Menu

Keynotes

Below is the initial line-up of keynote speakers for RSA Conference 2019. Check back periodically to see an updated list as we get further speaker confirmations. New this year, RSA Conference will have two keynote stages: West Stage keynotes will continue to feature sponsor keynotes, panels and esteemed guest speakers, and South Stage keynotes will utilize the newly opened Moscone Center South to bring highly coveted sessions from industry experts to a broader audience.

Speakers are listed in alphabetical order. Please note: Reserve a Seat does not apply to the keynotes. All keynote seating is first-come, first-served, so be sure to arrive early.


KeynoteEngineering Trust and Security in the Cloud Era, Based on Lessons from the Early Internet

Friday, March 8, 11:10 AM - 12:00 PM | South Stage

Panelist: Suzanne Frey, Vice President, Engineering, Google Cloud
Panelist: Amin Vadhat, Google Fellow and Networking Technical Lead, Google
Moderator: Quentin Hardy, Head of Editorial, Google Cloud 


Crypto Panel

The Cryptographers’ Panel

Tuesday, March 5, 9:20 – 10:05 AM | West Stage

Panelist: Whitfield Diffie, Cryptographer and Security Expert, Cryptomathic
Panelist: Shafi Goldwasser, Director, Simons Institute for the Theory of Computing
Panelist: Ronald Rivest, Professor, Massachusetts Institute of Technology
Panelist: Adi Shamir, Borman Professor of Computer Science, The Weizmann Institute, Israel
Moderator: Zulfikar Ramzan, Ph.D, Chief Technology Officer, RSA


panelThe Future of Data Protection: Adapting to the Privacy Imperative Panel

Thursday, March 7, 2:50 – 3:40 PM | South Stage

Panelist: Kalinda Raina, Senior Director and Head of Global Privacy, LinkedIn
Panelist: Ruby Zefo, Chief Privacy Officer, Uber
Moderator: J. Trevor Hughes, President and Chief Executive Officer, IAAP


SANS panelThe SANS Institute Panel

The Five Most Dangerous New Attack Techniques and How to Counter Them 

Thursday, March 7, 10:55 – 11:40 AM | West Stage

Panelist: Heather Mahalik, Director of Forensics Engineering at ManTech and Mobile Forensics Course and Director at SANS Institute
Panelist: Ed Skoudis, Instructor, SANS Institute
Panelist: Johannes Ullrich, Dean of Research, SANS Technology Institute
Moderator: Alan Paller, Research Director and Founder, SANS Institute


Sylvia AcevedoSylvia Acevedo
Chief Executive Officer, Girl Scouts of the USA

(Girl) Scouting for Talent: The Solution in the Next Generation

Friday, March 8, 9:50 – 10:40 AM | South Stage

Sylvia Acevedo, the Chief Executive Officer of Girl Scouts of the USA, is committed to serving all girls with cutting-edge, research-backed, and girl-centered programming that ensures the country’s workforce pipeline is filled with true go-getters, innovators, risk-takers, and leaders—what Girl Scouts call G.I.R.L.s. At Girl Scouts, Sylvia first discovered her passion for space and astronomy that would lead her to a career as a rocket scientist at NASA’s Jet Propulsion Laboratory, and award-winning STEM entrepreneur with technology companies such as Apple, Dell, and IBM. Sylvia was one of the first Hispanic students to earn a graduate engineering degree from Stanford University—an MS in industrial engineering. She is the author of Path to the Stars: My Journey from Girl Scout to Rocket Scientist, a memoir for students meant to inspire them to live the life of their dreams.


