor’s floor started some great conversations with security professionals, industry experts and media that we expect to continue throughout the year."
Casey Callaway, Director of Marketing, Cigital, Inc
"It’s very clear that businesses are seeking better threat intelligence to protect themselves from emerging attacks, given the focus of the presentations and the discussions that took place during this year’s show. We had an excellent week at RSA Conference – our booth traffic was the highest it’s ever been, we announced our newest solutions for enterprises and security OEMs and participated in many high quality conversations with partners, prospects and industry influencers. We expect that the topics of privacy, threat intelligence and forensics will become even more important throughout the coming year, and we’re already looking forward to continuing these engagements at next year’s event."
Dick Williams, CEO, Webroot
RSA CONFERENCE ONLINE
- Blog −http://www.rsaconference.com/blogs
- Twitter – http://twitter.com/rsaconference
- Facebook – http://www.facebook.com/rsaconference
- LinkedIn - https://www.linkedin.com/company/rsa-conference
- LinkedIn Networking Group – http://www.linkedin.com/groups?home=&gid=3120
- YouTube – http://www.youtube.com/user/RSAConference
- Flickr – http://www.flickr.com/photos/rsaconference
- Google+ – https://plus.google.com/102053116262408140181/posts
Join and follow the conversation: #RSAC
About RSA Conference
RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at www.rsaconference.com.
# # #
EMC2, EMC, RSA and their respective logos are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners.