Menu

Sessions & Events

Sunday, February 28, 2016

  • (ISC)² CISSP Two-day Crash Course

    • 8:30am – 4:30pm | West | 3010 | TRN-I02

    Led by (ISC)² authorized instructor, Kevin Stoffell, the CISSP 2-day Crash Course will cover the eight domains in the Certified Information Systems Security Professional (CISSP) CBK. This training…

    Participant:
    Kevin Stoffell - Cyber Security Architect, Battelle
  • (ISC)² CCSP Two-day Crash Course

    • 8:30am – 4:30pm | West | 3012 | TRN-IO1

    The (ISC)2 Certified Cloud Security Professional certification credential exemplifies an excellence of skills and demonstrates your knowledge of the latest security topics involving cloud computing, …

    Participant:
    George Murphy - CEO, National One Training
  • SANS: Critical Security Controls: Planning, Implementing and Auditing

    • 8:30am – 4:30pm | West | 3002 | TUT-S21

    This course helps you master specific, proven techniques and tools needed to implement and audit the Top Twenty Most Critical Security Controls. These Top 20 Security Controls, listed below, are…

    Participant:
    James Tarala - Senior Faculty & Analyst, The SANS Institute, Principal Consultant, Enclave Security
  • SANS: Social Engineering for Pen Testers

    • 8:30am – 4:30pm | West | 3004 | TUT-S22

    Social Engineering for Penetration Testers provides the blend of knowledge required to add social engineering skills to your penetration testing portfolio. Successful social engineering utilizes…

    Participant:
    Dave Shackleford - Faculty, SANS
  • SANS: A Practical Introduction to Cyber Security Risk Management

    • 8:30am – 4:30pm | West | 3006 | TUT-S23

    In this course students will learn the practical skills necessary to perform regular risk assessments for their organizations. The ability to perform risk management is crucial for organizations…

    Participant:
    Russell Eubanks - SANS Instructor
  • SANS: Introduction to Malware Analysis: Hands-on and Technical

    • 8:30am – 4:30pm | West | 3008 | TUT-S25

    Supercharge your incident response and forensics skills by learning key malware analysis tools and techniques. These skills have become critical to an organization's ability to derive threat…

    Participant:
    Lenny Zeltser - Senior Faculty Member, SANS Institute
  • CyberSmart Parents Education Workshop

    • 10:00am – 12:00pm | North | 131 | CPW-S01
    • 1:00pm – 3:00pm | North | 131 | CPW-S01

    As part of RSA Conference’s goal to expand its “CyberSafety: Kids” philanthropic outreach program, we will host a one-day event --CyberSmart: Parents Education Workshop -- prior to the kick-off of…

    Participants:
    Christopher Servat - Sergeant, San Francisco Police Department
    Erica Pelavin - Co-Founder, My Digital TAT2
    Gloria Moskowitz-Sweet - Co-Founder, My Digital TAT2
    Lance Spitzner - Director, SANS Securing the Human
    Larry Magid - CEO, ConnectSafely.org
    Stephen Balkam - Founder & CEO, Family Online Safety Institute

Monday, February 29, 2016

  • Introduction and a Look at Security Trends

    • 8:30am – 9:20am | West | 3018 | BAS-M01

    The security industry has significantly changed over the last 25 years, as reflected in the content at RSA Conference. This introductory session will look at some of the major shifts, the economics…

    Conference Track:
    Participant:
    Hugh Thompson - Program Committee, RSA Conference
  • CSA Summit 2016: Cloudifying Information Security

    • 8:30am – 4:00pm | West | 2014 | CSA-M01

    The information security industry is rapidly being transformed into solutions delivered by and for cloud computing. Join us for CSA Summit 2016 to learn about enterprise progress in shifting to cloud…

  • DevOps Connect: Rugged DevOps

    • 8:30am – 4:30pm | West | 2018 | DOC-M01

    The 2nd Annual DevOps Connect: Rugged DevOps Edition at RSA Conference is a day long series of sessions focusing on the DevOps Software Supply Chain. DevOps and Security practitioners combine to talk…

    Participants:
    Jez Humble - Founder, Jez humble & Associates LLC
    John Willis - Evangelist, Docker Inc.
    Joshua Corman - Director of the Cyber Statecraft Initiative, The Atlantic Council
    Kim Zetter - Senior Reporter, Wired
  • So You Want to Run Your Own Security Business?