Dimitri and GeorgeDmitri Alperovitch
Co-Founder and Chief Technology Officer, CrowdStrike

George Kurtz 
Chief Executive Officer, CrowdStrike

Hacking Exposed: Hacking Macs

Thursday, March 7, 9:20 – 10:10 AM | South Stage

Dmitri Alperovitch is Co-Founder and Chief Technology Officer of CrowdStrike. A renowned Researcher, he is a thought-leader on cybersecurity strategy and has served as Special Advisor to Department of Defense. In 2016, Alperovitch revealed Russian intelligence agencies’ hack of the Democratic National Committee (DNC), events which unveiled the full scope of cyber-influence operations being launched against the 2016 US election. In 2010 and 2011, Alperovitch led the global team that investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions, and gave those incidents their names. He has received numerous awards and recognitions, including Fortune’s “40 Under 40,” Politico 50, MIT’s “Innovators Under 35” and Foreign Policy’s Leading Global Thinker.

George Kurtz, President/Chief Executive Officer and Co-Founder of CrowdStrike, former Chief Executive Officer/Founder, Foundstone, and former Executive Vice President and worldwide Chief Technology Officer of McAfee, is an internationally recognized Security Expert, Author and Entrepreneur. Kurtz holds a BS degree from Seton Hall University. He also holds several industry designations, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Certified Public Accountant (CPA). Kurtz also authored the best-selling security book of all time, Hacking Exposed: Network Security Secrets & Solutions


Caleb and MaryCaleb Barlow
Vice President, IBM Security, X-Force Threat Intelligence

Mary O’Brien
General Manager, IBM Security

Thursday, March 7, 10:30 – 10:55 AM | West Stage

Caleb Barlow is an accomplished security professional and Vice President at IBM Security where he leads IBM's X-Force Threat Intelligence organization. He was the visionary behind X-Force Command—the world’s most sophisticated watch floor and cyber-range. Barlow has a broad background having led technical teams in product development, product management, strategy, marketing and cloud service delivery. He has led multiple acquisitions including Fiberlink MaaS360 and Net Integration Technologies. Barlow routinely advises chief information security officers, boards of directors and government officials on security practices, frameworks and strategies to manage the business risk associated with cybersecurity. 

Mary O’Brien is the General Manager of IBM Security, the largest enterprise security company in the world. She leads a global team, focused on delivering IBM’s extensive security product and services portfolio. She is a strategic partner to many CEOs, CISOs and CIOs on cybersecurity, AI and IT strategy. Before taking over as head of the IBM Security unit, O’Brien led research and development for the division. A lifelong engineer, O’Brien has more than 30 years of industry experience developed through tenures in the UK, US and Ireland. 


Donna BrazileDonna Brazile
Veteran Democratic Political Strategist, Adjunct Professor, Author and Syndicated Columnist

Mary Matalin
Celebrated Conservative Voice and Former Presidential Advisor

Wednesday, March 6, 4:25 – 4:55 PM | West Stage

Donna Brazile is the former Interim Chair of the Democratic National Committee. She is the Gwendolyn S. and Colbert I. King Endowed Chair in Public Policy at Howard University and an Adjunct Professor at Georgetown University. Brazile has worked on every presidential campaign since 1976. In 2000, she was Al Gore’s Campaign Manager making her the first African American to serve as campaign manager for a major presidential campaign. Brazile has lectured at over 215 colleges and universities and has received over a dozen honorary doctorate degrees. She is a New York Times best-selling Author. 

One of the country’s foremost conservative political strategists and commentators, Mary Matalin is admired for her astute insights, intellectual integrity and her no-nonsense take on the hot-button issues and political headlines of the day. Matalin served as Deputy Campaign Manager on President George H. W. Bush’s 1992 re-election bid and was later Assistant to President George W. Bush and Counselor to Vice President Dick Cheney. She co-authored All’s Fair: Love, War, and Running for President, a national best seller written with her husband, James Carville. Matalin also authored Letters to My Daughters, co-starred on the HBO series K Street, produced by George Clooney, and co-hosted the Both Sides Now radio program.


