Click here to close now.




















Welcome!

News Feed Item

RSA® Conference 2013 Analyst Teleconference to Discuss Top Cybersecurity Trends

RSA Conference:

What:

 

RSA® Conference, the world’s leading information security conferences and expositions, will conduct its annual teleconference featuring three of today’s leading security analysts from Gartner, 451 Research and Forrester. The teleconference will discuss top cybersecurity trends including mobile and big data security, as well as preview upcoming sessions at RSA Conference 2013, being held on February 25 – March 1 at Moscone Center in San Francisco.

 
The teleconference will feature research and commentary from Ramon Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of Forrester. Hugh Thompson, Program Chair of RSA Conference, will act as the moderator.
 
There will be a 15-minute Q&A prior to the conclusion of the call.
 

When:

Wednesday, February 13 at 2:00 PM ET/11:00 AM PT
 

Where:

Please click this link to register: https://rsaconference.webex.com/rsaconference/onstage/g.php?t=a&d=669144152

 

Who:

Ramon Krikken, Gartner

Ramon Krikken is a Research Vice President within Gartner's Risk Management Strategies team. He covers software/application security; mobile application security and service-oriented architecture (SOA) security; structured and unstructured data security management, including data masking, redaction and tokenization; cryptography, key management and PKI; security monitoring and security analytics; security metrics; and virtualization and cloud computing security as it pertains to the other categories. In addition to his participation in this teleconference, Krikken will participate in the following RSA Conference 2013 session: “Software Security: A Waste of Time,” on Wednesday, February 27 at 9:20 AM.

 

Wendy Nather, 451 Research

Wendy Nather is Research Director, Security, within 451 Research's Enterprise Security Program, providing analysis on the current state of security from the perspective of a veteran CISO. Nather’s primary areas of coverage are application security, identity and access management, threat intelligence, and security services. She is co-author of the book, ‘The Cloud Security Rules,’ and was named one of Tripwire's "Top 25 Influencers in Security You Should Be Following." In addition to her participation in this teleconference, Nather will participate in the following RSA Conference 2013 sessions, “Psychographics of the CISO,” on Wednesday, February 27 at 9:20 AM, and “Living Below the Security Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.

 

Chenxi Wang, Forrester

Chenxi Wang is Vice President and Principal Analyst at Forrester serving Security and Risk Professionals. She is a leading expert on mobile security, endpoint security, application security, and cloud security. Wang leads the effort at Forrester to build the research portfolio that addresses how enterprise mobility, consumerization, and emerging threats affect security strategy, policy, architecture, application development, and operations. She has also written extensively about global data privacy laws and the China technology market and closely follows the technology adoption trends in that market. In addition to her participation in this teleconference, Wang will participate in the following RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a VDI Desktop More Secure Than a Standard Desktop,” on Thursday, February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT and Risk Footprint,” on Thursday, February 28 at 1:40 PM.

 

Moderator: Dr. Herbert “Hugh” Thompson, Program Chair of RSA Conferences

Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more than 80 academic and industrial publications on security. In 2006, Thompson was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine and has been interviewed by top news organizations including the BBC, CNN, MSNBC, Financial Times, Washington Post and others. He has been an adjunct professor at Columbia University in New York for the past few years where he taught courses on computer security. In addition to his participation in this teleconference, Thompson will be one of the speakers at the day-long Security Basics seminar at RSA Conference 2013 on Monday, February 25 beginning at 8:30 AM. He will also be keynoting on Friday at 1:00 PM with special guests.

 

About RSA Conference
RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at www.rsaconference.com.

RSA and the RSA Conference logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Palerra, the cloud security automation company, announced enhanced support for Amazon AWS, allowing IT security and DevOps teams to automate activity and configuration monitoring, anomaly detection, and orchestrated remediation, thereby meeting compliance mandates within complex infrastructure deployments. "Monitoring and threat detection for AWS is a non-trivial task. While Amazon's flexible environment facilitates successful DevOps implementations, it adds another layer, which can become a ...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, S...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Delphix, the market leader in Data as a Service (DaaS), has been announced winner of the DevOps Solution Award at the prestigious Computing Vendor Excellence Awards in London. The awards celebrate the achievements of the technology vendors and service providers that are leading the field of enterprise IT. Delphix was recognised as the vendor demonstrating the most effective support of DevOps culture for its ability to improve time to market and collaboration between teams.
"Our biggest growth area has been the security services, the managed services - the things that differentiate us in the market that there is no client that's too small and there's no client that's too big," explained Paul Mazzucco, Chief Security Officer at TierPoint, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
The Cloud industry has moved from being more than just being able to provide infrastructure and management services on the Cloud. Enter a new era of Cloud computing where monetization’s services through the Cloud are an essential piece of strategy to feed your organizations bottom-line, your revenue and Profitability. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed how to easily o...
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Sysdig has announced two significant milestones in its mission to bring infrastructure and application monitoring to the world of containers and microservices: a $10.7 million Series A funding led by Accel and Bain Capital Ventures (BCV); and the general availability of Sysdig Cloud, the first monitoring, alerting, and troubleshooting platform specializing in container visibility, which is already used by more than 30 enterprise customers. The funding will be used to drive adoption of Sysdig Clo...
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
"We do data integration for B2B also application to application, and we do data management and enable Big Data," explained Pat Adamiak, Vice President, Product Marketing at Liaison Technologies, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
"We specialize in testing. DevOps is all about continuous delivery and accelerating the delivery pipeline and there is no continuous delivery without testing," noted Marc Hornbeek, Sr. Solutions Architect at Spirent Communications, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.