Menu

Topics & Tracks

Below are the topics and tracks for RSA Conference 2019. Please note, these are subject to change.


Analytics, Intelligence & Response
Analytics, Intelligence & Response covers the application of investigative and analytic techniques that help organizations anticipate, identify, contain, investigate, and resolve incidents in the enterprise. It also explores threat intelligence gathering, automating response, and sharing across technologies and organizations.


Application Security & DevSecOps
Application Security & DevSecOps focuses on secure software development as well its intersection with security operations. Sessions will focus on sharing real-world, enterprise-level experience, covering topics such as secure application design, secure configurations, containerization, and secure development methodologies.


Association Special Topics
Navigate the association landscape and learn about opportunities in training, best practices, credentialing, special programs, and career development from leaders in the field.


Blockchain & Applied Crypto
Explore emerging use cases and practical applications for this rapidly changing, transformative technology. Topics include encryption, distributed ledgers, cryptocurrency, decentralized identity, tokenization, key management, homomorphic encryption and the implications of quantum computing on encryption.


Bridging the Gap: Cybersecurity + Public Interest Tech
Brought to you by Bruce Schneier and the Ford Foundation
A new field is emerging -- a community of people using their skills in technology to change the world for the better: the professional field of public interest technology. And your voice is needed. Public interest tech is exactly what it sounds like—technology used to serve the public good. Cybersecurity is a large part of this. And today, more than ever, there is a need to bridge the gap between what technologists are trying to build and what social scientists are trying to address. At RSA Conference, this emerging field will be represented by people like cybersecurity expert Bruce Schneier, the ACLU’s Ben Wizner, and Harvard professor Latanya Sweeney. Join us for an inspiring track with over a dozen leading security, civic, and social sector leaders about technology at work for the public interest.  


C-Suite View
This track focuses on the intersection of business and security. It features experiences and opinions of CXOs, communicating cyber-risk to the board, and the latest trends and issues in information security that impact the executive suite.    


Cloud Security & Virtualization
The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services, virtualization technologies/services, segmentation, deployment models, network function virtualization and hybrid architectures.


Cryptography
This academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.


Cybersecurity Future Proof: 2025
What does the world look like in 2025? What technology, process and staffing considerations should you be making now to prepare for whatever may lie in the future to put you ahead of the adversary? Cybersecurity Future Proof: 2025 delivers a rare look into the security crystal ball and includes traditional presentations and interactive lab-like sessions, designed for the cross-section of RSA Conference attendees from technology, business, academia, policy and law, to help frame your future thinking.


Governance, Risk & Compliance             
This track covers the creation and implementation of risk management frameworks, compliance-related sessions on standards, and instituting governance across the extended enterprise. This track also contains sessions on a wide variety of security metrics and measurements.


Hackers & Threats 
Hackers & Threats sessions include discussions around the growing underground economy, advanced threats, ransomware, cyber-weapons, new classes of vulnerabilities, exploitation techniques, reverse engineering, and how to combat these problems. The second track, Hackers & Threats Advanced, is technically advanced and will include live demos and code dissection.


Human Element 
This track explores how people make trust choices, innovative ways to secure the human, and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, information operations, and user behavior analytics.


Identity
This track covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.


Law      
The Law track explores topics ranging from unintended consequences due to legislation, legal rulings, liability, and emerging issues on the legal landscape.


Machine Learning & Artificial Intelligence
Sessions examine the applications and limitations of machine learning and artificial intelligence in cybersecurity, exploring fundamentals, applications, potential to address workforce shortages, automation, and future evolution of capabilities. 


Mobile & IoT Security   
This track provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the implications of the interconnectivity of everything.


Policy & Government   
This track features sessions on current and proposed government strategies, policies, legislation, and standards that could shape the direction of cloud computing, cyber-norms, public private-partnerships, Big Data initiatives, cyberthreat intelligence sharing, industry standards, and security compliance requirements for years to come.


Privacy
This dedicated half-track explores the privacy issues related to Big Data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise.


Professional Development
Professional Development covers technical and business/management training, professional certifications and career development, diversity as well as staff and personnel management. 


Protecting Data & the Supply Chain Ecosystem
This track explores the cascading security requirements of the extended enterprise and the classification, tracking, and protection of data. It covers data protection regulations, DLP and threats to sensitive data, and emerging trends, as well as vendor and partner SLAs, supply chain mapping, continuous enforcement, and how to future-proof vendor contracts and risk assessments for evolving requirements.


Security Mashup
This track includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.


Security Strategy & Architecture
Security Strategy & Architecture covers the policy, planning, and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, cyber-resiliency, and cyber-hygiene.


Sponsor Special Topics
Listen to a spectrum of experts and security issues delivered and discussed by leading-edge companies.


Technology Infrastructure & Operations
This track focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, implementation, orchestration, vulnerability assessment, and security monitoring for the defense of networks, endpoints, operational technology, and systems.


 

 

This document was retrieved from http://www.rsaconference.com/events/us19/agenda/topics-tracks on Tue, 18 Dec 2018 20:12:15 -0500.