Liz & Matt

Liz Centoni
Senior Vice President | General Manager, Cisco IoT, Cisco

Matt Watchinski
Vice President, Global Threat Intelligence Group, Talos, Cisco

Rise of the Machines: Staying Ahead of the Next Threat

Tuesday, March 5, 8:55 – 9:15 AM | West Stage

As Senior Vice President | General Manager of Cisco’s IoT Business Group, Liz Centoni sets the business and engineering direction, strategy and solutions. Since joining Cisco in 2000, Centoni has excelled in numerous engineering senior leadership roles, including Senior Vice President | General Manager, Computing Systems Product Group and Vice President, Engineering Strategy and Portfolio Planning. At Cisco, she launched the Women in Engineering Leadership Forum. Centoni holds a bachelor of science in chemistry with a minor in physics and math from the University of Mumbai.

With more than 300 researchers around the globe, Talos is the largest commercial threat intelligence group in the world. Matt Watchinski oversees all the intelligence activities necessary to support Cisco’s security products and services that keep customers safe. Watchinski previously ran the Vulnerability Research Team for Sourcefire and was responsible for threat intelligence and detection. After Cisco’s acquisition of Sourcefire, Watchinski began focusing his leadership and passion for protecting customers toward personnel and resources within Cisco, which eventually led to the creation of Talos. Watchinski serves on the Cyber Threat Alliance’s (CTA) board, helping to facilitate cooperation and intelligence-sharing between its members for the betterment of all of its mutual customers.


John ChambersJohn T. Chambers
Founder and Chief Executive Officer, JC2 Ventures, Former Chairman and Chief Executive Officer, Cisco

Diane Brady
Award-Winning Writer, Author and Consultant

Thursday, March 7, 4:45 – 5:30 PM | West Stage

John Chambers, Founder and Chief Executive Officer of JC2 Ventures, focuses on helping disruptive startups from around the world build and scale. He invests in companies that are leading market transitions, such as Aspire Food Group, Balbix, Bloom Energy, Dedrone, IoTium, Lucideus, OpenGov, Pindrop, Privoro, Rubrik, SparkCognition, Sprinklr and Uniphore. He serves on the boards of directors for Bloom Energy, OpenGov, Pindrop and Sprinklr. Chambers is the Author of Connecting the Dots: Lessons for Leadership in a Startup World, where he shares new rules for disruption and lasting success in the Digital Age. Prior to founding JC2 Ventures, Chambers spent 25+ years with Cisco, serving as Chief Executive Officer, Chairman and Executive Chairman.

Diane Brady is an award-winning Writer, Author and Consultant who loves to connect people and ideas in ways that spark fresh thinking. She has interviewed many of the world’s leading business and political figures for publications like Bloomberg BusinessweekThe Wall Street Journal and Maclean’s. She has written two books, including Connecting the Dots with John Chambers, and has a regular guest spot on BBC World. Through her company, Brady now works with leaders and partners to reach audiences through compelling conversations and content. 


Josh & Christina

Josh Corman
Chief Security Officer, PTC

Dr. Christina Maslach
Professor of Psychology, Emerita, University of California, Berkeley

Stress, Burnout and You: Fireside Chat with Dr. Christina Maslach

Thursday, March 7, 8:00 – 8:50 AM | South Stage

Joshua Corman is a Founder of I am The Cavalry (dot org) and Chief Security Officer for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, Chief Technology Officer for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst and strategy roles. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. Corman’s unique approach to security in the context of human factors, adversary motivations and social impact has helped position him as one of the most trusted names in security. He also serves as an adjunct faculty for Carnegie Mellon’s Heinz College and on the Congressional Task Force for Healthcare Industry Cybersecurity.

Christina Maslach is a Professor of Psychology (Emerita) and a Researcher at the Healthy Workplaces Center at the University of California, Berkeley. She received her AB from Harvard, and her Ph.D. from Stanford. She is widely recognized as one of the pioneering researchers on job burnout, who has written numerous articles and books, and has developed the leading research measure (the Maslach Burnout Inventory). Several of her articles have received awards for their significance and high impact. She has received a lifetime career achievement award for her burnout research, as well as several teaching and service awards, and was given national recognition as Professor of the Year.


