|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Border security agents are increasingly forcing international travelers to surrender passwords, unlock and decrypt mobile devices, and allow inspection and backup of mobile device contents. Travelers who lose their data are not victims but targets for prosecution and legal action by data owners and privacy legislators. What are the new best practices for data travel hygiene?
1: Understand mobile vulnerabilities encryption will not protect against.
2: Discuss innovative solutions.
3: Brainstorm best practices.