Topics & Tracks

Below are the topics and tracks for RSA Conference 2018. Please note, these are subject to change.

Analytics, Intelligence & Response

Analytics, Intelligence & Response covers the application of investigative and analytic techniques that help organizations identify, contain, investigate, and resolve incidents in the enterprise. This track also covers artificial intelligence, threat intelligence gathering, automating response, and sharing across technologies and organizations.

Application Security

Application Security focuses on topics such as secure application design, containerization and secure development methodologies.

Association Special Topics

Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.

C-Suite View

This track focuses on intersection of business and security. It features experiences and opinions of CXOs, communicating cyber-risk to the board, and the latest trends and issues in information security that impact the executive suite.

Cloud Security & Virtualization

The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services and virtualization technologies/services, segmentation, deployment models, network function virtualization and hybrid architectures.


This academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.


DevOps covers the intersection of secure development and security operations, sharing real-world, enterprise-level experience on this transformation process.

Governance, Risk & Compliance             

This track covers the creation and implementation of risk management frameworks, compliance-related sessions on standards and instituting governance across the extended enterprise. This track also contains sessions on a wide variety of security metrics and measurements.

Hackers & Threats         

Hackers & Threats sessions include discussions about the growing underground economy, advanced threats, ransomware, cyber-weapons, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. The second track, Hackers & Threats Advanced, is technically advanced and will include live demos and code dissection.

Human Element             

This track explores how people make trust choices, innovative ways to secure the human and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, information operations and user behavior analytics.


This track covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.

Industry Experts            

With speakers drawn from top-rated RSAC presenters, listen to leading information security professionals talk about today’s most pressing matters.


The Law track explores topics ranging from unintended consequences due to legislation, legal rulings, liability and emerging issues on the legal landscape.

Mobile & IoT Security   

This track provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the implications of the interconnectivity of everything.

Policy & Government   

This track features sessions on current and proposed government strategies, policies, legislation and standards that could shape the direction of cloud computing, cyber-norms, public private-partnerships, Big Data initiatives, cyberthreat intelligence sharing, industry standards and security compliance requirements for years to come.


This dedicated half-track explores the privacy issues related to Big Data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise.

Professional Development

Professional Development covers technical and business/management training, professional certifications and career development, diversity as well as staff and personnel management. 

Protecting Data & Applied Crypto

This track explores how to classify, track and protect data in the extended enterprise. It covers encryption, tokenization, data protection regulations, DLP and threats to sensitive data, and emerging trends, including the implications of quantum computing.

Security Mashup

This track includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.

Security Strategy

Security Strategy covers the policy, planning and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, cyber-resiliency and cyber-hygiene.

Sponsor Special Topics

Listen to a spectrum of experts and security issues delivered and discussed by leading-edge companies.

Technology Infrastructure & Operations

This track focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, orchestration, security monitoring and vulnerability perspectives for security of networks, endpoints, operational technology and systems.


This document was retrieved from on Wed, 22 Nov 2017 20:56:11 -0500.
© 2017 EMC Corporation. All rights reserved.