Conference Tracks

  • Analytics & Forensics NEW

    Analytics and Forensics covers the application of investigation and analysis techniques to gather and preserve data in order to discover the source of security attacks or other problem incidents as well as discover and communicate patterns to provide insight and future prevention.

  • Application Security

    Given the increasing use of web and cloud computing applications, Application Security focuses on topics such as secure design, development, implementation and operation of packaged and custom-developed applications. This track will cover current threats and preventive measures.

  • Association Special Topics

    Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.

  • Breaking Research

    This half-track is dedicated to the hottest research and most pressing threats from the top researchers in the field.

  • CISO Viewpoint

    Come hear the opinions of CISOs featuring the latest trends and issues in information security.

  • Cloud Security & Virtualization

    Cloud Security includes security architecture in the cloud, governance, risks, migration issues, identity management and case studies. This track includes sessions on the security aspects of virtualization such as deployment models, VM integrity and virtualization architecture.

  • Cryptography

    Cryptography is ever-changing and this academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

  • Data Security & Privacy

    Data Security covers strategies and technologies to classify, track and protect data. Sessions include database security, data classification, encryption/tokenization, DLP and new threats to sensitive data. Privacy issues, big data trends, regulations and strategies are key to this track.

  • Forums

    Open to all attendees, RSA Conference forums are a place to hear from major leaders in government and the enterprise on the top issues in information security

  • Governance, Risk & Compliance

    GRC includes enterprise risk management, compliance and governance. This track covers the creation and implementation of risk management frameworks as well as the quantification and management of risk.

  • Hackers & Threats

    Hackers and Threats sessions include discussions about the underground economy, advanced threats, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. The second track is technically advanced and will include live demos and code dissection.

  • Hackers & Threats Advanced

    Hackers & Threats Advanced

  • Human Element

    The Human Element is a new frontier for security. This track covers insider threats, social networking/engineering and security awareness programs. Sessions will explore how people make trust choices, innovative ways to secure the human and how classic attacks now include a human element.

  • Industry Experts

    Listen to leading information security professionals talk about today's most pressing matters.

  • Keynotes

    Keynote presentations by industry leaders.

  • Law

    Security and the battle for justice go hand-in-hand. Topics in Law range from unintended consequences due to legislation and legal rulings, to liability from negligence claims by private litigants.

  • Mobile Security

    Mobile Security will focus on policies, processes and technologies for managing employee-owned devices/BYOD programs, smartphone/tablet security and consumerization trends. This track has sessions on mobile malware, application threats, device management and emerging threats to mobile platforms.

  • Peer2Peer

    Interested in up-to-the minute information from your colleagues? P2P sessions enable groups of no more than 25 people that share a common interest to come together and productively explore a specific security topic, facilitated by an experienced practitioner.

  • Policy & Government

    Cyber security is a national and economic security issue. Governments are developing strategies that affect public/private sector security professionals. This track includes legislation, military/law enforcement initiatives, APTs, active defense, critical infrastructure and the role of government.

  • Professional Development

    Professional Development covers individuals’ technical and business/management training, credentialing and career development, as well as staff and personnel management. This track is scheduled on Monday.

  • RSA Conference Studio

    Become part of our studio audience for a wide assortment of information security topics - see it live! Note – no late arrivals or early departures permitted for these 20 minute sessions scheduled Monday through Thursday.

  • Security Mashup

    Interesting speakers and sessions on a wide range of topics not found anywhere else during the week.

  • Security Strategy NEW

    Security Strategy covers the policy, planning and emerging areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes.

  • Security Trends & Innovation

    Security Trends covers emerging trends with an emphasis on new developments and business environment impact. This half-track includes non-implementation security issues and it also contains forward-looking sessions that help organizations prepare for changes in the IT security ecosystem.

  • Sponsor Special Topics

    Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.

  • Technology Infrastructure

    This track will cover architectural and strategic planning considerations for security-enabled technologies, including trends in emerging technologies, network/endpoint security, enterprise rights management, vulnerability assessments, Pen testing, IDS/IPS and physical/embedded device security.

This document was retrieved from on Tue, 18 Jun 2019 05:28:29 -0400.