Registration Is Now Open for RSAC Conference 2021


Posted on by Linda Gray Martin

It’s early February, and under ordinary circumstances, we’d be preparing to come together at the Moscone Center in San Francisco. While we’d hoped that shifting to May would allow us to host a physical event, this past year has taught us to expect the unexpected, and in the spirit of resilience, we announced in the fall that RSA Conference 2021 would take place as a fully virtual event.   

Since then, we’ve been planning for an incredible digital-first experience that will allow the community to gather together. We’re excited to announce that registration for RSA Conference 2021 Virtual Experience is now open and, what’s more, our full session agenda is live! This year’s event will be May 17–20 and will offer attendees numerous learning and networking opportunities.

The year 2021 is special for RSA Conference as it marks our 30th anniversary. In honor of all that we have accomplished together over the past three decades, we are preparing a must-attend celebration of 30 years of thought leadership and education, featuring all that Conference attendees have come to expect. Your virtual experience will start with rich content delivered in more than 200 traditional and interactive sessions across 24 tracks. As always, we’ll have keynote addresses from industry visionaries. But it doesn’t stop there. You’ll see the next generation of cybersecurity innovators at RSAC Innovation Sandbox, and you’ll be able to connect with sponsors and attend Briefing Center sessions at the Digital Expo.

We know that our attendees value the opportunity to make connections with their peers, and we’re planning to deliver on that expectation. There will be plenty of entertaining and informational opportunities to interact with both peers and experts.

Feeling inspired? So are we, and we’re looking forward to seeing you in May. Secure one of the limited number of All Access Passes and Content Passes available at our special launch rate and save up to $300 by registering here today.


Contributors
Linda Gray Martin

Chief of Staff, RSAC & Senior Vice President, RSA Conference

RSAC Insights

application security artificial intelligence & machine learning unmanaged devices DevSecOps GDPR Internet of Things PII SIEM SSO access control anti-malware anti-spam artificial intelligence & machine learning audit authentication behavioral analytics big data analytics biometrics blockchain & distributed ledger botnets business continuity & disaster recovery cloud access security brokers (CASB) cloud security compliance management consulting & professional services consumerization container security critical infrastructure cryptography cyber insurance cyber warfare & cyber weapons cyber espionage data lakes data loss prevention data security data sovereignty deception-based security denial of service digital rights management email security encryption strategy & trends endpoint detection visibility & response endpoint security ethics exploit of vulnerability firewalls forensics & e-discovery fraud governance risk & compliance government regulations cyber espionage hackers & threats hacktivism identity management & governance identity theft incident response industrial control security infrastructure security insider threats intrusion prevention/detection key management law legislation log management managed security services metrics mobile security network security operational technology (OT Security) orchestration & automation password management patch vulnerability & configuration management penetration testing phishing physical security policy management practitioner perspectives privacy professional development & workforce quantum computing ransomware risk & vulnerability assessment risk management secure coding secure payments & cryptocurrencies threat visualization security analytics security architecture security awareness security consulting security intelligence security operations security services social engineering social networking software code vulnerability analysis SDN standards & frameworks supply chain threat intelligence threat management trusted computing virtualization, containerization & segmentation zero day vulnerability zero trust

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs