RSA 2010 Oct. 12, 2010 to Oct. 14, 2010, Amsterdam,Netherkands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Lifestyle Hacking: Social Networks and Gen Y Meet Security and Privacy Gary Mcgraw N/A
Deep Inside the Russia MVD: A Hacker Prosecution Unlike All Others Joseph Menn N/A
Learning to Love Consumerization A Jaquith , Senior Analyst , Forrester Research , Will Editor-in-chief , Itriskspace , William Krueger , Information Security Director , Cadence Design Systems , Natalie Lambert , Product Manager , Citrix President , Simplify Ciso , Genentech. Preview. N/A
The Awakening Dragon Ira Winkler N/A
Hacking Exposed – Alive and Well George Kurtz N/A
Safety in the Cloud, Security Services Through the Cloud and Better Protection for All Art Coviello “Small businesses and multi-nationals, local governments and sophisticated agencies are relying on this industry to ...
The Future of Cloud Computing: Our Destiny is in the Clouds Philippe Courtot “So the question is not if we should adopt the cloud or not, but it’s ...
Shifts in the Security Paradigm – What Cloud and Collaboration Demand Dave Hansen “Cloud computing and collaboration technologies give us an opportunity to create a more secure environment ...
What Can We Learn From 40 Years of Cloud Computing? Phil Dunkelberger “Even though they’ve been around, cloud architectures have not yet been subjected to rigorous peer ...
Creating A Safer, More Trusted Internet Scott Charney “Continued collaboration is key to enable technological innovation, evolve global public policy, and foster societal ...
Will the Internet Ever Be Secure? Not Without Trust James Bidzos “Without trust, people and organizations won’t freely share information or purchase online.”
Defeating the Enemy: The Road to Confidence Enrique Salem “Today, business knows no borders and organizations need to be able to share information around ...
There's No "Point" to Security Anymore Dave Dewalt “Today's world of sophisticated malware, targeted threats, and multi-stage attacks requires security that is smart, ...