Topics & Tracks

Below are the topics and tracks for RSA Conference 2018. Please note, these are subject to change.

Intsights logoAnalytics, Intelligence & Response

Analytics, Intelligence, & Response covers the application of investigative and analytic techniques that help organizations identify, contain, investigate, and resolve incidents in the enterprise. These sessions also cover threat intelligence gathering, automating response, and sharing across technologies and organizations.

Application Security

Application Security focuses on topics such as secure application design, containerization and secure development methodologies.

Association Special Topics

Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.

Oracle logoC-Suite View

C-Suite View focuses on intersection of business and security. It features experiences and opinions of CXOs and covers the latest trends and issues in information security.

AT&T Business logoCloud Security & Virtualization

Cloud Security & Virtualization includes sessions on the security aspects of using and leveraging cloud services and virtualization technologies/services, segmentation, deployment models, and extended architectures.


This academically focused and refereed topic for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

NeuVector logoDevOps

DevOps covers the intersection of secure development and security operations, sharing real-world, enterprise-level experience on this transformation process.

One Trust logoGovernance, Risk & Compliance             

This track covers the creation and implementation of risk management frameworks, compliance-related sessions on standards and instituting governance across the extended enterprise. This track also contains sessions on a wide variety of security metrics and measurements.

Hackers & Threats         

Hackers and Threats sessions include discussions about the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. Hackers & Threats Advanced is technically advanced and will include live demos and code dissection.

Human Element             

Human Element explores how people make trust choices, innovative ways to secure the human and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, and user behavior analytics.


This track covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.

Intsights logoIndustry Experts            

Leading information security professionals talk about today's most pressing matters.


The Law sessions explore topics ranging from unintended consequences due to legislation, legal rulings, liability and emerging issues on the legal landscape.

Machine Learning

Machine Learning sessions examine the applications and limitations of machine learning in cybersecurity, exploring fundamentals, applications, potential to address workforce shortages, and future evolution of capabilities. 

AT&T Business logoMobile & IoT Security   

Mobile & IoT Security provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the implications of the interconnectivity of everything.

Policy & Government   

Policy & Government features sessions on current and proposed government policies, legislation and regulations that could shape the direction of global cyber norms, data protection frameworks, artificial intelligence, machine learning, IoT, and industry standards and security compliance requirements for years to come.

One Trust logoPrivacy

Privacy sessions explore the privacy issues related to big data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise. 

Professional Development

Professional Development covers technical and business/management training, professional certifications and career development, diversity as well as staff and personnel management. 

Protecting Data & Applied Crypto

Protecting Data & Applied Crypto explores how to classify, track and protect data in the extended enterprise. It covers encryption, tokenization, data protection regulations, DLP and threats to sensitive data, and emerging trends, including the implications of quantum computing. 

Security Mashup

This track includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.

Security Strategy

Security Strategy covers the policy, planning and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, cyber-resiliency and cyber-hygiene.

Sponsor Special Topics

Listen to a spectrum of experts and security issues delivered and discussed by leading-edge companies.

Technology Infrastructure & Operations

Technology Infrastructure & Operations focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, orchestration, security monitoring and vulnerability perspectives for security of networks, endpoints, operational technology and systems.


This document was retrieved from on Sun, 18 Aug 2019 17:40:58 -0400.