Conference Topics

  • Analytics, Intelligence & Response

    Analytics, Intelligence, & Response covers the application of investigative and analytic techniques that help organizations identify, contain, investigate, and resolve incidents in the enterprise. These sessions also covers threat intelligence gathering, automating response, and sharing across technologies and organizations.

  • Application Security & DevOps

    The Application Security & DevOps track features topics such as secure application design, containerization, and development methodologies, as well as agile techniques in application security and the intersection of secure development and security operations (DevOps).

  • Association Special Topics

    Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.

  • C-Suite View

    This track focuses on intersection of business and security. It features experiences and opinions of CXOs and covers the latest trends and issues in information security.

  • Cloud Security & Virtualization

    Cloud Security & Virtualization includes sessions on the security aspects of using and leveraging cloud services and virtualization technologies/services, segmentation, deployment models, and extended architectures.

  • Cryptography

    Cryptography is ever-changing and this academically focused and refereed topic for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

  • Governance, Risk & Compliance

    Governance, Risk & Compliance covers the creation and implementation of risk management frameworks, compliance-related sessions on standards and instituting governance across the extended enterprise. These sessions also contains topics on a wide variety of security metrics and measurements.

  • Hackers & Threats

    Hackers and Threats sessions include discussions about the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. Hackers & Threats Advanced is technically advanced and will include live demos and code dissection.

  • Human Element

    Human Element explores how people make trust choices, innovative ways to secure the human and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, and user behavior analytics.

  • Identity

    Identity covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.

  • Industry Experts

    With speakers drawn from top rated RSAC presenters, listen to leading information security professionals talk about today's most pressing matters.

  • Law

    The Law sessions explores topics ranging from unintended consequences due to legislation, legal rulings, liability and emerging issues on the legal landscape.

  • Mobile & IoT Security

    Mobile & IoT Security provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the rapid growth of sensors.

  • Peer2Peer Sessions

    The Peer2Peer sessions enable groups of no more than 25 people that share a common interest to come together and productively explore a specific security topic, facilitated by an experienced practitioner.

  • Policy & Government

    Policy & Government features sessions on current and proposed government strategies, policies, legislation and standards that could shape the direction of cloud computing, critical infrastructure protection, public private-partnerships, big data initiatives, cyber threat intelligence sharing, industry standards and security compliance requirements for years to come.

  • Privacy

    Privacy sessions explore the privacy issues related to big data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise.

  • Professional Development

    Professional Development covers technical and business/management training, professional certifications and career development, diversity, as well as staff and personnel management.

  • Protecting Data & Applied Crypto

    Protecting Data & Applied Crypto explores how to classify, track and protect data in the extended enterprise. It covers encryption, tokenization, data protection regulations, DLP and threats to sensitive data, and emerging trends.

  • Security Foundations

    Security Foundations explains some of the most important security principles and is designed for practitioners looking for a holistic view of the current state of information security. It lays a foundation of essential concepts that will enhance understanding of the current advanced security issues that will be discussed during the week.

  • Security Mashup

    Security Mashup includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.

  • Security Strategy

    Security Strategy covers the policy, planning and emerging areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes.

  • Sponsor Special Topics

    Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.

  • Technology Infrastructure & Operations

    Technology Infrastructure & Operations focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, security monitoring, and vulnerability perspectives for security of networks, endpoints, and systems including rights management, mobile systems, devices, and penetration testing.

This document was retrieved from on Tue, 25 Oct 2016 07:59:17 -0400.
© 2016 EMC Corporation. All rights reserved.