Menu

Learning Labs

Learning Labs are two-hour deep dive facilitated experiences, designed to immerse attendees in interactive exercises and discussions. Attendance is capped at 50 participants, assuring that every person in the room has the opportunity to engage with the facilitator and get the most out of the experience. Unlike a traditional track session with the “sage on the stage,” the Lab facilitator is a “guide on the side” leading participants through the content and exercises, while challenging them to apply what they are learning and engage with one another.

Learning Labs are free to Full Conference badge types. Expo and Discover passholders are unable to register for these Labs. 

Assessing Privacy before Monitoring What Your Employees Do with Your Data

Date & Time: 
Wednesday, March 2, 2016 | 1:00 PM – 3:00 PM

Abstract: 

This Learning Lab will focus on the process of defining the use of monitoring tools through the process of a privacy impact assessment. Participants will engage in a hands-on exercise as the executives of a fictitious global company that is facing a serious threat to its propriety information and are assessing tools to address that threat without compromising their compliance obligations. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis.

Click here to Add to My Schedule»


Live Cyber-Exercise: Responding to National Crisis

Date & Time: 
Wednesday, March 2, 2016 | 1:00 PM – 3:00 PM

Abstract: 
A sophisticated cyberattack is in progress against our country. Multiple industries are impacted and things are about to get much worse. How will government and industry work together with international partners to face the challenge and respond to an adaptive and innovative adversary? Join as a full participant in a live cyber-exercise to work through the policy responses and actions. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis.

Click here to Add to My Schedule»


Transforming Your Security Culture: From Awareness to Practice to Maturity

Date & Time: 
Wednesday, March 2, 2016 | 1:00 PM – 3:00 PM

Abstract: 

This learning lab links security culture & performance, with “hands on” exercises to teach attendees to measure, manage, & transform their own security cultures. Through interactive case studies & guided exploration of frameworks & tools, attendees will gain a deeper understanding of security culture & how to transform the cultural maturity & behavioral reliability of their security program. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis. 

Click here to Add to My Schedule»


The 90-Day Information Security Strategy

Date & Time: 
Wednesday, March 2, 2016 | 3:20 PM – 5:20 PM
Thursday, March 3, 2016 | 3:20 PM – 5:20 PM

Abstract: 
One of the key job responsibilities as a new CISO to an organization is to develop an information security strategy. Where should the CISO begin? What could go wrong? How do you get support so the strategy becomes more than shelfware or a pretty picture? This session will discuss what makes an effective strategy and review experiences that have worked well and not so well. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis. 

Click here to Add to My Schedule »


Financial Sector and the Evolving Threat Landscape: Live Cyber-Exercise

Date & Time: 
Wednesday, March 2, 2016 | 3:20 PM – 5:20 PM

Abstract: 

This Banking Fraud Learning Lab will be an opportunity to address a cyberthreat scenario in an interactive and collaborative tabletop exercise. It will examine challenges and best practices for a range of personas who handle cyberthreats—C-suite, law enforcement, SOC, threat and incident analysts—exercising the ability to respond to a rapidly emerging and growing financial sector threat. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis.

Click here to Add to My Schedule»


Securing the Industrial Internet of Things: A Deep Dive into the Future

Date & Time: 
Wednesday, March 2, 2016 | 3:20 PM – 5:20 PM

Abstract: 

Connecting industrial systems to a network seems like an open invitation for hackers. Imagine hacking into a hospital or taking over an infusion pump. The participants will get an overview of recent developments in IIoT secure data connectivity standards, explore security threats to the medical IoT and build a secure application that monitors a patient in a demo environment. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis. 

Click here to Add to My Schedule»


Securing Automobility: Cyborgs and the Social Network of Things

Date & Time: 
Thursday, March 3, 2016 | 1:00 PM – 3:00 PM

Abstract: 

Experience a day in the life of fictional people traversing a smarter city, revealing the countless machine-guided decisions and connections needed for automobility. These cities may require creation of secure, common multi-sided platforms, connecting many modes of transit (cars, public systems and more) to offer individuals true mobility. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis. 

Click here to Add to My Schedule »


Performing Advanced Incident Response – Interactive Exercise

Date & Time: 
Thursday, March 3, 2016 | 1:00 PM – 3:00 PM

Abstract: 
It is essential for incident responders to expand beyond traditional incident response activities by digging deeper into alerts. This includes pivoting off data points and proactively searching for malicious activity without an alert generated from a security tool. Merlin Namuth will facilitate learning this advanced approach through helping participants work through 3 different scenarios. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis. 

Click here to Add to My Schedule »


Developing a Cyberstrategy: Prepare Your Company before Zero Day Strikes

Date & Time: 
Thursday, March 3, 2016 | 1:00 PM – 3:00 PM

Abstract: 
This lab applies a corporate version of the military intelligence planning model to evaluate preparatory efforts preceding well-known cyber incidents (e.g., Target or OPM). In this session, members work in teams to create a cybersecurity strategy focused on preparation and pre-coordination (vs response) using selected notional cyber-scenarios. Pre-RSA information to be delivered via webinar. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis. 

Click here to Add to My Schedule»


Cyberalarm 2016:  Major Cyber Breach Exercise

Date & Time: 
Thursday, March 3, 2016 | 3:20 PM – 5:20 PM

Abstract: 
This session is a realistic role-play relating to a major corporate breach from the perspectives of different key participants.We will start as the incident responders that will triage the security incident and report to management. The CIO will then brief the board and corporate affairs we will need talk to the media. After the event the CEO will give evidence before US Congress. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis. 

Click here to Add to My Schedule» 


Web Security Smackdown: Put Your Offensive Skills to the Test

Date & Time: 
Thursday, March 3, 2016 | 3:20 PM – 5:20 PM

Abstract: 
Test the vulnerable Shadow Bank website, score points and win prizes (top three scores). Shadow Bank has 50 vulnerabilities ranging from SQL Injection and Cross-Site Scripting to cryptanalysis and cipher-cracking challenges. Participants can buy hints or ask our Security Ninjas for help. Immerse yourself in this web security testing challenge to learn while having fun. This is a hands-on technical Lab and all attendees should bring their own laptop to fully participate (Mac, Windows, or Linux). A full laptop is required (ie no tablets) as participants will be using the Developer Tools feature of the browser to execute a lot of the attacks. The latest version of Firefox is recommended for the best experience, but the latest version of any major browser will work. An intercepting proxy (such as Burp Suite) that you're familiar with can also be useful, although it is not required. This session is limited to 50 attendees. Adding a session to your Schedule does not guarantee you a seat. Admission to this session is on a first come, first served basis.


Click here to Add to My Schedule»

 

This document was retrieved from https://www.rsaconference.com/events/us16/agenda/learning-labs on Fri, 30 Sep 2016 04:18:40 -0400.
© 2016 EMC Corporation. All rights reserved.