Welcome!

News Feed Item

RSA® Conference 2013 Analyst Teleconference to Discuss Top Cybersecurity Trends

RSA Conference:

What:

 

RSA® Conference, the world’s leading information security conferences and expositions, will conduct its annual teleconference featuring three of today’s leading security analysts from Gartner, 451 Research and Forrester. The teleconference will discuss top cybersecurity trends including mobile and big data security, as well as preview upcoming sessions at RSA Conference 2013, being held on February 25 – March 1 at Moscone Center in San Francisco.

 
The teleconference will feature research and commentary from Ramon Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of Forrester. Hugh Thompson, Program Chair of RSA Conference, will act as the moderator.
 
There will be a 15-minute Q&A prior to the conclusion of the call.
 

When:

Wednesday, February 13 at 2:00 PM ET/11:00 AM PT
 

Where:

Please click this link to register: https://rsaconference.webex.com/rsaconference/onstage/g.php?t=a&d=669144152

 

Who:

Ramon Krikken, Gartner

Ramon Krikken is a Research Vice President within Gartner's Risk Management Strategies team. He covers software/application security; mobile application security and service-oriented architecture (SOA) security; structured and unstructured data security management, including data masking, redaction and tokenization; cryptography, key management and PKI; security monitoring and security analytics; security metrics; and virtualization and cloud computing security as it pertains to the other categories. In addition to his participation in this teleconference, Krikken will participate in the following RSA Conference 2013 session: “Software Security: A Waste of Time,” on Wednesday, February 27 at 9:20 AM.

 

Wendy Nather, 451 Research

Wendy Nather is Research Director, Security, within 451 Research's Enterprise Security Program, providing analysis on the current state of security from the perspective of a veteran CISO. Nather’s primary areas of coverage are application security, identity and access management, threat intelligence, and security services. She is co-author of the book, ‘The Cloud Security Rules,’ and was named one of Tripwire's "Top 25 Influencers in Security You Should Be Following." In addition to her participation in this teleconference, Nather will participate in the following RSA Conference 2013 sessions, “Psychographics of the CISO,” on Wednesday, February 27 at 9:20 AM, and “Living Below the Security Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.

 

Chenxi Wang, Forrester

Chenxi Wang is Vice President and Principal Analyst at Forrester serving Security and Risk Professionals. She is a leading expert on mobile security, endpoint security, application security, and cloud security. Wang leads the effort at Forrester to build the research portfolio that addresses how enterprise mobility, consumerization, and emerging threats affect security strategy, policy, architecture, application development, and operations. She has also written extensively about global data privacy laws and the China technology market and closely follows the technology adoption trends in that market. In addition to her participation in this teleconference, Wang will participate in the following RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a VDI Desktop More Secure Than a Standard Desktop,” on Thursday, February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT and Risk Footprint,” on Thursday, February 28 at 1:40 PM.

 

Moderator: Dr. Herbert “Hugh” Thompson, Program Chair of RSA Conferences

Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more than 80 academic and industrial publications on security. In 2006, Thompson was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine and has been interviewed by top news organizations including the BBC, CNN, MSNBC, Financial Times, Washington Post and others. He has been an adjunct professor at Columbia University in New York for the past few years where he taught courses on computer security. In addition to his participation in this teleconference, Thompson will be one of the speakers at the day-long Security Basics seminar at RSA Conference 2013 on Monday, February 25 beginning at 8:30 AM. He will also be keynoting on Friday at 1:00 PM with special guests.

 

About RSA Conference
RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at www.rsaconference.com.

RSA and the RSA Conference logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"This is specifically designed to accommodate some of the needs for high availability and failover in a network managed system for the major Korean corporations," stated Thomas Masters, Managing Director at InfranicsUSA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great t...
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry’s single source for the cloud. Fusion’s advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.