Amit & Karen

Dr. Amit Elazari Bar On
Director, Global Cybersecurity Policy at Intel Corporation
Lecturer, UC Berkeley School of Information (MICS)

Keren Elazari
Analyst and Researcher, K3r3n3.com

From Dystopia to Opportunity: Stories from the Future of Cybersecurity

Wednesday, March 6, 2:50 – 3:40 PM | South Stage

Amit Elazari is a Director of Global Cybersecurity Policy at Intel Corporation and a Lecturer at UC Berkeley’s School of Information Master in Information and Cybersecurity (MICS). She holds a Doctor of Science of Law (J.S.D.) from UC Berkeley School of Law. She graduated Summa Cum Laude three prior degrees in law and business (B.A., LL.B., LL.M.). Her research work in the field of information security law and policy has been published in leading technology law journals, presented in conferences such as Black Hat, USENIX Enigma, USENIX Security, BsidesLV, BsidesSF and DEF CON, and featured in leading news sites such as The Wall Street Journal, The Washington Post and the New York Times. In 2018, Amit was granted a Center for Long Term Cybersecurity (CLTC) grant for her work on private ordering regulating information security, exploring safe harbors for security researchers. She is trained as a Lawyer and practiced law in Israel. 

Keren Elazari has worked with leading Israeli security firms, government organizations, Big Four firms, and advised Fortune 500 and groundbreaking startup companies, helping global organizations navigate complex cybersecurity issues for more than 18 years.  Elazari’s independent research work and writing about emerging security issues has been featured by international media, TED, Wired, Forbes and more. Elazari holds an MA in security studies from Tel Aviv University, and she is a visiting faculty member with Singularity University. Elazari co-founded BSidesTLV and Leading Cyber Ladies, and is committed to bridging the mainstream security industry with the friendly hacker community.


Tina & HughTina Fey
Writer, Actress and Producer 

Dr. Hugh Thompson
RSA Conference Program Chair, RSA Conference 

Friday, March 8, 12:30 – 1:30 PM | West Stage

Tina Fey
is a Writer, Actress and Producer best known as Liz Lemon on her three-time Emmy Award-winning series 30 Rock. Prior to creating 30 Rock, Fey completed nine seasons on Saturday Night Live. Film projects include Sisters, Date Night and Mean Girls (which she wrote). In 2010, Fey became the youngest recipient of the Mark Twain Prize for American Humor. In April 2011, Fey released her book, Bossypants, which topped the New York Times bestseller list for over 36 consecutive weeks. Fey is also co-creator of the hit comedy series Unbreakable Kimmy Schmidt, and most recently, Fey wrote the book for the Tony-nominated hit Broadway musical Mean Girls.

As Program Committee Chair, Hugh Thompson is responsible for identifying domestic and global trends to help set the agenda for RSA Conference. He also plays a direct role in selecting session topics and speakers. A world-renowned security expert and former Adjunct Professor at Columbia University, Thompson holds a BS, MS and Ph.D. in applied mathematics. He has co-authored four books and more than 100 publications on security and has testified before Congress on cybersecurity. In 2006 he was named a “Top 5 Most Influential Thinkers in IT Security” by SC Magazine. Thompson is also the Chief Technology Officer at Symantec Inc.


Celeste & SteveDr. Celeste Fralick
Chief Data Scientist, McAfee, LLC

Steve Grobman
Senior Vice President and Chief Technology Officer, McAfee, LLC

Lightning in a Bottle, or Burning Down the House?

Tuesday, March 5, 8:35 – 8:55 AM | West Stage

Celeste Fralick chairs McAfee’s Analytic Center of Excellence and oversees technical analytic strategy for consumer and enterprise products, as well as the company’s internal business intelligence. As Chief Data Scientist in Intel’s Internet of Things group, she developed machine learning and deep learning analytics for more than eight different markets. She serves on multiple industry and academic boards and journal editorial staffs and authored the book, Intelligent Analytics: Bringing Analytics to the Internet of Things (Springer). Fralick earned her Ph.D. in biomedical engineering from Arizona State University, concentrating on predictive analytics and neuroscience.