    • 8:30am – 9:20am | West | 3014 | PROF-M01

    “We charged the customer $10K for that? Man, I should go into business for myself and make a mint!” A common lament among many security professionals, but is going into business for yourself all its…

    Conference Track:
    Participant:
    Doug Landoll - CEO, Lantego
  • Information Security Leadership Development: Surviving as a Security Leader

    • 8:30am – 11:30am | West | 3022 | SEM-M01

    In conventional security training, there are few opportunities to learn how to develop and direct a successful information security program. Experienced security leaders deliver a morning seminar…

    Participants:
    Bruce Bonsall - Principal Consultant, Bruce Bonsall LLC
    Evan Wheeler - Executive Director, Operational Risk Management, DTCC
    JB Rambaud - Managing Director, Stroz Friedberg LLC
    Julie Fitton - Chief Information Security Officer, EMC Cloud Services
    Malcolm Harkins - Global CISO, Cylance Corporation
  • TCG: Securing the IoT with Trusted Computing

    • 8:30am – 12:30pm | West | 2006 | TCG-M01

    The root of security for IoT begins with trust - including trusted device identity and secure communications with protection of sensitive information. These foundational elements must come together to…

    Participants:
    Darin Andersen - Chairman and Founder, CyberTECH
    Doug Cahill - Senior Analyst, Enterprise Strategy Group
    Lawrence Ponemon - Chairman and Founder, Ponemon Institute
    Lee Wilson - Business Development Engineer, Security Innovation
    Max Senges - Research Manager, Google
    Paul England - Software Architect, Microsoft
    Paul Roberts - Editor in Chief, The Security Ledger
    Steve Venema - Polyverse
    Tony Sager - Senior VP and Chief Evangelist, Center for Internet Security
  • (ISC)² CISSP Two-day Crash Course

    • 8:30am – 4:30pm | West | 3010 | TRN-I02

    Led by (ISC)² authorized instructor, Kevin Stoffell, the CISSP 2-day Crash Course will cover the eight domains in the Certified Information Systems Security Professional (CISSP) CBK. This training…

    Participant:
    Kevin Stoffell - Cyber Security Architect, Battelle
  • (ISC)² CCSP Two-day Crash Course

    • 8:30am – 4:30pm | West | 3012 | TRN-IO1

    The (ISC)2 Certified Cloud Security Professional certification credential exemplifies an excellence of skills and demonstrates your knowledge of the latest security topics involving cloud computing, …

    Participant:
    George Murphy - CEO, National One Training
  • SANS: Critical Security Controls: Planning, Implementing and Auditing

    • 8:30am – 4:30pm | West | 3002 | TUT-S21

    This course helps you master specific, proven techniques and tools needed to implement and audit the Top Twenty Most Critical Security Controls. These Top 20 Security Controls, listed below, are…

    Participant:
    James Tarala - Senior Faculty & Analyst, The SANS Institute, Principal Consultant, Enclave Security
  • SANS: Social Engineering for Pen Testers

    • 8:30am – 4:30pm | West | 3004 | TUT-S22

    Social Engineering for Penetration Testers provides the blend of knowledge required to add social engineering skills to your penetration testing portfolio. Successful social engineering utilizes…

    Participant:
    Dave Shackleford - Faculty, SANS
  • SANS: A Practical Introduction to Cyber Security Risk Management

    • 8:30am – 4:30pm | West | 3006 | TUT-S23

    In this course students will learn the practical skills necessary to perform regular risk assessments for their organizations. The ability to perform risk management is crucial for organizations…

    Participant:
    Russell Eubanks - SANS Instructor
  • SANS: Introduction to Malware Analysis: Hands-on and Technical

    • 8:30am – 4:30pm | West | 3008 | TUT-S25

    Supercharge your incident response and forensics skills by learning key malware analysis tools and techniques. These skills have become critical to an organization's ability to derive threat…

    Participant:
    Lenny Zeltser - Senior Faculty Member, SANS Institute
  • VMware: The Future State of Security Starts with Virtualization

    • 8:30am – 12:30pm | West | 2022 | VMW-M01

    As network virtualization transforms networking into a software industry, it gives rise to new technologies and use cases, accelerating innovation throughout the business. But how will network…

