Filter Definitions

Below are definitions of some of the advanced filtering options on our Session & Events page.

Core Topics

Analytics, Intelligence & Response
Analytics, Intelligence, & Response covers the application of investigative and analytic techniques that help organizations identify, contain, investigate, and resolve incidents in the enterprise. These sessions also cover threat intelligence gathering, automating response, and sharing across technologies and organizations.

Application Security
Application Security focuses on topics such as secure application design, containerization and secure development methodologies.

Cloud Security & Virtualization
Cloud Security & Virtualization includes sessions on the security aspects of using and leveraging cloud services and virtualization technologies/services, segmentation, deployment models, and extended architectures.

C-Suite View
C-Suite View focuses on intersection of business and security. It features experiences and opinions of CXOs and covers the latest trends and issues in information security.

This academically focused and refereed topic for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

DevOps covers the intersection of secure development and security operations, sharing real-world, enterprise-level experience on this transformation process.

Governance, Risk & Compliance
Governance, Risk & Compliance covers the creation and implementation of risk management frameworks, compliance-related sessions on standards and instituting governance across the extended enterprise. These sessions also contain topics on a wide variety of security metrics and measurements.

Hackers & Threats
Hackers and Threats sessions include discussions about the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. Hackers & Threats Advanced is technically advanced and will include live demos and code dissection.

Human Element
Human Element explores how people make trust choices, innovative ways to secure the human and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, and user behavior analytics.

Identity covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.

The Law sessions explore topics ranging from unintended consequences due to legislation, legal rulings, liability and emerging issues on the legal landscape. 

Machine Learning
Machine Learning sessions examine the applications and limitations of machine learning in cybersecurity, exploring fundamentals, applications, potential to address workforce shortages, and future evolution of capabilitie

Mobile & IoT Security
Mobile & IoT Security provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the implications of the interconnectivity of everything.

Policy & Government
Policy & Government features sessions on current and proposed government policies, legislation and regulations that could shape the direction of global cyber norms, data protection frameworks, artificial intelligence, machine learning, IoT, and industry standards and security compliance requirements for years to come.

Privacy sessions explore the privacy issues related to big data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise.

Professional Development
Professional Development covers technical and business/management training, professional certifications and career development, diversity, as well as staff and personnel management. 

Protecting Data & Applied Crypto
Protecting Data & Applied Crypto explores how to classify, track and protect data in the extended enterprise. It covers encryption, tokenization, data protection regulations, DLP and threats to sensitive data, and emerging trends, including the implications of quantum computing.

Security Strategy
Security Strategy covers the policy, planning and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, cyber-resiliency and cyber-hygiene.

Technology Infrastructure & Operations
Technology Infrastructure & Operations focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, orchestration, security monitoring and vulnerability perspectives for security of networks, endpoints, operational technology and systems.

Delivery Format

Birds of a Feather
Come join us for the Birds of a Feather sessions mornings (7:00 – 7:50 AM) and afternoons (12:40 – 1:30 PM) on Wednesday and Thursday! Grab your breakfast or lunch and bring it to the discussion rooms. Some topics are pre-defined and led by speakers, others will develop organically; by design, this is loosely structured to give you an opportunity to network and set the agenda for discussions of interest to you. Only open to Full Conference attendees. Note: Press is not permitted in Birds of a Feather sessions.

North & South Expo Briefing Centers
Get tactical help with the pressing challenges you face each day. Technical experts from our Expo vendors present short demonstrations to help you make strategic plans and purchase decisions for your organization. 

Classroom sessions are traditional presentations delivered by 1-2 presenters, following slide decks that are available from the Conference site. Presentations are concluded with audience Q&A.

Early Stage Expo Briefing Center
Get tactical help with the pressing challenges you face each day. Technical experts from our Early Stage Expo exhibitors present short demonstrations showcasing new approaches from up and coming vendors. 

Learning Lab
Learning Labs provide highly interactive, facilitated learning experiences. All of the content is very hands-on and small group oriented. Seating is limited in Labs, assuring maximum engagement and participation. Labs are open to Full Conference attendees only; utilize Reserve a Seat to schedule your participation. Due to the popularity of the Learning Labs, you can only reserve one Lab on your schedule, so pick carefully from our 20 great offerings. Note: Press is not permitted in Lab sessions.

Panel Discussion
Panel sessions are traditional format, featuring a moderator and several panelists representing different viewpoints. The discussions are concluded with audience Q&A.

P2P sessions enable groups of no more than 30 people that share a common interest to come together and productively explore a specific security topic, with discussion facilitated by an experienced practitioner. Note: Press is not allowed in Peer2Peer sessions.

RSAC Sandbox 2019 offers hands-on experiences addressing, discussing and simulating threats and vulnerabilities in IoT devices, wireless networks, and industrial control systems. It also features the SANS NetWars experience, where you can challenge your infosec skills. The Sandbox is open to all badge types.

Start your Conference week on a high note, meeting other practitioners and engaging in these focused Monday seminars. Our seminar portfolio and topics have expanded this year, so be sure to explore all of the options.

Trainings & Tutorials
Immerse yourself in an intensive, skill-building 2-day session on Sunday/Monday of Conference week. Trainings & Tutorials are led by respected authorities from the SANS Institute, CSA, ISACA and (ISC)². Please note, the Trainings & Tutorials are available for purchase.

Specialty Tracks

Activities & Events
RSA Conference offers great opportunities to get to know other attendees and build your professional network. Explore these here. 

Association Special Topics
Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs and career development from leaders in the field.

RSAC keynote speakers are inspiring leaders, thinkers, and innovators that will share perspectives and knowledge on the information security industry. Don’t miss the action on two stages this year: South and West.

Security Mashup
Security Mashup includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week. 

Sponsor Special Topics
Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.

This document was retrieved from on Mon, 17 Jun 2019 07:41:30 -0400.