Conference Tracks
-
Analytics & Incident Response
Analytics & Incident Response covers the application of investigation and analytic techniques that help organizations contain, investigate and resolve incidents in the enterprise. This track also covers threat intelligence gathering and sharing across technologies and organizations.
-
Application Security & DevOps
The Application Security & DevOps track focuses on topics such as secure application design and development methodologies, as well as agile techniques in application security and the intersection of secure development and security operations (DevOps).
-
Association Special Topics
Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.
-
C-Suite View
This track focuses on intersection of business and security. It features experiences and opinions of CXOs and covers the latest trends and issues in information security.
-
Cloud Security & Virtualization
The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services and virtualization technologies/services, deployment models and extended architectures.
-
Cryptography
Cryptography is ever-changing and this academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.
-
Focus-On
Continue the conversation in the afternoon with our new Focus-On sessions, which bring some of our most popular speakers and topics back together for a smaller group discussion and Q&A with the presenter. These are discussion based—no new slides will be presented—giving you the opportunity to get up close and personal with others who share your interest in even more depth on the content presented.
-
Governance, Risk & Compliance
This track covers the creation and implementation of risk management frameworks, compliance-related sessions on standards and instituting governance across the extended enterprise.
-
Hackers & Threats
Hackers and Threats sessions include discussions about the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems.
-
Hackers & Threats Advanced
Presents technically advanced content and includes live demos and code dissection.
-
Human Element
This track explores how people make trust choices, innovative ways to secure the human and how classic attacks now include a human element. Topics include social networking/engineering, insider threats and security awareness.
-
Identity
This track covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.
-
Industry Experts
With speakers drawn from top rated RSAC presenters, listen to leading information security professionals talk about today's most pressing matters.
-
Law
The Law track explores topics ranging from unintended consequences due to legislation, legal rulings, liability, and emerging issues on the legal landscape.
-
Learning Labs
Learning Labs provide a highly interactive, facilitated learning experience. All of the content is very hands on and small group oriented, and the session is two hours in length. Labs are limited to 50 attendees in order to assure maximum engagement and participation. This year we are offering 12 Labs across a variety of topics, with content targeted at senior security information practitioners (10+years).
-
Mobile Security
This track provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise. It also includes session on BYOD programs, consumerization, mobile malware, device management and emerging threats to mobile platforms.
-
Policy & Government
This track features sessions on current and proposed government strategies, policies, legislation and standards that could shape the direction of cloud computing, critical infrastructure protection, public private-partnerships, big data initiatives, cyber threat intelligence sharing, industry standards and security compliance requirements for years to come.
-
Practitioner’s Dilemma
This half-track bridges the gap between vendors and end user practitioners, helping both of these key audiences understand what is really on the others’ mind and deciphering the issues that prove problematic in helping them succeed with one another.
-
Privacy
This dedicated half-track explores the privacy issues related to big data, social media, cloud, wearables and other emerging technologies and processes in the enterprise.
-
Professional Development
Professional Development covers technical and business/management training, professional certifications and career development, as well as staff and personnel management. This track is scheduled on Monday.
-
Protecting Data & Applied Crypto
This track explores how to classify, track and protect data in the extended enterprise. It covers encryption/tokenization, data protection regulations, DLP and threats to sensitive data, and emerging trends.
-
RSAC Studio
Become part of our studio audience for a wide assortment of information security topics delivered in short 15-minute formats. See it live in the RSAC TV studio Tuesday through Thursday.
-
Sandbox NEW
RSA Conference 2016 offers “sandboxes” to learn how to encrypt mobile device emails, surf anonymously online, study the impact of Internet of Things (IoT) vulnerabilities, test network security at SANS NetWars, and experiment on what happens to healthcare, finance or energy sectors when our critical infrastructure (ICS) is tested.
-
Security Basics
Security Basics explains some of the most important security principles and is designed for practitioners with three years or less of information security experience. It lays a foundation of essential concepts that will enhance understanding of the current advanced security issues that will be discussed during the week. This track is scheduled on Monday.
-
Security Mashup
This track includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.
-
Security Strategy
Security Strategy covers the policy, planning and emerging areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes.
-
Sponsor Special Topics
Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.
-
Technology Infrastructure & Operations
This track focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, security monitoring, and vulnerability perspectives for security of networks, endpoints, and systems including rights management, mobile systems, devices, and penetration testing.