Conference Tracks

  • Analytics & Incident Response

    Analytics & Incident Response covers the application of investigation and analytic techniques that help organizations contain, investigate and resolve incidents in the enterprise. This track also covers threat intelligence gathering and sharing across technologies and organizations.

  • Application Security & DevOps

    The Application Security & DevOps track focuses on topics such as secure application design and development methodologies, as well as agile techniques in application security and the intersection of secure development and security operations (DevOps).

  • Association Special Topics

    Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.

  • C-Suite View

    This track focuses on intersection of business and security. It features experiences and opinions of CXOs and covers the latest trends and issues in information security.

  • Cloud Security & Virtualization

    The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services and virtualization technologies/services, deployment models and extended architectures.

  • Cryptography

    Cryptography is ever-changing and this academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

  • Focus-On

    Continue the conversation in the afternoon with our new Focus-On sessions, which bring some of our most popular speakers and topics back together for a smaller group discussion and Q&A with the presenter. These are discussion based—no new slides will be presented—giving you the opportunity to get up close and personal with others who share your interest in even more depth on the content presented.

  • Governance, Risk & Compliance

    This track covers the creation and implementation of risk management frameworks, compliance-related sessions on standards and instituting governance across the extended enterprise.

  • Hackers & Threats

    Hackers and Threats sessions include discussions about the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems.

  • Hackers & Threats Advanced

    Presents technically advanced content and includes live demos and code dissection.

  • Human Element

    This track explores how people make trust choices, innovative ways to secure the human and how classic attacks now include a human element. Topics include social networking/engineering, insider threats and security awareness.

  • Identity

    This track covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.

  • Industry Experts

    With speakers drawn from top rated RSAC presenters, listen to leading information security professionals talk about today's most pressing matters.

  • Law

    The Law track explores topics ranging from unintended consequences due to legislation, legal rulings, liability, and emerging issues on the legal landscape.

  • Learning Labs

    Learning Labs provide a highly interactive, facilitated learning experience. All of the content is very hands on and small group oriented, and the session is two hours in length. Labs are limited to 50 attendees in order to assure maximum engagement and participation. This year we are offering 12 Labs across a variety of topics, with content targeted at senior security information practitioners (10+years).

  • Mobile Security

    This track provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise. It also includes session on BYOD programs, consumerization, mobile malware, device management and emerging threats to mobile platforms.

  • Policy & Government

    This track features sessions on current and proposed government strategies, policies, legislation and standards that could shape the direction of cloud computing, critical infrastructure protection, public private-partnerships, big data initiatives, cyber threat intelligence sharing, industry standards and security compliance requirements for years to come.

  • Practitioner’s Dilemma

    This half-track bridges the gap between vendors and end user practitioners, helping both of these key audiences understand what is really on the others’ mind and deciphering the issues that prove problematic in helping them succeed with one another.

  • Privacy

    This dedicated half-track explores the privacy issues related to big data, social media, cloud, wearables and other emerging technologies and processes in the enterprise.

  • Professional Development

    Professional Development covers technical and business/management training, professional certifications and career development, as well as staff and personnel management. This track is scheduled on Monday.

  • Protecting Data & Applied Crypto

    This track explores how to classify, track and protect data in the extended enterprise. It covers encryption/tokenization, data protection regulations, DLP and threats to sensitive data, and emerging trends.

  • RSAC Studio

    Become part of our studio audience for a wide assortment of information security topics delivered in short 15-minute formats. See it live in the RSAC TV studio Tuesday through Thursday.

  • Sandbox NEW

    RSA Conference 2016 offers “sandboxes” to learn how to encrypt mobile device emails, surf anonymously online, study the impact of Internet of Things (IoT) vulnerabilities, test network security at SANS NetWars, and experiment on what happens to healthcare, finance or energy sectors when our critical infrastructure (ICS) is tested.

  • Security Basics

    Security Basics explains some of the most important security principles and is designed for practitioners with three years or less of information security experience. It lays a foundation of essential concepts that will enhance understanding of the current advanced security issues that will be discussed during the week. This track is scheduled on Monday.

  • Security Mashup

    This track includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.

  • Security Strategy

    Security Strategy covers the policy, planning and emerging areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes.

  • Sponsor Special Topics

    Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.

  • Technology Infrastructure & Operations

    This track focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, security monitoring, and vulnerability perspectives for security of networks, endpoints, and systems including rights management, mobile systems, devices, and penetration testing.

This document was retrieved from on Sun, 21 Jul 2019 05:34:50 -0400.