Click here to close now.


News Feed Item

RSA® Conference 2014 Opens Today in San Francisco

RSA Conference, the world’s leading information security conferences and expositions, kicked off its annual show today at San Francisco’s Moscone Center. Taking place February 24 to February 28, RSA Conference 2014 brings together the top information security professionals and business leaders to discuss emerging cybersecurity trends and formulate best strategies for tackling current and future threats.

This year’s Conference includes a notable lineup of featured speakers, including:

  • Nawaf Bitar, Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc.
  • Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft Corporation
  • Stephen Colbert, Award-winning host and executive producer of "The Colbert Report" and New York Times best-selling author
  • James Comey, Director, Federal Bureau of Investigations
  • Philippe Courtot, Chairman and Chief Executive Officer, Qualys
  • Arthur W. Coviello, Jr., Executive Chairman, RSA
  • Mike Fey, Worldwide Chief Technology Officer, McAfee
  • Art Gilliland, Senior Vice President and General Manager, HP Software Enterprise Security Products, Hewlett-Packard Company
  • Scott Harrison, Founder and Chief Executive Officer, charity: water
  • Kevin Mandia, Senior Vice President and Chief Operating Officer, FireEye
  • Peter Sims, Best-selling author and entrepreneur
  • Herbert “Hugh” Thompson, Ph.D, Program Committee Chair, RSA Conference
  • Stephen Trilling, Senior Vice President of Security Intelligence and Technology, Symantec Corp.
  • Padmasree Warrior, Chief Technology & Strategy Officer (CTSO), Cisco, Chris Young, Senior Vice President, Cisco Security and Government Group, Cisco
  • Taylor Wilson, Nuclear Scientist and STEM Education Evangelist

“This year we head into the most discussed conference in our history. There are tens of thousands of attendees that will converge on San Francisco to continue the dialog, share information and drive collective intelligence from both the private and public sectors,” said Alex Bender, General Manager of RSA Conference. “The cyber-security industry is stronger than it has ever been and RSA Conference has become the platform where the world talks security.”

Some of the highlights at RSA Conference 2014 include:

  • Innovation Sandbox – Kicking off on Monday, February 24, the popular Innovation Sandbox program will culminate with one finalist being named “RSA Conference 2014’s Most Innovative Company.”
  • Exclusive Sessions on Industry hot Topics Throughout the week, RSA Conference will be hosting a number of sessions covering pressing topics like surveillance and privacy, Software Defined Networks (SDN), Analytics and Big Data, the Human Element and many more. On Tuesday, February 25, a discussion on NSA surveillance will be hosted by James Lewis, Program Director, Center for Strategic and International Studies (CSIS) alongside Michael Hayden, Principal, The Chertoff Group, and Richard Clarke, Chief Executive Officer, Good Harbor Security Risk Management. On Friday, February 28th, Dan Geer, security luminary, will speak on why “We Are All Intelligence Officers Now.”
  • The Cryptographers’ Panel – On Tuesday, February 25, join the founders and leaders of cryptography for an engaging panel discussion about the latest advances in the field, including research areas to watch in 2014 and insights drawn from lessons learned over the last three decades. Panelists at this year’s keynote session include: Paul Kocher, President and Chief Scientist, Cryptography Research, Adi Shamir, Professor, Computer Science Department, Weizmann Institute of Science, Israel, Brian LaMacchia, Director, Security & Cryptography, XCG Lab, Microsoft Research, Ronald Rivest, Vannevar Bush Professor, MIT and Whitfield Diffie, Advisory Board, SafeLogic.
  • Keynote with Scott Harrison – Seven years ago Scott Harrison started charity: water with a mission to bring clean drinking water to every person on the planet living without it. Learn from Scott's personal journey from New York City nightlife to building an organization that’s funded more than 9,000 water projects in 20 countries. The remarkable success of charity: water shows us the power of community and technology when focused on a single, shared mission. Attendees can get involved by participating in the RSA Conference charity: water Challenge taking place in The Sandbox, Moscone North room 134. The challenge, walking with a full jerry can of water, simulates conditions for those who have to struggle for clean water each day. If 300 attendees complete the challenge, RSA Conference will fund two water projects in Nepal, each of which will serve 400 students.
  • STEM Education Coalition RSA Conference is challenging the industry to cultivate future information security leaders by joining the STEM Education Coalition. The Conference’s goal is to partner with 20 security organizations to join the STEM Education Coalition, fund STEM awareness, lobby Congress on education policy and deliver curriculum to students from kindergarten through higher education. Attendees are encouraged to interact with the STEM Education Coalition during RSA Conference by tweeting @StemEdCoalition

RSA Conference would like to extend its thanks to 2014 sponsors: IS THERE SOME REASON FOR THE ORDER OF SPONSORS? Juniper Networks; Microsoft, RSA Cisco; FireEye; Akamai, Ixia; Splunk; HP; Intel Security; Qualys; Symantec; HOB; Sophos; TeleTrusT; Trend Micro; Websense; AhnLab, Barracuda; Blue Coat; CA Technologies; Entrust; HID; Narus; Palo Alto Networks; SafeNet; Secunia; Tripwire; Trustwave; Venafi; Veracode; Verizon; Aligiance; Attachmate; BeyondTrust; Checkmarx; Citrix; Covisint; Entersekt; Identity Finder; Intel; Jiransoft; Lancope; Lieberman Software; LynuxWorks; NagraID Security; Proofpoint; Quintessence Labs; Sourcefire; SSH Communications Security; Sypris; Tenable Network Security; UNICOM Engineering; Unisys; viaForensics; and, Vormetric.

A complete RSA Conference 2014 agenda can be found at:


About RSA Conference

RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at

EMC2, EMC, RSA and their respective logos are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at, examined how Docker has evolved into a highly effective tool for application del...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...