Know Before You Go
With RSA Conference 2016 Abu Dhabi just around the corner, we’re providing some tips and highlights to help you make the most of your experience this year. Plus, check our Daily Addendum for important updates to the Program Guide.
Before you arrive...
Download our mobile app
Build your schedule, access venue maps and exhibitor listings, submit session evaluations and more.
Staying at Emirates Palace?
See a preview of this 5-star, award-winning luxury hotel located in the heart of Abu Dhabi.
How to get around
Taxis are readily available at Abu Dhabi Airport and Emirates Palace. A metered taxi from the airport to the hotel should cost between AED70-100 and will take approximately 30 minutes.
Check out our Know Before You Go video
Be fully informed prior to arrival so you can get the most out of the Conference.
When you arrive...
Head to the Foyer Island Centre (Level 3) to register. Please remember that a photo ID is required to collect your badge.
Monday 08.30 – 17.00 hrs
Tuesday 08.30 – 18.30 hrs
Wednesday 08.30 – 16.00 hrs
Wireless Internet access
Connect to SSID “RSAConference” for wireless access throughout the Conference space. Important! The wireless network provided is an open, unsecured network. We strongly recommend that you use appropriate security measures, such as utilizing a VPN connection, installing a personal firewall and keeping your operating system up to date with security patches. We recommend turning off your wireless adaptor when not in use and making sure ad hoc (peer to peer) capabilities are disabled on your device.
Attend sessions that explore all aspects of cybersecurity. Choose from over 50 informative sessions covering seven tracks. View the full agenda.
Be part of the action at the Vendor Showcase. Meet with over 35 vendors and demo the latest cybersecurity products and solutions that can help keep your organization safe. While at the Vendor Showcase, visit the RSAC CyberSafety Kids Exhibit for resources to help secure today’s online families.
09.00 – 16.00 hrs
|Security Foundations Seminar
Explore important security principles in this holistic examination of the current state of cybersecurity.
|13.00 – 15.30 hrs||Cyber-Crisis Response—Live Exercise Scenario
Be an active participant as you learn how governments, the private sector and others can work together to respond to a crisis with direct impact on human life, public safety and key markets. Attendees will work together in teams that examine one perspective of a cyber-crisis.*
* Adding a session to your schedule does not guarantee you a seat. Admission to this session is on a first-come, first-served basis.
9.30 – 12.00 hrs
|Changing Perspective; Amit Yoran, President RSA|
|Security in the App Era: Building Strength for an Interconnected World; Jason Kent, Vice President, Web Application Security, Qualys|
|Keys to the IoT Security Castle; Scott Rea, Senior Vice President – Public Key Infrastructure, DarkMatter LLC.|
|The Journey Ahead: Defining a New Security Roadmap; Matt Alderman, Vice President, Global Strategy, Tenable Network Security|
Sponsor Special Topics:
|13.00 – 13.20 hrs||Protect Your Email in the Cloud Against Ransomware and Other Advanced Threats; Bruce Johnson, Email and Web Security Manager, Cisco Systems, Inc.|
|14.05 – 14.25 hrs||Serious Threat Hunting: Hunting for Advanced Adversaries without IOCs; Sameh Sabry, Associate Vice President, SPIRE Solutions|
|15.15 – 15.35 hrs||The State of Security Survey 2016; Abdelnaser Eid, SE, Tenable Network Security|
|16.05 – 17.30 hrs||Wrap up your first day and network with peers at a reception in the Vendor Showcase.|
9.30 – 11.00 hrs
|Wolves Amongst Sheep—Defeating Targeted Attacks with Deception; Sahir Hidayatullah, Chief Executive Officer, Smokescreen Technologies|
|Cybersecurity in the Digital Economy; Scott Manson, Cyber Security Leader for Middle East and Turkey, Cisco|
|Partners in an Interconnected yet Uncertain World; Jack Harrington, Vice President, Cybersecurity and Special Missions, Raytheon|
Sponsor Special Topics:
|11.20 – 11.40 hrs||Boardroom Rodeo: How to Align the C-Suite and Make Better Security Decisions; Chris Poulin, Industry Security Systems Strategist, Advanced Security Group, IBM|
|11.50 – 12.10 hrs||The True Story of a Cyber-Takedown; Bulent Teksoz, Global Cyber Security Strategist, BAE Systems|
|13.15 – 13.35 hrs||Identity as a Critical Next Step in Security; Mike Byrnes, Senior Manager – Identity and Access Management, Entrust Datacard|
|13.45 – 14.05 hrs||The Art and Science of Deception for Advanced Threat Detection; Ray Kafity, Vice President, Attivio Networks META|
|14.20 – 14.40 hrs||Defending the Digital Enterprise: Cyberthreat Visibility and Resolution; Kamran Ahsan, Senior Director, Digital Security Solutions, Etisalat|
|14.50 – 15.10 hrs||Moving Beyong Legacy Endpoint Security Technology; Richard Melick, Technology and Product Evangelist, Cylance, Inc.|
|15.30 hrs||Risk Management in F1—Team Work and Technology at 350 kph; Mark Gallagher, Formula One Industry Executive and Mika Hakkinen, Two-time FIA Formula One World Champion|