RSA 2010 March 1, 2010 to March 5, 2010, San Francisco, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Safety In The Cloud, Security Services Through The Cloud And Better Protection For All Arthur Coviello Organizations are firmly on the path to cloud computing and will not be deterred by ...
Creating A Safer, More Trusted Internet Scott Charney With the evolving threat landscape, the upswing of cloud computing, and global policy discussions on ...
Defeating The Enemy: The Road To Confidence Enrique Salem Information is our most precious commodity yet it’s under attack on a number of fronts. ...
The Future Of Cloud Computing: Our Destiny Is In The Clouds Philippe Courtot Cloud computing is the nom du jour of an exciting new computing model the entire ...
There'S No Point To Security Anymore David Dewalt The era of providing complete protection by installing multiple best-of-breed security products has passed. Today's ...
Shifts In The Security Paradigm – What Cloud And Collaboration Demand Dave Hansen Cloud computing and Collaboration technologies are changing the way we communicate and do business. As ...
Cracking The Neural Code John P Donoghue The 1010 neurons of our brain use pulse-coded patterns to command our muscles, allowing thoughts ...
Welcome To The Decade Of Smart Security Al Zollar On the Smart Planet, where important systems of the world become more instrumented and interconnected, ...
What Can We Learn From 40 Years Of Cloud Computing? Phil Dunkelberger Cloud based services have changed the IT landscape and attackers are paying attention. Multi-tenant architectures ...
Will The Internet Ever Be Secure? Not Without Trust James Bidzos Technologies and policies are important, but the future of Internet security rests upon trust. Without ...
Remarks From Director Robert S. Mueller, Iii, U.S. Federal Bureau Of Investigation Robert S Mueller The power and the pervasiveness of the Internet are evident in the way we communicate, ...
Wired For War: The Robotics Revolution And 21St Century Conflict Peter Warren Singer What happens when science fiction becomes battlefield reality? An amazing revolution is taking place on ...
The Hugh Thompson Show Herbert ( Hugh ) Thompson Internet security guru and author Dr. Herbert "Hugh" Thompson has seen it all - hacked ...
Top 20 Critical Security Controls: Planning, Implementing And Auditing James Tarala This course helps you master specific, proven techniques and tools needed to implement and audit ...
Windows Forensics Robert E. Lee Investigations involving Windows-based operating systems occur every day. As a result, it is essential for ...
Virtualization Security Fundamentals Paul Henry In this course you will learn about virtualization security fundamentals with an in-depth treatment of ...
Foundations For Success: Enterprise Identity Management Architecture Dan Houser , Erik T Heidt Identity and Access Management is the foundation for access controls in the Enterprise, a mission-critical ...
Application Security Awareness (Hands-On) Nish Bhalla Students will understand the basics of application security attacks and defenses, along with hands-on examples ...