Menu

Filter Definitions

Below are definitions of some of the new, advanced filtering options on our Session & Events page.

Core Topics

Analytics, Intelligence & Response
Analytics, Intelligence, & Response covers the application of investigative and analytic techniques that help organizations identify, contain, investigate, and resolve incidents in the enterprise. These sessions also covers threat intelligence gathering, automating response, and sharing across technologies and organizations.

Application Security
Application Security focuses on topics such as secure application design, containerization and secure development methodologies.

Cloud Security & Virtualization
Cloud Security & Virtualization includes sessions on the security aspects of using and leveraging cloud services and virtualization technologies/services, segmentation, deployment models, and extended architectures.

C-Suite View
C-Suite View focuses on the intersection of business and security. It features experiences and opinions of CXOs and covers the latest trends and issues in information security. 

Cryptography
This academically focused and refereed topic for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

DevOps
DevOps covers the intersection of secure development and security operations, sharing real-world, enterprise-level experience on this transformation process. 

Governance, Risk & Compliance 
Governance, Risk & Compliance covers the creation and implementation of risk management frameworks, compliance-related sessions on standards and instituting governance across the extended enterprise. These sessions also contain topics on a wide variety of security metrics and measurements.

Hackers & Threats
Hackers and Threats sessions include discussions about the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. Hackers & Threats Advanced is technically advanced and will include live demos and code dissection.

Human Element
Human Element explores how people make trust choices, innovative ways to secure the human and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, and user behavior analytics.

Identity
Identity covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.

Law
The Law sessions explore topics including unintended consequences due to legislation, legal rulings, liability and emerging issues on the legal landscape.

Machine Learning
Machine Learning sessions examine the applications and limitations of machine learning in cybersecurity, exploring fundamentals, applications, potential to address workforce shortages, and future evolution of capabilities. 

Mobile & IoT Security
Mobile & IoT Security provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the implications of the interconnectivity of everything.

Policy & Government 
Policy & Government features sessions on current and proposed government policies, legislation and regulations that could shape the direction of global cyber norms, data protection frameworks, artificial intelligence, machine learning, IoT, and industry standards and security compliance requirements for years to come.

Privacy 
Privacy sessions explore the privacy issues related to big data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise. 

Professional Development
Professional Development covers technical and business/management training, professional certifications and career development, diversity, as well as staff and personnel management.  

Protecting Data & Applied Crypto
Protecting Data & Applied Crypto explores how to classify, track and protect data in the extended enterprise. It covers encryption, tokenization, data protection regulations, DLP and threats to sensitive data, and emerging trends, including the implications of quantum computing. 

Security Strategy
Security Strategy covers the policy, planning and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, cyber-resiliency and cyber-hygiene.

Technology Infrastructure & Operations
Technology Infrastructure & Operations focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, orchestration, security monitoring and vulnerability perspectives for security of networks, endpoints, operational technology and systems.

Delivery Format

Ask the Experts Roundtables
Select sessions will feature a follow on, deeper dive facilitated conversation with the speaker, allowing attendees to probe into the originally presented topic with deeper questions and also engage with fellow attendees exploring topics related to the presentation in exchanges and discussions facilitated by the expert speaker. No new content will be presented. Attendees participating in Roundtables are encouraged to attend the original session and then participate in the Roundtable immediately afterwards.

Classroom
Classroom sessions are traditional presentations delivered by 1-2 presenters, following slide decks that are available from the Conference site. Presentations are concluded with audience Q&A. 

Learning Lab
Learning Labs provide highly interactive, facilitated learning experiences. All of the content is very hands-on and small group oriented. Seating is limited in Labs, assuring maximum engagement and participation. Labs are open to Full Conference attendees only; utilize Reserve a Seat to schedule your participation. Due to the popularity of the Learning Labs, you can only reserve one Lab on your schedule, so pick carefully from our 2 great offerings. Note: Press is not permitted in Lab sessions.

Panel Discussion
Panel sessions are traditional format, featuring a moderator and several panelists representing different viewpoints. The discussions are concluded with audience Q&A. 

Seminar
Start your Conference week on a high note, meeting other practitioners and engaging in these focused Wednesday seminars. Our seminar portfolio and topics have expanded this year, so be sure to explore all of the options.

Specialty Tracks

Keynote
RSAC keynote speakers are inspiring leaders, thinkers, and innovators who will share perspectives and knowledge on the information security industry.

Global Perspectives
Our sponsors provide the content for this track, which focuses on today's most pressing matters. Expert speakers on this track will share proven best practices and steps that organizations can use to better understand security risks and challenges; secure corporate data and information assets; and shift security from just a defensive expense to an offensive differentiator that positively impacts business and revenue opportunities.

This document was retrieved from http://www.rsaconference.com/events/ap18/agenda/filter-definitions on Wed, 26 Jun 2019 08:05:42 -0400.