Steve Grobman is Senior Vice President and Chief Technology Officer at McAfee. In this role, he sets the technical strategy and direction to create technologies that protect smart, connected computing devices and infrastructure worldwide. His organization is focused on development of the next generation of cyber-defense and data science technologies, threat and vulnerability research, and McAfee’s CISO organization. Prior to joining McAfee, he dedicated more than two decades to senior technical leadership positions related to cybersecurity at Intel Corporation where he was an Intel Fellow. He has written numerous technical papers and books and holds 27 US patents. He earned his bachelor’s degree in computer science from North Carolina State University.


Pat and ShannonPat Gelsinger
Chief Executive Officer, VMware

Shannon Lietz
Director, Intuit

All Hands on Deck: An Industry-Wide Movement to Shrink the Attack Surface

Thursday, March 7, 4:00 – 4:25 PM | West Stage

Pat Gelsinger has been serving as Chief Executive Officer of VMware since September 2012, nearly doubling the size of the company during his tenure. He brings more than 35 years of technology and leadership experience.

Before joining VMware, Gelsinger led EMC’s Information Infrastructure Products business as President and Chief Operating Officer. A respected IT industry veteran, he was at Intel for 30 years becoming the company’s first Chief Technology Officer and driving the creation of key industry technologies including USB and WiFi. He led Intel to be the dominant supplier of the microprocessor—while in the significant role as the architect of the original 80486 processor.

Shannon Lietz is an award-winning innovator with decades of experience pursuing advanced security defenses and next-generation security solutions. Lietz is currently the DevSecOps Leader for Intuit where she is responsible for setting and driving the company’s DevSecOps and cloud security strategy, roadmap and implementation in support of corporate innovation. She operates a 24x7 DevSecOps team that specializes in adversary management. Prior to joining Intuit, Lietz worked for ServiceNow where she was responsible for the cloud security engineering efforts and Sony where she drove the implementation of a new secure data center. Lietz has experience leading crisis management large-scale security breaches and restoration of services for several Fortune 500 companies.


Rohit & NilooRohit Ghai
President, RSA

Niloofar Razi Howe
Cybersecurity Strategist and Entrepreneur

The Trust Landscape

Tuesday, March 5, 8:00 – 8:35 AM | West Stage

Rohit Ghai is President of RSA, a Dell Technologies business, and responsible for delivering RSA’s Business-Driven Security™ solutions to help customers manage digital risk. He has run software and SaaS organizations focused on cybersecurity and information management in highly regulated markets. He advises global customers on their digital and security transformation.

Niloofar Razi Howe has been technology investor, executive and entrepreneur for 25 years. Focusing on cybersecurity for the past ten years, she served as Senior Vice President of Strategy and Operations at RSA, and Chief Strategy Officer of Endgame, Inc. Prior to her operational roles she spent twelve years leading deal teams in private equity and venture capital. She is the creator of the TEDx talk, “The Gift of Exile,” on opportunities arising from the most difficult life challenges and the importance of seeking diverse perspectives. Howe graduated with honors from Columbia College, holds a JD from Harvard Law School, and is a life member at the Council on Foreign Relations.


Kyla Guru

Kyla Guru
Founder and Chief Executive Officer, Bits N’ Bytes Cybersecurity Education

Tales of a Teenage Security Supergirl

Thursday, March 7, 4:25 – 4:45 PM | West Stage

Kyla Guru is 16 years old, a junior at Deerfield High School in Deerfield, IL, by day and a security supergirl by night. The summer before her freshman year of high school, Guru discovered her unique passion for cybersecurity, fascinated by the task of protecting technologies of our future. With this discovery, she also learned that 90 percent of cyberattacks on national infrastructure were due to human error. Combatting this vulnerability, Guru founded Bits N’ Bytes Cybersecurity, a national organization that now sustains 20+ national partnerships with school districts, corporations including Facebook and IBM, and educational platforms like Discovery Education, all in efforts to increase awareness, literacy, and fluency in privacy and cybersecurity.


