RSAC2020 2020 Feb. 24, 2020 to Feb. 28, 2020, San Francisco, US

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Accelerate Threat Detection and Response in Modern Networks (Rapid7) N/a With sprawling environments, multiple clouds, and businesses dependency on IT, security is challenged to keep ...
BEC: Fighting a $26 Billion Phishing Problem (Agari) N/a Phishing via non-technical social engineering methods, such as business email compromise, now costs businesses more ...
Keynote: Reality Check: The Story of Cybersecurity Rohit Ghai It’s our stories that make us human. We love a memorable narrative and often exaggerate ...
Keynote: Time to Tell Steven Grobman The sun rises and sets like clockwork, and yesterday’s innovations are gone tomorrow. Except, it ...
Keynote: We the People: Democratizing Security Wendy Nather The industry is still building security based on an outdated model. Where enterprises used to ...
The Cryptographers’ Panel Whitfield Diffie , Ronald l. Rivest , Zulfikar Ramzan , Adi Shamir , Arvind Narayanan , Tal Rabin Each year the founders and leaders of the cryptography field take the RSA Conference keynote ...
Keynote: Cybersecurity Has a Posse Heather Krebs Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs will participate in a fireside ...
Keynote: Fear and Loathing in Cybersecurity: An Analysis of the Psychology of Fear Dr. Jessica Barker For too long, the cybersecurity industry has attempted to use FUD to engage with the ...
Consent, Alignment and Cooperation in the Internet Era Dr. Paul Vixie Much of the spectrum of human action and human custom translates more or less from ...
The Journey of Cybersecurity in Kuwait’s Oil and Gas Industry Dr. Reem Al-shammari The journey of cybersecurity in Kuwait’s oil and gas (O&G) industry encompasses the establishment of ...
Panel Discussion: Open Source: Promise, Perils and the Path Ahead Diana Kelley , Lenny Zeltser , Ed Moyle , Inigo Merino , Dr. Kelley Misata This informative discussion will explore security ramifications and implications of open source tools as well ...
Cybersecurity Tips, Tools and Techniques: Updated for 2020 Ron Woerner This rapid-fire presentation, updated from 2019, showcases apps and sites used in cybersecurity testing, investigations, ...
Imagining the Future of Security Heather Vescent The foresight process can help imagine a range of possible futures and a set of ...
Hot Topics in Cyber-Law 2020 Michael Aisenberg , Lucy Thomson , Stephen Wu , Catherine Barrett ABA information security leaders kick off the Law Track with the annual panel on critical ...
Leading Change: Building a Security Culture of Protect, Detect and Respond Lance Spitzner Cybersecurity is no longer just about technology; it is ultimately about organizational change. Change in ...
Using the Hacker Persona to Build Your DevSecOps Pipeline Dr. Yeman The requirement to build mission critical capabilities faster while ensuring the capabilities are secure and ...
It’s All about the States: Navigating the Privacy Thicket Behnam Dayanim In the wake of Europe’s landmark GDPR and in the face of federal legislative inaction, ...
Shodan 2.0: The World’s Most Dangerous Search Engine Goes on the Defensive Dr. Michael Mylrea Shodan has been called the world’s most dangerous search engine that can hack IoT with ...
The Power of Cooperation: Why Cybersecurity Risks Need Public-Private Punch Tim Clarke Sophisticated, unrelenting cyberthreats are forcing IT and business leaders to find more effective solutions. Learn ...
Enterprise Incident Management: How to Get Everyone Ready for a Crisis Erin Becker Erin Becker will talk about how Target built an enterprise cyber-response program, structured the team ...
Balancing UX and Secure Banking in a Fast Transforming Industry Boudewijn Valk The digital transformation of the financial sector leads to customers expecting an experience as offered ...
Break the Top 10 Cloud Attack Killchains Shawn Mogull As cloud adoption matures, so do cloud attacks. This session will highlight the top 10 ...
Panel Discussion: Coordinating a Competitive 5G Strategy among Freemarket Democracies Michael Chertoff , Arthur W. Coviello , Admiral Dennis Blair , William Roth , Christy Wyatt Huawei’s potential domination of 5G markets brings with it significant economic and national security risks. ...
5 Ways to Break the Cloud (and How to Mitigate against Them) (cyberark) As businesses continue to move critical infrastructure to cloud environments, attackers are more motivated than ...
Speed Networking Morning Session Britta Malik It’s not quite Musical Chairs or Twister, and it’s definitely not Pin the Tail on ...
Imagining a Civilized Internet Jeff Klaben It is time to expect and demand more civilized behavior on the Internet. Adopting more ...
Generic Attack on Iterated Tweakable FX Constructions Ferdinand Sibleyras N/A
Universal Forgery Attack against GCM-RUP Gaetan Leurent , Meiqin Wang , Wei Wang , Ferdinand Sibleyras , Yanbin Li , Guoyan Liu N/A
Detect and Respond to Enterprise IoT Threats on the Network (Extrahop) N/a By 2020, more than half of all Internet-connected devices will be for IoT applications. How ...
APIs: Transformative or Destructive? Arxan Technologies API access has changed app development – and how data is accessed – creating massive ...
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed! Netskope Security teams are constantly keeping up with complex attacks leveraging the cloud, but traditional security ...
IAST—How DAST Solutions Can Be Maximized through IAST Acunetix This session will go through the definition of a DAST solution including its strengths and ...
Be Proactive: Secure Your Data Now Oracle Today’s bad actors are smart - and well-funded. Organizations must be more vigilant now than ...
Scaling-UP & Automating Your Web Application Security in this Brave New World Netsparker Session will explore how to get started working with RESTful APIs in the context of ...
How to Deploy Secure Technologies to Help Reduce eCommerce Fraud William Newhouse E-commerce fraud costs businesses billions of dollars each year. Strengthening user authentication can help mitigate ...
Forensic Techniques against Hackers Evading the Hook Mike Januszkiewicz Cybercrime is a very lucrative business, because it’s quite easy to get away with it. ...
Insider Threats—When Is It Too Late? Jacqueline Collins Based on case trends from the last five years, the Department of State’s Insider Threat ...
Protect Privacy in a Data-Driven World: Privacy-Preserving Machine Learning Casimir Wierzynski Combining AI and privacy doesn’t have to be a zero-sum game. An exciting set of ...