It is that time of year again, time to get our bags packed and head to San Francisco for the RSA Conference. This year’s theme is the Power of Opportunity–which is a fitting theme for most security companies as they move toward partnerships that benefit end users.
As a cybersecurity company that focuses on credentials and data, we thought it would be helpful to select a top 10 list of data security sessions for you to attend while at RSA. Don’t forget to also visit us in the North Hall, Booth 4312 for some great conversations and the chance to win a Star Wars Drone.
Tuesday, February 14
EU Data Privacy: What US Orgs Need to Do Now to Prepare for GDPR PRV-T11
February 14, 2017 | 3:45 PM – 4:30 PM | Moscone West | 2020
C-Suite View | Governance, Risk & Compliance | Privacy | Classroom
The European General Data Protection Regulation is the most significant development in data protection in the last 20 years. With a May 2018 compliance deadline looming, and more privacy and security requirements than ever, this presentation will help…
Speaker: Chris Zoladz, Founder, Navigate LLC
Security Awareness Training: How to Keep It Fresh and Engaging for Employees P2P4-T11
February 14, 2017 | 3:45 PM – 4:30 PM | Marriott Marquis | Nob Hill D
Human Element | Security Strategy | Peer2Peer
Technology is easy, people are hard. Employee mistakes are the most difficult security threat to mitigate and also the most likely to cause inadvertent breaches. Many people have reached the point of security fatigue, so how can organizations keep se…
Facilitator: Melissa Moreno, Executive Director, Infrastructure & Cybersecurity, Gallup
Integrating IT Risk Management and Business Continuity Planning for Business Resilience (MetricStream)
February 14, 2017 | 4:50 PM – 5:10 PM | South Expo Briefing Center
With sophisticated cyber-attacks and data breaches increasingly becoming the top threats to business operations, IT risk management and business continuity are top of mind for enterprises to build business resilience. This session focuses on how integrating IT risk management, cyber incident response strategies, and business continuity planning within the enterprise risk management program, enables organizations to respond with a well-coordinated plan in the case of an event.
Wednesday, February 15
Find Map, Get Treasure, Avoid Pirates—Data Security and Privacy Best Practice PRV-W02
February 15, 2017 | 8:00 AM – 8:45 AM | Moscone West | 2020
Governance, Risk & Compliance | Privacy | Security Strategy | Classroom
The best practices of data security and privacy are like playing “Treasure Hunt.” Imagine yourself in a tropical paradise. You need to find and guard a cache of valuable buried treasure. Learn about these top 10 data security and privacy best practice…
Speaker: Cindy Compert, CTO Data Security & Privacy, IBM Security, IBM
Are You Protecting Data That Has Already Been Compromised? (Capgemini)
February 15, 2017 | 10:20 AM – 10:40 AM | South Expo Briefing Center
The large number of successful ransomwares, highly visible due to their immediate impact, leaves one wondering how many other attacks might have gone unnoticed, especially those with long-term objectives, such as cyberespionage. Arnauld Mascret, Global Leader of Threat Hunting Services for Capgemini Group, will present a new approach to search for those unnoticed attacks in an IT system.
Threat is the New Risk (RiskVision)
February 15, 2017 | 11:30 AM – 11:50 AM | South Expo Briefing Center
Sharing the latest in threat-centric risk intelligence, including how new threat objects and management, operational risk and compliance enhancements and big data analytics and visualization extends RiskVision’s strategy for empowering organizations to manage risk centralized and decentralized across their three lines of defense.
An Aflac Case Study: Moving a Security Program from Defense to Offense CXO-W11
February 15, 2017 | 2:45 PM – 3:30 PM | Marriott Marquis | Yerba Buena 9
C-Suite View | Security Strategy | Classroom
The strategy of companies taking a more offensive cybersecurity posture has been a trending industry topic, with discussions around companies developing counterattack or hack back strategies against attackers. This presentation will examine proven methods to move from a traditional, defensive in-depth posture to taking an offensive approach on the premise that “the best defense is a good offense.”
Speaker: Tim Callahan, SVP, Global Chief Security Officer, Aflac
Thursday, February 16
Data Futures: Protecting the Changing Value of Data
February 16, 2017 | 11:20 AM – 11:40 AM | Moscone West | Level 3
The value of data is in constant flux due to aggregation, correlation and usage. Hear how new cryptographic models, including quantum cryptography, homomorphic cryptography and Blockchain, protect both the current and future value of data—allowing business professionals to create, use and dispose of data with the confidence that they will be protected over time.
Terence Spies, HPE Distinguished Chief Technologist, Hewlett Packard Enterprise
The General Data Protection Regulation and the Impact on Incident Response PDAC-W11R
February 16, 2017 | 2:45 PM – 3:30 PM | Moscone West | 2001
Governance, Risk & Compliance | Protecting Data & Applied Crypto | Classroom
The GDPR will enforce strict data protection rules for PII of EU citizens, as well as a breach notification requirement. For incident responders, this introduces some tough questions: how can you assess whether PII was accessed and how far should your investigation go? This session will recount experiences with similar legislation in the Netherlands and the challenges encountered while performing IR.
Speaker: Krijn de Mik, Head of Security Research Team, Fox-IT
Friday, February 17
Successful Implementation of UEBA into Your Organization’s Environment HUM-F02
February 17, 2017 | 10:15 AM – 11:00 AM | Moscone West | 2018
Analytics, Intelligence, & Response | Human Element | Classroom
The growth of organizations using behavior analytics in the last two years has been exponential, with UEBA potentially becoming a BILLION-dollar market by 2020. But how can you successfully implement this technology? How do you plan and execute? What More…
Speaker: Stewart Draper, Insider Threat Program Manager, Large Financial Institute
For more information on the keynotes and session, here is a link to the catalog: https://rsaconference.dcatalog.com/v/Catalog-Brochure/
Don’t miss a post! Subscribe to The Insider Threat Security Blog here:
Corin Imai is a Director of Marketing for STEATHbits. Corin began her career working on server, application and desktop virtualization, networking, software-as-a-service, and cloud computing technologies before delving into application and data security. In her current capacity at STEALTHbits, she manages the industry-leading StealthAUDIT suite that enterprises around the world depend on to defend their most critical information. Corin can be found on Twitter @corinimai