Emily HeathEmily Heath
Vice President and Chief Information Security Officer, United Airlines

Security at 36,000 Feet!

Tuesday, March 5, 2:20 – 3:10 PM | South Stage

Emily Heath is United’s Vice President and Chief Information Security Officer. She oversees the airline’s global information security program as well IT regulatory, governance and risk management functions. Heath serves as a Board Member for the Aviation Information Sharing & Analysis Center (A-ISAC) and the National Technology Security Council (NTSC). She is on the Board of Advisors for a venture capitol firm, Cyberstarts, and is a Board member for the cybersecurity nonprofit organization Security Advisor Alliance. From Manchester, England, Heath is a former Police Detective from the UK Financial Crimes Unit where she led investigations into international investment fraud, money laundering and large-scale identity theft cases, running joint investigations with the FBI, SEC and London’s Serious Fraud Office.


Paula Januszkiewcz

Paula Januszkiewicz
Chief Executive Officer, CQURE

Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking

Tuesday, March 5, 11:00 – 11:50 AM | South Stage

Paula Januszkiewicz is the Founder and Chief Executive Officer of CQURE Inc. and CQURE Academy. She is Enterprise Security MVP, honorable Microsoft Regional Director for CEE and a world-class cybersecurity expert, consulting customers around the world. She is a top speaker at conferences including Microsoft Ignite, RSA Conference, Black Hat 2018 USA and Gartner Security Summit. Her presentations gather thousands of people. Januszkiewicz has 15 years of experience in cybersecurity, performing penetration tests, architecture consulting, trainings and seminars. She has performed hundreds of security projects, including those for governmental organizations and big enterprises. She also creates security awareness programs for various organizations and top management. What is more, she has access to a source code of Windows!


Ann Johnson

Ann Johnson
Corporate Vice President, Cybersecurity Solutions Group, Microsoft

Wednesday, March 6, 10:30 – 10:55 AM | West Stage

As Corporate Vice President of the Cybersecurity Solutions Group at Microsoft, Ann Johnson oversees the go-to-market strategies of cybersecurity solutions for one of the largest tech companies on our planet. As part of this charter, she leads and drives the evolution and implementation of Microsoft’s short- and long-term security solutions roadmap with alignment across the marketing, engineering and product teams. Prior to joining Microsoft, her executive leadership roles included Chief Executive Officer of Boundless Spatial, President and Chief Operating Officer of vulnerability management pioneer Qualys, Inc., and Vice President of World Wide Identity and Fraud Sales at RSA Security, a subsidiary of EMC Corporation.


Sandra and Kevin

Sandra Joyce
SVP, Global Intelligence Operations, FireEye

Kevin Mandia
Chief Executive Officer, FireEye

A View from the Front Lines of Cybersecurity

Wednesday, March 6, 4:00 – 4:25 PM | West Stage

As SVP of Global Intelligence Operations at FireEye, Sandra Joyce oversees intelligence collection, research, analysis and support services for FireEye cyberthreat intelligence customers and the FireEye security product portfolio. Joyce has held positions in product management, business development and intelligence research over the course of 19 years in both national security and commercial industry. Joyce serves in the US Air Force Reserve and is a Faculty Member at the National Intelligence University. She holds a bachelor’s degree in foreign language with three master’s degrees in international affairs, science and technology intelligence, and military operational art and science. Joyce speaks English, Spanish, and German and lives in Virginia.

