Monday, May 17
Monday, May 17 | 8:00 AM PT
A global pandemic. An unprecedented cyberattack. Unrelenting challenges. Despite it all, cybersecurity endured: 2020 tested us – it didn’t break us. We’re an industry built on resilience, a sector that adapts, innovates and evolves. But the next test is coming. So let’s celebrate our strengths, share what we’ve learned and expand our community to continue protecting what matters most.
Monday, May 17 | 8:35 AM PT
Compelling truths revealed by new workforce models and the heightened sophistication of breaches provide security leaders an unprecedented opportunity to be truth-tellers and take action. Teams that feel empowered to impact change are more engaged, effective, and resilient. Angela Weinman, Head of Global Governance, Risk, and Compliance at VMware, and Jimmy Sanders, Information Security at Netflix DVD, share why and how they believe that taking responsibility for telling hard truths can impact change.
Monday, May 17 | 8:55 AM PT
Each year the founders and leaders of cryptography take to the RSA Conference keynote stage to debate and discuss the most pressing issues facing the cybersecurity industry and our increasingly digital society. And each year, the stakes seem to be higher. Join this year’s panel to learn what’s top of mind for 2021.
Professor of Security Engineering
Cambridge University and Edinburgh University
Chief Digital Officer
Massachusetts Institute of Technology
Borman Professor of Computer Science
The Weizmann Institute, Israel
Monday, May 17 | 4:10 PM PT
This keynote will reveal how the cyber war of misinformation and manipulation campaigns is conducted, attempting to sway public opinions and yes, elections. Attendees will learn how to spot and stop the different techniques for creating and spreading misinformation and how to help big tech, government organizations, and others from believing and spreading it.
Monday, May 17 | 4:35 PM PT
Hacking is generally thought of as something done to computer systems; this conceptualization can be extended to any system of rules. The tax code, financial markets, and any system of laws can be hacked. Consider a world where AIs can be hackers-where hacks of our social, economic, and political systems are discovered and exploited at computer scale. Human speed "patching" approaches must change.
Tuesday, May 18
Tuesday, May 18 | 8:00 AM PT
As humans, we are awful at perceiving risk. We are influenced by media, anecdotal data, and evolutionary biology. Irrational fears lead humans to misperceive actual risks and sub-optimize risk reduction in both the physical and cyber world. To combat this, we need to be aware of our biases and embrace data and science-based approaches to assess and mitigate risk.
Tuesday, May 18 | 8:20 AM PT
It’s a reality of this decade that technological innovation is outpacing privacy protections, creating a mandate to include privacy as a central component of a strong security posture. Vasu Jakkal will discuss the shared responsibility to protect privacy for all, as well as key ways you can lead, build trust, and create enduring business value through comprehensive privacy and security practices.
Tuesday, May 18 | 8:35 AM PT
Today’s security leaders are now responsible for helping the business deliver new capabilities grounded in security – while also managing threats and compliance. Zero trust reshapes your security program to achieve all these objectives. Join Mary O’Brien, General Manager for IBM Security and Mauricio Guerra, CISO for Dow Chemical as they discuss putting zero trust into action to manage security while enabling business.
Tuesday, May 18 | 3:40 PM PT
The job of a CISO has always been challenging and varied, but the last year has been a stress test above all others. Global CISOs share their insights and learnings on priorities, surprises, and “ah ha” moments, providing a critical calibration of what we as an industry need to understand from the people who understand it best.
Digital Transformation Leader of Corporate Solutions and Digital Oil Fields
Kuwait Oil Company
Chief Information Security Officer
Johnson & Johnson
Global Chief Security Officer
Chief Security Officer
Global Chief Information Security Officer
Program Committee Chair
Chief Information Security Officer
Wednesday, May 19
Wednesday, May 19 | 8:00 AM PT
Cybersecurity transformation is here, accelerating to the cloud for a post-pandemic world. A new era where businesses are less constrained by traditional network infrastructures and the edge is everywhere and everyone. Join Forcepoint CEO Manny Rivelo for insights into today’s emerging Unbound Enterprise that pushes controls to the user, understands the edge and thrives across diverse ecosystems.
Wednesday, May 19 | 8:20 AM PT
The attack on SolarWinds software is a reminder: eventually your data will likely be compromised. The ability to trace all contact with sensitive data is vital. Contact tracing is an epidemiological technique- when applied digitally, it can be a powerful security tool. Splunk CEO Doug Merritt will share how Data Contact Tracing can help identify breaches sooner and remediate them more effectively.
Wednesday, May 19 | 8:35 AM PT
The Internet is small enough that attackers can find vulnerabilities in less than an hour. Dr. Tim Junio will address how security teams must become resilient as digital transformation expanded the external attack surface. Using attack surface data and lessons from leading enterprises, this talk will help security benchmark attack surface metrics, understand the threat landscape and modernize security measures.
Wednesday, May 19 | 8:50 AM PT
SolarWinds was hit with the most sophisticated supply chain attack in history, rattling the private and public sectors. Many researchers have shared what they know about this attack. For the first time, SolarWinds shares its unique view of the attack’s “what, how, and who”, including key learnings about the novel tradecraft that can help the industry better prevent and protect in the future.
Wednesday, May 19 | 3:40 PM PT
With the passage last year's National Defense Authorization Act, more than two dozen of the Commission's legislative recommendations have been codified into law. Commission Co-Chair, Representative Mike Gallagher (Wisconsin), and Commission member Representative Jim Langevin (Rhode Island) will discuss the progress made by the Commission and lay out a list of priorities headed into the 117th Congress. They will also discuss the government's response to recent cyber incidents and share lessons learned and policy implications in their wake.
Wednesday, May 19 | 4:05 PM PT
This session will highlight the latest trends of next-generation tactics, techniques, and procedures from today’s cyber adversaries and will cover the increased sophistication seen in ransomware, along with a live demonstration of the “Living off the Land” techniques adversaries use to prepare an environment.
Thursday, May 20
Thursday, May 20 | 8:00 AM PT
What makes a successful security program? Ask 3 infosec pros and you’ll get 3 different answers. So we asked 4,800 of them and looked for meaningful consensus among their answers. We evaluated security program performance across 25 practices and 11 different outcomes. Our rigorous, analytical approach will yield insights into how security teams can enable business, manage risk and operate efficiently.
Thursday, May 20 | 8:25 AM PT
This session will unveil some of the most novel attacks in the current global threat landscape, diving into specific, real-time examples of threat actor activity from both nation states and criminal groups, and will offer strategic advice for countering them.
Thursday, May 20 | 3:20 PM PT
Each year at RSA Conference, SANS provides the authoritative briefing on the most dangerous new attack techniques in use today, what's coming next, and what organizations can do to prepare. This session gives organizations a chance to prioritize upcoming attack vectors and to get ahead of them.
DFIR Curriculum Lead and Director of Digital Intelligence
SANS Institute and Cellebrite
Certified Instructor and Director of Intelligence
SANS Institute and Red Canary
Research Director and Founder and Board Member
SANS Institute and National Cyber Scholarship Foundation
Fellow & Director
SANS Institute and Cyber Ranges
Dean of Research
SANS Technology Institute