RSA 2009 April 24, 2009 to April 29, 2009, San Francisco,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America James Bamford N/A
Securing the Smarter Planet Brian Truskowski N/A
Changing Security As We Know It – Software as a Service (SaaS) Has Arrived Giving Rise to Plethora of Security Applications Philippe Courtot N/A
The Transformation of Identity and Access Management Dave Hansen N/A
Wikinomics: How Mass Collabortation Changes Everything Don Tapscott N/A
The Hugh Thompson Show Herbert "hugh" Thompson N/A
Mythbusters Adam Savage , Jamie Hyneman N/A
The “Extreme Makeover” of Network Security Brian Smith N/A
The Cybersecurity Challenge - How Do The Good Guys Win? Dave Dewalt N/A
Collaborate with Confidence John Chambers N/A
Keynote: Information Governance Goes to Court John Facciola , Shira Scheindlin , Jon Stanley , Steven Teppler , Jeffrey Toobin N/A
The Obama Administration’s Cyberspace Policy Review Melissa E. Hathaway N/A
Securing our Government Networks Keith b. Alexander N/A
Keynote: The Cryptographer's Panel Ari Juels , Whitfield Diffie , Ronald l. Rivest , Bruce Schneier , Adi Shamir , Martin Hellman N/A
Moving Towards ‘End to End Trust’: A Collaborative Effort Scott Charney N/A
The New Security Agenda: Changing the Game Enrique Salem N/A
A Common Call: Architecting a New Information Security Landscape Art Coviello N/A
Virtualization Security Christofer ( Hoff ) Hoff , Michael Berman , Simon Crosby , Andreas Antonopoulos , Stephen Herrod In this verbal cage match session, two well-known critics of virtualization security take on two ...
Virtualization, Collaboration and Cloud Computing: A New Focus On Security John N. Stewart , Bob Gleichauf The value of virtualization, collaboration and cloud computing is apparent - but what are the ...
US-CERT: People, Process and Technology Mischel Kwon Vast amounts of cyber risk data, rapid threats, and competing priorities among the public and ...
Tackling Cyber Security Challenges Today: A Dialogue with Senior Cyber Experts Robert F. Lentz , James Lewis , Michael Brown , Paul Kurtz , Jim Richberg Cyber security is receiving unprecedented attention by national governments in the wake of significant concerns ...
Surveillance: Security, Privacy and Risk Rebecca Bace , Matt Blaze , Gary Mcgraw , Deidre Mulligan , Joel Alexander Free societies face thorny questions when considering the tension between individual privacy rights and the ...
Regulatory Approaches to Addressing Cyber Risks - International Perspectives Tim Mather , Betsy Broder , Bajaj Kamlesh , Harriet Pearson , Colin Wallis Cyber security continues to garner more attention as governments and regulators around the globe grapple ...
Law Enforcement and Industry Fighting Cyber Threats, Today and Tomorrow Shawn Henry , Dave Dewalt , Robert Holleyman The FBI is hard at work shutting down threats in cyber space, from criminals to ...
DNS Amplification Attacks Duane Wessels An on-line spat between two pornography Web sites in February brought attention to a supposedly ...
Cyber Security Awareness Volunteer Education Program (C-SAVE) Mischel Kwon , Roland Cloutier , Michael Kaiser , Davina Pruitt-mentle , Bill Sanderson Schools nationwide have not integrated programs covering a comprehensive approach to cyber security. The majority ...
Crash Course: How to Become a Successful Online Fraudster Uri Rivner Learn how to defraud your favorite financial service! Uncover the latest tools, methods and best ...
Cloud Computing – Secure Enough for Primetime Today? Michelle Dennedy , Asheem Chandna , Eran Feigenbaum , Narinder Singh , Jian Zhen How do the leading cloud computing platforms protect sensitive corporate data? What capabilities do they ...
Collaborative Disclosure and Multi-Organizational Cooperation Dan Kaminsky How can the security industry evolve to effectively address wide-reaching vulnerabilities affecting multiple vendors? Can ...
Beyond Best: "Practiced" Practices for Secure Software Development Steven B. Lipner , Paul Kurtz , Gunter Bitz , Wesley Higaki , Reeny Sondhi By analyzing the individual software assurance efforts of its members, SAFECode identified a core set ...