Sessions are grouped into categories called tracks to make it easier for you to identify the sessions that are most relevant to your needs. Click on a track name to see the sessions within that track. Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions. Please note the topics and tracks listed here are subject to change.See Agenda
Analytics, Intelligence & Response (Friday)
This track covers the application of investigative and analytic techniques that help organizations anticipate, identify, contain, investigate and resolve incidents in the enterprise. It also explores threat intelligence gathering, automating response, and sharing across technologies and organizations.
Cloud, Mobile & IoT Security (Wednesday)
This track features in-depth sessions on using and leveraging cloud services, virtualization technologies/services, segmentation, deployment models, network function virtualization and hybrid architectures as well as device management, emerging threats to mobile platforms and workers, and the implications of the interconnectivity of everything. Expert speakers will share practical experiences on improving security in the cloud, protecting and managing user data in a mobile workplace, and Big Data analytics.
DevOps Connect: DevSecOps (Wednesday)
DevSecOps has become crucial in the movement to bring security into the software development lifecycle. In this track, we hear stories from practitioners who are in the process of implementing automated security into their development pipeline. Participating in this track will give you visibility into real world problems, and potential solutions, as the presenters talk about their journey so far, and what their plans are going forward.
eFraud & Threats (Thursday)
This track provides the latest information and practical demonstrations of techniques to address eFraud and the growing underground economy. It explores the threat landscape, threat actors, new classes of vulnerabilities, the Dark Web, identifying and addressing emerging crime threats, eFraud, intellectual property theft, and environmental and organized crime.
Global Insights (Friday)
This track features leading information security professionals from across the globe talking about today’s most pressing matters across the cybersecurity spectrum.
Identity & Privacy (Friday)
This track covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise in addition to exploring the privacy issues related to Big Data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise.
Risk Management & Governance (Thursday)
This track covers the creation and implementation of risk management frameworks, compliance-related sessions on standards, and instituting governance across the extended enterprise. This track also contains sessions on a wide variety of security metrics and measurements.
Software & Product Security (Wednesday)
This track is focused on the development, delivery, support and update processes needed to deliver secure products and services to businesses and users. The track will also focus on secure software development as well its intersection with security operations. Sessions will cover topics such as secure application design, secure configurations, containerization, development methodologies, securely delivering product updates, security by design, safety issues, regulatory compliance considerations for products, secure diagnostics and support of products in the field.
Strategy, Architecture & Operational Security (Wednesday)
This track covers the policy, planning and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, cyber-resiliency and cyber-hygiene. Sessions will also focus on the most challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, implementation, orchestration, vulnerability assessment and security monitoring for the defense of networks, endpoints, operational technology and systems.
The Human Element (Thursday)
This track explores how people make trust choices, building successful culture, innovative ways to secure the human, and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, information operations and user behavior analytics.