    Participants:
    Guido Appenzeller - Chief Technology Strategy Officer, VMware, Inc.
    Tom Corn - Senior Vice President, Security, VMware, Inc.
  • Who Are You? From Meat to Electrons and Back Again

    • 9:30am – 10:20am | West | 3018 | BAS-M02

    Authentication technologies are intersecting science fiction and comedy. A flyby of recently discovered and invented mechanisms to digitally identify a person makes it clear that it’s not for lack of…

    Conference Track:
    Participant:
    Michael Schwartz - Founder / CEO, Gluu
  • Hackers Hiring Hackers—How to Do Things Better

    • 9:30am – 10:20am | West | 3014 | PROF-M02

    Information security is in desperate need of people with the technical skills of hackers to fill a myriad of roles within organizations across the world. This talk takes the experiences of the…

    Conference Track:
    Participants:
    Magen Wu - Security Consultant, Rapid7
    Tim O'Brien - CTO/CISO, Xero Equipment
  • Innovation in Network Security

    • 10:30am – 11:20am | West | 3018 | BAS-M03

    The networks we use to deliver services are evolving. Applications and services are virtualized and moving to the cloud. An eight-step process is used to put a structure to make sense of the threat…

    Conference Track:
    Participant:
    Michael Geller - Principal Engineer, Cisco Systems, Inc.
  • Bridging the Great Minority Cyber-Divide—Social and Cultural Dynamics

    • 10:30am – 11:20am | West | 3014 | PROF-M03

    An impassioned panel of security industry experts will highlight the efforts underway to “Bridging the Great Minority Cyber-Divide” and what remains to be done to realize the social and economic…

    Conference Track:
    Participants:
    Yonesy Núñez - Information Security Leader, Wells Fargo
    Cecily Joseph - Vice President, Corporate Responsibility & Chief Diversity Officer, Symantec Corporation
    Devon Bryan - VP, Global CISO, Federal Reserve System
    Kevin McKenzie - CISO & Executive Director of the Office of Information Security and Privacy, Clemson University
  • Demystifying a Malware Attack

    • 11:30am – 12:20pm | West | 3018 | BAS-M04

    The media reports different malware attacks, different lamentations from those affected and different opinions of industry experts. What is lost in the conversation is the background: how are these…

    Conference Track:
    Participant:
    Christopher Elisan - Principal Malware Scientist, RSA
  • How to Explain Cybersecurity to the Board Using a Simple Metaphor: FIRE

    • 11:30am – 12:20pm | West | 3014 | PROF-M04

    Using lessons from firefighting and the great fires of London and Chicago, this session will give attendees metaphors and stories they can use today to communicate core cybersecurity concepts to the…

    Conference Track:
    Participant:
    John Elliott - Head of Payment Security, easyJet
  • Innovation Sandbox - "Most Innovative Startup" Live

    • 1:00pm – 4:30pm | South | The Viewing Point at Gateway | ISB-M01

    Witness the Top 10 Finalists battle for the coveted title of 2016 Most Innovative Startup at RSAC Innovation Sandbox Contest. In this fast-pitched session, finalist share why their solution will have…

    Participants:
    Enrique Salem - Managing Director, Bain Capital Ventures
    Peter Singer - Author and Geopolitical Strategist, New America Foundation
    Ron Miller - Enterprise Reporter, TechCrunch
  • IAPP: Privacy and Security: Working Better Together

    • 1:30pm – 5:30pm | West | 2022 | IAPP-M01

    The constant drumbeat of data breaches and privacy gaffes in government and corporations demonstrates the importance of security and privacy working hand in hand. In this session, senior policy and…

    Participants:
    Aaron Burstein - Senior Legal Advisor, Federal Trade Commission
    Ari Schwartz - Managing Director of Cybersecurity Services, Venable LLP
    Ashkan Soltani - Independent Researcher
    Eduardo Ustaran - Partner, Hogan Lovells International LLP
    Harriet Pearson - Partner, Hogan Lovells
    Jamie Danker - Director, Senior Privacy Officer, DHS National Programs and Protection Directorate
    Omer Tene - Vice President of Research and Education, IAPP
    Ruby Zefo - Vice President, Chief Privacy & Security Counsel, Intel Corp.
    Sagi Leizerov - Executive Director, Americas Leader for Privacy Services, Ernst & Young
  • Advancing Information Risk Practices Seminar

