Menu

Monday Activities

Information Security Leadership Development: Surviving as a Security Leader

Time: 8:30am – 11:30am
Abstract: In conventional security training, there are few opportunities to learn how to develop and direct a successful information security program. Experienced security leaders deliver a morning seminar focused on bridging this gap.

This seminar is open to Full Conference attendees.

View more details »

 

TCG: Securing the IoT with Trusted Computing

Time: 8:30am – 12:30pm
Abstract: The rapidly growing Internet of Things has evolved with little thought to comprehensive security. Whether crucial industrial systems, automobiles or baby monitors, each day brings new attacks, hacks and mishaps every day.

This session will examine the role of security automation and standards that support that in both new and legacy systems, data protection best practices and implementation plans, and the role of trust in hardware, including various ways to leverage the industry-standard TPM. The session will include lively debate about whether security is even possible and if so, how we can use today - and tomorrow's - evolving industry standards and tools to manage IoT security. The session also will include live demonstrations of the IoT in action, secured using available standards and technologies.

See the list of industry experts participating and get regular session updates at: http://www.trustedcomputinggroup.org/resources/rsa_conference_2016.

This seminar is open to all attendees.

View more details »

 

VMware: The Future State of Security Starts with Virtualization

Time: 8:30am – 12:30pm
Abstract: As network virtualization transforms networking into a software industry, it gives rise to new technologies and use cases, accelerating innovation throughout the business. But how will network virtualization be the bridge between data center and cloud networking, and what does this mean for security? Join this two part session to see how extending the operational model of compute virtualization to the network can achieve greater flexibility while providing a much tighter, fine grained way of securing applications, data and other workloads. You will see how network virtualization provides a pathway for securing your on-prem applications, your containerized applications, and your workloads in public cloud providers like Amazon.

This seminar is open to all attendees.

View more details »

 

CSA Summit 2016: Cloudifying Information Security

Time: 8:30am – 4:00pm
Abstract: The information security industry is rapidly being transformed into solutions delivered by and for cloud computing. Join us for CSA Summit 2016 to learn about enterprise progress in shifting to cloud computing and key emerging trends in information security. World leading security experts and cloud providers will discuss global governance, the latest threats, best practices and security innovations.

This seminar is open to all attendees.

View more details »

 

DevOps Connect: Rugged DevOps

Time: 8:30am – 4:30pm
Abstract: The 2nd Annual DevOps Connect: Rugged DevOps Edition at RSA Conference is a day long series of sessions focusing on the DevOps Software Supply Chain. DevOps and Security practitioners combine to talk about real world, enterprise level experience on implementing automation into the Software Supply Chain.

Rugged DevOps is the best shot we have at rising to the challenge of software security through the creation of an automated Software Supply Chain. If you and your company are ready to investigate the advantages of Rugged DevOps and explore the benefits of an automated Software Supply Chain, but are not quite sure on where to get started or why, this day is for you.  

This seminar is open to all attendees.

View more details »

 

Innovation Sandbox -"Most Innovative Start Up” Live

Time: 1:00pm – 4:30pm
Abstract: Witness the Top 10 Finalists battle for the coveted title of Most Innovative Start Up at RSAC Innovation Sandbox Contest. In this fast-pitched session, finalist share why their solution will have the greatest impact on information security in 2016.

This program is open to all attendees.

View more details »

 

Advancing Information Risk Practices Seminar

Time: 1:30pm – 5:00pm
Abstract: Many challenges face today’s Risk Management programs, including how to risk rank security gaps, handling business interactions and forming a qualified resource pool. This half-day seminar will be packed with useful information from a series of respected industry leaders. Discussing successes and pitfalls, these leaders have set out to challenge conventional ideas and pursue cutting edge tactics.

This seminar is open to Full Conference attendees.

View more details »

 

IAPP: Privacy and Security: Working Better Together

Time: 1:30pm – 5:30pm
Abstract: The constant drumbeat of data breaches and privacy gaffes in government and corporations demonstrates the importance of security and privacy working hand in hand. In this session, senior policy and practical privacy and security leaders explain how better privacy, including de-identification, classification, minimization and impact assessments, make better security results. Learn how to bake privacy into product engineering and system design, and put in place the controls to mitigate risk and enhance corporate accountability.

This seminar is open to all attendees.

View more details »

This document was retrieved from https://www.rsaconference.com/events/us16/agenda/monday-activities on Thu, 08 Dec 2016 02:50:31 -0500.
© 2016 EMC Corporation. All rights reserved.