Below are definitions of some of the advanced filtering options on our Full Agenda page.
Analytics Intelligence & Response
Analytics, Intelligence & Response covers the application of investigative and analytic techniques that help organizations anticipate, identify, contain, investigate and resolve incidents in the enterprise and across OT and integrated technologies. It also explores threat intelligence gathering, automating response, and sharing across technologies and organizations.
The battle against online fraudsters continues to rapidly evolve. Leading organizations are deploying new policies, technologies and methodologies to enhance fraud prevention, detection, response and recovery programs. Hear use cases and best practices focused on sharing practical knowledge and lessons learned on how to approach the most pressing challenges of anti-fraud professionals.
Applied Crypto & Blockchain
Explore emerging use cases and practical applications for these rapidly changing, transformative technologies. Topics include entropy as a service, distributed ledgers and distributed trust, cryptocurrency, key and certificate management, crypto agility, and the implications of quantum computing on encryption.
Business Perspectives sessions will appeal to a broad cross section of practitioners, representing key trends, perspectives of industry leaders, interesting innovations, and other programs and efforts in and around the cybersecurity profession.
This track focuses on the intersection of business and security. It features experiences and opinions of CXOs, communicating cyber-risk to the board, and the latest trends and issues in information security that impact the executive suite.
Cloud Security & Virtualization
The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services, virtualization technologies/services, segmentation, container technologies, network function virtualization and hybrid architectures.
This academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.
DevSecOps & Application Security
DevSecOps & Application Security focuses on the intersection of security and DevOps. Sessions focus on sharing real-world, enterprise-level successes (and failures), covering topics such as container security, DevSecOps for risk and compliance, and hands-on building DevSecOps practices in modern development teams.
Hackers & Threats
Hackers & Threats sessions include discussions around the growing underground economy, advanced threats, ransomware, cyber-weapons, new classes of vulnerabilities, exploitation techniques, reverse engineering, and how to combat these problems. The second track, Hackers & Threats Advanced, is technically advanced and will include live demos, code dissection and new research breakthroughs.
This track explores how people make trust choices, building strong security cultures, innovative ways to secure the human, fostering internal and external security communities, and how classic attacks and emerging threats now include a human element. Topics include social engineering, insider threats, information operations, organizational change, building partnerships and user behavior analytics.
This track covers the processes, technologies and policies for managing and controlling digital identities for the enterprise and its customers.
Innovation & Startups
This content demonstrates RSA Conference’s commitment to providing a platform for entrepreneurs to help nurture and develop innovative ideas and solutions.
The Law track explores topics at the intersection of cybersecurity, data protection and the law, including developments and trends in new laws and regulations, cases, liability, risk management, transactions, investigations, governance and related topics.
Machine Learning & Artificial Intelligence
Sessions examine the practical applications and limitations of machine learning and artificial intelligence in cybersecurity, and explore fundamentals, real-world examples, potential risks, automation and future evolution of capabilities.
Mobile & IoT Security
This track provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including personal device and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the implications of the interconnectivity of everything.
Open Source Tools
This track provides technical case studies of open-source software, offering attendees exposure to open-source solutions that have been created and utilized by enterprise practitioners to solve real challenges. Sessions will cover the business challenge addressed by the tool and how the presenter utilized it to resolve it.
Policy & Government
This track features sessions on current and proposed government strategies, policies, legislation and standards that could shape the direction of emerging technologies, cyberthreat intelligence sharing, industry standards and security compliance requirements for years to come.
This dedicated track explores the privacy issues related to artificial intelligence, data ethics, facial recognition, biometrics, surveillance, differential privacy, and state, federal, and international laws, regulations, and standards such as CCPA, GDPR, HIPAA, and NIST and programmatic strategies for compliance.
Product Security is focused on the development, delivery, support and update/response processes needed to deliver secure products and services to businesses and users. Sessions will include topics such as securely delivering product updates, security by design, safety issues, regulatory compliance considerations for products, secure diagnostics and support of products in the field.
Professional Development & Personnel Management
Professional Development & Personnel Management covers business, management and career development, staffing and personnel management as well as inclusion and diversity.
Protecting Data & the Supply Chain Ecosystem
This track explores the cascading security requirements of the extended enterprise and the classification, tracking, and protection of data. It covers data protection regulations, DLP and threats to sensitive data, and emerging trends, as well as vendor and partner SLAs, supply chain mapping, continuous enforcement, and how to future-proof vendor contracts and risk assessments for evolving requirements.
