Menu

Monday Activities

Information Security Leadership Development: Surviving as a Security Leader

Time: 8:30am – 11:30am
Abstract: In conventional security training, there are few opportunities to learn how to develop and direct a successful information security program. Experienced security leaders deliver a morning seminar focused on bridging this gap.

This seminar is open to Full Conference attendees.

Register Now »

CSA Summit 2015: Enterprise Cloud Adoption and Security Lessons Learned

Time: 9:00am – 12:00pm
Abstract: Cloud computing is now a mission critical part of the enterprise. Join us for CSA Summit 2015 to discover lessons learned from enterprise experts in securing their clouds and achieving compliance objectives.  A global list of industry experts will share their experiences and discuss the key security challenges of tomorrow.  Get the big picture view of the future of IT and our mandate to revolutionize security at CSA’s traditional Monday kickoff to the conference.

This seminar is open to all attendees.

Register Now »

DevOps Connect: DevOpsSec

Time: 9:00am – 5:00pm
Abstract: DevOps.com presents DevOps Connect: DevOpsSec: a full day of learning and networking focused on DevOps and security’s role in the software development lifecycle. Gene Kim, Joshua Corman, Mark Miller and Alan Shimel co-host the day's events, which include panel discussions, industry case studies for DevOps and how security has become an essential part of the DevOps transformation. You will hear real-world stories from industry professionals on how they are integrating DevOps and security in companies just like yours.

This seminar is open to all attendees.

Register Now »

Security Basics Seminar

Time: 8:30am – 4:30pm
Abstract: The Security Basics Seminar explains some of the most important security principles and is designed for practitioners with three years or less of information security experience. It lays a foundation of essential concepts that will enhance understanding of the current advanced security issues that will be discussed during the week. The seminar will feature some of the giants of the security industry offering up to date perspectives on fundamental security topics.

This seminar is open to Full Conference attendees.

Register Now »

TCG: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions

Time: 9:00am – 1:00pm
Abstract: Do I know you, can I trust you? While the concept of trust and its role in security are widely accepted now in enterprise computing, near-revolutionary changes to how we get, use and share data have created entirely new classes of unprotected devices, networks and data. Sensor data, personally identifiable information, financial transactions and health data, and intellectual property fly through a variety of networks, touching a variety of devices, unencrypted and vulnerable to loss, theft and attack. We know now that power grid, manufacturing operations and mobile devices routinely are hacked and attacked. Even as developers create new, ever-more powerful and connected systems, security has not been a key consideration.

This association session hosted by the Trusted Computing Group (TCG) will address these new issues, as well as take a look at the state of security and trust in traditional enterprise computing. Experts on the IoT, mobile security and transactions and embedded systems will throw out the potential worst security cases and talk about possible approaches to cutting these systems off to attacks. The role of trust and industry standards from various groups will be addressed. Examples of trust in enterprise computing also will be addressed with discussions of how the TPM can be used to protect PCs; what role encryption plays in enterprise security; and the growing promise of security automation to automate and manage critical security functions.

Attendees will also be able to experience new demos on mobile, embedded, IoT and enterprise security for ideas on using available tools and technologies for security, as well as emerging ways to leverage trust.

This seminar is open to all attendees.

Register Now »

Advancing Information Risk Practices Seminar

Time: 1:00pm – 4:30pm
Abstract: Many challenges face today’s Risk Management programs, including how to risk rank security gaps, handling business interactions, and building a qualified resource pool. This half day seminar will be packed with practical information from a series of respected industry leaders who have set out to challenge conventional ideas and pursue cutting edge tactics, discussing successes and pitfalls.

This seminar is open to Full Conference attendees.

Register Now »

IAPP: Engineering Privacy: Why Security isn’t Enough

Time: 1:00pm – 5:00pm
Abstract: Businesses increasingly understand that even robust security measures cannot protect an organization from the reputational damage of a privacy violation. Privacy is not about locking information down. It’s about respecting consumer expectations. In this session, privacy leaders explain how to engineer privacy into product design, software applications, and organizational architecture.

This seminar is open to all attendees.

Register Now »

Innovation Sandbox - "Most Innovative Company" Live

Time: 1:00pm – 5:30pm
Abstract: Witness the Top 10 Finalists battle it out for the coveted "Judges Prize" and new in 2015, "People's Choice Award" at RSAC Innovation Sandbox's "Most Innovative Company" contest.  In this fast-paced pitch session, Finalists share why their solution will have the greatest impact on our industry.

This program is open to all Full Conference, Explorer Expo, and Explorer Expo Plus attendees.

Register Now »

This document was retrieved from http://www.rsaconference.com/events/us15/agenda/monday-activities on Mon, 27 Mar 2017 04:39:38 -0400.
© 2017 EMC Corporation. All rights reserved.