    • 1:30pm – 5:00pm | West | 3022 | SEM-M02

    Many challenges face today’s Risk Management programs, including how to rank risk security gaps, handle business interactions and form a qualified resource pool. This half-day seminar will be packed…

    Participants:
    Evan Wheeler - Executive Director, Operational Risk Management, DTCC
    Jay Jacobs - Sr. Data Scientist, BitSight Technologies
    Julie Fitton - Chief Information Security Officer, EMC Cloud Services
    Marshall Kuypers - PhD Candidate, Stanford University
    Wade Baker - VP, Innovation & Analytics, ThreatConnect
  • Crypto 101: Encryption, Codebreaking, SSL and Bitcoin

    • 1:50pm – 2:50pm | West | 3018 | BAS-M06

    Cryptography is the underpinning of digital security. Get introduced to the building blocks of crypto, how they’re applied to secure web connections and bitcoin, and how cryptosystems are attacked in…

    Conference Track:
    Participant:
    Benjamin Jun - Chief Company Builder, HVF Labs
  • Should I Stay or Should I Go? How to Attract/Retain Women in the Industry

    • 1:50pm – 2:50pm | West | 3014 | PROF-M06

    The panelists will provide insight into the findings of the 2015 (ISC)2 Global Information Security Workforce Study and discuss how these findings relate to real-world experiences for women in…

    Conference Track:
    Participants:
    Elise Yacobellis - Director of Business Development, Americas, (ISC)2
    Angela Messer - Executive Vice President, Booz Allen Hamilton
    Gurdeep Kaur - Chief Security Architect, AIG
    Kerry Matre - Security Services, Hewlett Packard Enterprise
    Ping Look - Director, Information Security, Optiv
  • Take It to the Cloud: The Evolution of Security Architecture

    • 3:00pm – 3:50pm | West | 3018 | BAS-M07

    As companies evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This session will review some of the new risks introduced by SaaS/IaaS adoption and show how…

    Conference Track:
    Participant:
    Dana Wolf - Head of Products, OpenDNS (Cisco)
  • From Cave Man to Business Man, the Evolution of the CISO to CIRO

    • 3:00pm – 3:50pm | West | 3014 | PROF-M07

    The CISO is evolving to CIRO. Successful IT security leaders are transforming their skills to meet the demands for today and future needs of their organization. A CIRO understands how to prepare board…

    Conference Track:
    Participant:
    James Christiansen - VP, Third Party Risk Programs, Optiv
  • A New Security Paradigm for IoT (Internet of Threats)

    • 4:00pm – 5:00pm | West | 3018 | BAS-M08

    All facets of computing have changed since the 1950s, except the security posture of our systems; nowhere is this more the case than in mobile and IoT. Some of our security foundations are outdated:…

    Conference Track:
    Participant:
    Hadi Nahari - Founder, R62 Security
  • Cybersecurity Education and Workforce Development for the Nation

    • 4:00pm – 5:00pm | West | 3014 | PROF-M08

    The National Initiative for Cybersecurity Education (NICE) - a partnership between government, academia, and the private sector - is working to energize and promote a robust network and an ecosystem…

    Conference Track:
    Participants:
    Karen Evans - National Director for U.S. Cyber Challenge (USCC), Center for Internet Security
    Benjamin Scribner - Program Director, National Cybersecurity Professionalization & Workforce Development, Department of Homeland Security
    Don Davidson - Deputy Director, Cybersecurity Implementation & Acquisition Integration, and Chief Cybersecurity Lifecycle Risk Management Division, Office of the Deputy DoD-CIO for Cybersecurity
    Greg Rattray - Director of Global Cyber Partnerships & Government Strategy, JPMorgan Chase & Co.
    Rodney Petersen - Director, National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology

Tuesday, March 1, 2016

Wednesday, March 2, 2016

Thursday, March 3, 2016

Friday, March 4, 2016

This document was retrieved from https://www.rsaconference.com/events/us16/agenda/sessions on Fri, 30 Sep 2016 04:19:24 -0400.
© 2016 EMC Corporation. All rights reserved.