Risk Management & Governance
This track covers the selection and implementation of risk management methodologies, compliance-related sessions on standards, and instituting governance across the extended enterprise. This track also contains sessions on a wide variety of security metrics and measurements techniques.
Security Strategy & Architecture
Security Strategy & Architecture covers the policy, planning, and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, resiliency and hygiene.
Technology Infrastructure & Operations
This track focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, implementation, orchestration, vulnerability assessment and security monitoring for the defense of networks, endpoints, operational technology and systems.
Events & Networking
RSA Conference offers great opportunities to get to know other attendees and build your professional network. Explore these here.
Expand your network while you learn through doing and interacting, with sessions including Birds of a Feather, Learning Labs and RSAC Sandbox.
Our sponsor and association partners provide the content for this track, delivering insights on security issues that focus on today’s most pressing matters.
Includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.
Programs with dedicated initiatives or events for specialized audiences.
Session format follows a "traditional" presenter to audience format with a formal presentation followed by Q&A.
Birds of a Feather
It’s our popular Birds of a Feather format—with an Engagement Zone twist. Participate in published, planned topics facilitated by some of our speakers, or take advantage of open, non-scheduled space all day to have free-form discussions. You never know where the conversation may lead!
Get tactical help with the pressing challenges you face each day. Technical experts from our Expo vendors present short demonstrations to help you make strategic plans and purchase decisions for your organization.
Classroom sessions are traditional presentations delivered by 1-2 presenters, following slide decks that are available from the Conference site. Presentations are concluded with audience Q&A.
RSAC College Day offers events and sessions to help college students explore and learn about the cybersecurity industry. Discover career options, hear from the best in the field and network with leading companies. These events are limited to students registered for RSAC College Day or registered as Full Conference Student/Faculty.
Enjoy a well-rounded learning experience with Cooperative Learning sessions. Each session features a facilitator who delivers a concentrated presentation followed by a focused Q&A. Participants will then break into small groups for discussions before coming back together as a larger group to share their findings.
RSAC keynote speakers are inspiring leaders, thinkers, and innovators that will share perspectives and knowledge on the information security industry. Don’t miss the action on two stages this year: South and West.
Learning Labs provide highly interactive, facilitated learning experiences. All of the content is very hands-on and small group oriented. Seating is limited in Labs, assuring maximum engagement and participation. Labs are open to Full Conference attendees only; utilize Reserve a Seat to schedule your participation. Due to the popularity of the Learning Labs, you can only reserve one Lab on your schedule, so pick carefully from our 20 great offerings. Note: Press is not permitted in Lab sessions.
Panel sessions are traditional format, featuring a moderator and several panelists representing different viewpoints. The discussions are concluded with audience Q&A.
RSAC Sandbox 2020 offers hands-on experiences addressing, discussing and simulating threats and vulnerabilities that impact our ability to protect tomorrow’s future. Explore 12 different sandboxes focused in areas such as IoT devices, industrial control systems, automotive, supply chain, medical devices, aerospace and voting. Also featured is The Lab, with SANS NetWars experience and other capture-the-flag activities. Open to Full Conference and Expo Plus badge types.
Start your Conference week on a high note, meeting other practitioners and engaging in these focused Monday seminars. Our seminar portfolio and topics have been designed with our 2020 attendees in mind.
RSA Conference offers great opportunities to get to know other attendees and build your professional network. Explore these here.
Training & Tutorials $$
Immerse yourself in an intensive, skill-building 2-day session on Sunday/Monday of Conference week. Trainings & Tutorials are led by respected authorities from the SANS Institute, CSA, ISACA and (ISC)². Please note, the Trainings & Tutorials are available for purchase.
This classification is used for compelling strategic sessions and introductions to new technology.
General - Technical
Session includes content deemed "general technical" by the presenter. Please review pre-requisite knowledge listed with the website description, if applicable.
Focused on principles and concepts that would appeal to attendees with more than 5 years of experience. Little, if any, time is spent on definitional terms and concepts. Contains instructive demos, management tools, deep process discussions, or similar level of content.
Intermediate - Technical
Session includes content deemed "intermediate technical" by the presenter. Please review pre-requisite knowledge listed with the website description, if applicable.
Focused on advanced principles and concepts, geared toward attendees with deep subject knowledge and 10 or more years of experience. Little/no time is spent on defining terms and background. These sessions are high in demand and should contain demonstrations, line code, advanced architecture discussions, tools that can be shared, or similar level of content.
Advanced - Technical
Session includes content deemed "advanced technical" by the presenter. Please review pre-requisite knowledge listed with the website description, if applicable.