Kevin Mandia has been FireEye Chief Executive Officer since June 2016 and a Member of the FireEye Board of Directors since February 2016. Mandia joined the company in December 2013, when FireEye acquired Mandiant, the company he founded in 2004. Mandiant security incident management products and services remain core of FireEye’s consulting business today. Mandia has spent more than 20 years in information security and has been on the front lines helping organizations respond to computer security breaches. He was also a US Air Force Officer, serving as a Computer Security Officer in the 7th Communications Group at the Pentagon, and a Special Agent in the Air Force Office of Special Investigations (AFOSI).


Stuart McClure and Brian Robison

Stuart McClure
Chairman and Chief Executive Officer, Cylance Inc.

Brian Robison
Chief Evangelist, Cylance Inc.

Hacking Exposed: LIVE—Bypassing NextGen

Wednesday, March 6, 8:00 – 8:50 AM | South Stage

Stuart McClure leads Cylance as its Chief Executive Officer for the first math-based approach to threat detection, protection and response. Prior to Cylance, McClure was Executive Vice President, Global Chief Technonlogy Officer and General Manager at McAfee/Intel. McClure is the creator and lead author of the most successful security bok of all time, Hacking Exposed. He is widely recognized for his extensive and in-depth knowledge of security, and is one of the industry’s leading authorities in information security today.

Brian Robison is the Chief Evangelist at Cylance where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after the attack. Prior to joining Cylance, Brian spent five years helping secure corporate data on mobile devices; three years at Citrix as Director - Technical Marketing and two years driving enterprise product strategy at Good Technology. Before moving into the mobile security space, Brian’s career focused on end-point security and risk and compliance. At McAfee, he led the effort to bring ePolicy Orchestrator into the modern age as well as managing the vulnerability management and policy compliance solutions. Prior to McAfee, Brian held many roles over his seven-year career at Tripwire, Inc. 


Bruce SchneierBruce Schneier
Fellow and Lecturer, Harvard Kennedy School

The Role of Security Technologists in Public Policy

Wednesday, March 6, 9:20 – 10:10 AM | South Stage

Bruce Schneier is a renowned security technologist, called a security guru by The Economist. He is the author of approximately a dozen books, including his latest book Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World, as well as hundreds of articles, essays and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a Fellow at the Berkman Klein Center for Internet and Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a Board Member of the Electronic Frontier Foundation, AccessNow and the Tor Project; and an Advisory Board Member of EPIC and VerifiedVoting.org. He is also a Special Advisor to IBM Security and the Chief Technology Officer of IBM Resilient.


Megan SmithMegan Smith
Chief Executive Officer, shift7 
Third Chief Technology Officer of the United States (2014-2017)

How Technology and Innovative Approaches Can Transform Your Organization

Wednesday, March 6, 4:55 – 5:20 PM | West Stage

Megan Smith is an award-winning tech entrepreneur, engineer and evangelist. As the third US Chief Technology Officer, Smith helped the president harness the power of technology, data and innovation to advance the future of our nation and the world. Prior to her role as US Chief Technology Officer, Smith served as Vice President of New Business Development at Google, managing early-stage partnerships across the company’s global engineering and product teams. As Chief Executive Officer of PlanetOut, Smith was a leader of the online LGBT community in the early days of the Internet. Today, Smith is Chief Executive Officer of shift7, which focuses on tech-forward networked innovation for impact and economic inclusion.


Ira WinklerIra Winkler
President, Secure Mentem

Lessons Learned from 30+ Years of Security Awareness Efforts

Tuesday, March 5, 3:40 – 4:30 PM | South Stage

Ira Winkler, CISSP, is President of Secure Mentem and Author of Advanced Persistent Security. He is considered one of the world’s most influential security professionals and named a modern-day James Bond by the media, and was named “The Awareness Crusader” by CSO Magazine in receiving their CSO COMPASS Award. He has designed and implemented and supported security awareness programs at organizations of all sizes, in all industries, around the world. He performs espionage simulations, where he physically and technically breaks in the largest companies in the world, investigating and offering cost-effective prevention.

This document was retrieved from http://www.rsaconference.com/events/us19/agenda/keynotes on Thu, 24 Jan 2019 03:35:08 -0500.