Keynotes and Special Government Sessions

February 26, 2013

  • KEY-101 - Big Data Transforms Security

    • 8:00 AM

    Welcome to a universe of Big Data, the next wave in Information Technology. Big data has the potential to transform our lives for the better; our health, environment, our livelihood, almost every…

    Arthur W. Coviello Jr. - Executive Chairman (retired), RSA, The Security Division of EMC
  • KEY-102 - Making a Case for Security Optimism

    • 8:50 AM

    Security issues have always been industry issues. There is no silver bullet and there is no single company that can solve all the security problems confronted by computer users. While our industry…

    Scott Charney - Corporate Vice President, Trustworthy Computing, Microsoft
  • KEY-103 - Building a Higher Order of Security Intelligence

    • 9:40 AM

    Security professionals have reached a turning point where the solutions and methods of the past are no longer enough. In order to meet the increasingly sophisticated attacks of today, companies must…

    Francis deSouza - President, Products and Services, Symantec
  • KEY-104 - The Cryptographers' Panel

    • 10:20 AM

    Join the founders and leaders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2013 and practical insights that continue to be drawn from…

    Ari Juels - Chief Scientist, RSA, The Security Division of EMC
    Adi Shamir - Borman Professor of Computer Science, The Weizmann Institute, Israel
    Dr. Dan Boneh - Professor, Stanford University
    Ronald Rivest - Professor, Massachusetts Institute of Technology
    Whitfield Diffie - Cryptographer and Security Expert, Cryptomathic
  • KEY-105 - Building and Securing Aadhaar – the World's Largest National ID System

    • 11:10 AM

    The Government of India embarked on an ambitious National ID project in 2009 called Aadhaar in order to improve service delivery for its 1.2 billion residents. Since then Aadhaar has enrolled over 250…

    Srikanth Nadhamuni - Advisor to UID Authority of India and Chief Executive Officer, Khosla Labs

February 27, 2013

February 28, 2013

March 1, 2013

  • KEY-401 - The Hugh Thompson Show

    • 1:00 PM

    Internet security guru and bestselling author Dr. Herbert "Hugh" Thompson has seen it all –– hacked voting machines, exposed airline computer insecurities and devised cell phone exploits. For the…

    Billy Beane - Author: Moneyball: The Art of Winning an Unfair Game
    Dr. Hugh Thompson - RSA Conference Program Chair, RSA Conference
    Gary Wolf - Contributing Editor, Wired
  • KEY-402 - Remarks by Dr. Condoleezza Rice

    • 1:40 PM

    In this inspiring presentation, Rice provides a sweeping look at global affairs discussing how recent events have changed the way we view political, economic, and social issues. She highlights the…

    Dr. Condoleezza Rice - 66th Secretary of State of the United States

Special Government Sessions

Government Forum: New Directions from the White House
Tuesday, February 26 | 12:00 PM - 12:50 PM
Room 134

Moderator: Jim Lewis, CSIS
Panelists: Michael Chertoff, Former DHS Secretary; Michael Daniel, Cybersecurity Coordinator, The White House; Eric Rosenbach, Deputy Assistant Secretary of Defense

The last three months have seen major developments in U.S. cybersecurity policy with a Presidential Decision Directive on the Military's role in cyber defense and offense and a new executive order on protecting critical infrastructure. After years of debate, this is a new game for cybersecurity with very different rules. Join us for an active discussion with leading experts from the administration and the private sector.


*007 or DDOS: What is Real-world Cyber Policy?
Thursday, February 28 | 10.40 AM - 11.00 AM
Room 134

Speaker: Michael Daniel, Cybersecurity Coordinator, The White House

Special Assistant to the President and White House Cybersecurity Coordinator Michael Daniel, discusses the Administration's cybersecurity agenda, and the application of national power with respect to cyber incidents. What can and should the government do about cyber espionage and attacks?

*Open to Delegate registrants only


*The FBI and the Private Sector: Safeguarding Our Cyber Security
Thursday, February 28 | 11:20 AM – 11:40 AM
Room 134

Speaker: Robert S. Mueller, III, Director, Federal Bureau of Investigation

Director Mueller will address the cyber threat to our national security. Intrusions and network attacks are the FBI's top cyber priority. Yet the FBI cannot confront cyber threats on its own. Private sector partnerships are crucial. We must continue to push forward, together, to protect our critical infrastructure - our ideas, our innovation, and our intellectual property.

*Open to Delegate registrants only


Ten Years Later: The National Mission to Secure Cyberspace
Thursday, February 28 | 12:00 PM - 12:50 PM
Room 134

Speakers: Tom Ridge, First Secretary of the U.S. Department of Homeland Security, 43rd Governor of Pennsylvania; Howard Schmidt, Former Cybersecurity Advisor for President Bush, former Cybersecurity Coordinator for President Obama
Moderator: Scott Hartz, CEO, Taasera, Inc., former CEO of PwC Consulting.

The US established the Department of Homeland Security in 2003, and in the same year, launched the first National Strategy to Secure Cyberspace. In this 10-year anniversary discussion, Secretary Tom Ridge and former Cybersecurity Czar Howard Schmidt will look at the growing sophistication of cyber attacks over the last decade, and how industry and government can work together to secure a very complex and dynamic cyber frontier.

This document was retrieved from on Wed, 17 Jul 2019 00:32:28 -0400.