Welcome!

News Feed Item

RSA® Conference 2014 Opens Today in San Francisco

RSA Conference, the world’s leading information security conferences and expositions, kicked off its annual show today at San Francisco’s Moscone Center. Taking place February 24 to February 28, RSA Conference 2014 brings together the top information security professionals and business leaders to discuss emerging cybersecurity trends and formulate best strategies for tackling current and future threats.

This year’s Conference includes a notable lineup of featured speakers, including:

  • Nawaf Bitar, Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc.
  • Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft Corporation
  • Stephen Colbert, Award-winning host and executive producer of "The Colbert Report" and New York Times best-selling author
  • James Comey, Director, Federal Bureau of Investigations
  • Philippe Courtot, Chairman and Chief Executive Officer, Qualys
  • Arthur W. Coviello, Jr., Executive Chairman, RSA
  • Mike Fey, Worldwide Chief Technology Officer, McAfee
  • Art Gilliland, Senior Vice President and General Manager, HP Software Enterprise Security Products, Hewlett-Packard Company
  • Scott Harrison, Founder and Chief Executive Officer, charity: water
  • Kevin Mandia, Senior Vice President and Chief Operating Officer, FireEye
  • Peter Sims, Best-selling author and entrepreneur
  • Herbert “Hugh” Thompson, Ph.D, Program Committee Chair, RSA Conference
  • Stephen Trilling, Senior Vice President of Security Intelligence and Technology, Symantec Corp.
  • Padmasree Warrior, Chief Technology & Strategy Officer (CTSO), Cisco, Chris Young, Senior Vice President, Cisco Security and Government Group, Cisco
  • Taylor Wilson, Nuclear Scientist and STEM Education Evangelist

“This year we head into the most discussed conference in our history. There are tens of thousands of attendees that will converge on San Francisco to continue the dialog, share information and drive collective intelligence from both the private and public sectors,” said Alex Bender, General Manager of RSA Conference. “The cyber-security industry is stronger than it has ever been and RSA Conference has become the platform where the world talks security.”

Some of the highlights at RSA Conference 2014 include:

  • Innovation Sandbox – Kicking off on Monday, February 24, the popular Innovation Sandbox program will culminate with one finalist being named “RSA Conference 2014’s Most Innovative Company.”
  • Exclusive Sessions on Industry hot Topics Throughout the week, RSA Conference will be hosting a number of sessions covering pressing topics like surveillance and privacy, Software Defined Networks (SDN), Analytics and Big Data, the Human Element and many more. On Tuesday, February 25, a discussion on NSA surveillance will be hosted by James Lewis, Program Director, Center for Strategic and International Studies (CSIS) alongside Michael Hayden, Principal, The Chertoff Group, and Richard Clarke, Chief Executive Officer, Good Harbor Security Risk Management. On Friday, February 28th, Dan Geer, security luminary, will speak on why “We Are All Intelligence Officers Now.”
  • The Cryptographers’ Panel – On Tuesday, February 25, join the founders and leaders of cryptography for an engaging panel discussion about the latest advances in the field, including research areas to watch in 2014 and insights drawn from lessons learned over the last three decades. Panelists at this year’s keynote session include: Paul Kocher, President and Chief Scientist, Cryptography Research, Adi Shamir, Professor, Computer Science Department, Weizmann Institute of Science, Israel, Brian LaMacchia, Director, Security & Cryptography, XCG Lab, Microsoft Research, Ronald Rivest, Vannevar Bush Professor, MIT and Whitfield Diffie, Advisory Board, SafeLogic.
  • Keynote with Scott Harrison – Seven years ago Scott Harrison started charity: water with a mission to bring clean drinking water to every person on the planet living without it. Learn from Scott's personal journey from New York City nightlife to building an organization that’s funded more than 9,000 water projects in 20 countries. The remarkable success of charity: water shows us the power of community and technology when focused on a single, shared mission. Attendees can get involved by participating in the RSA Conference charity: water Challenge taking place in The Sandbox, Moscone North room 134. The challenge, walking with a full jerry can of water, simulates conditions for those who have to struggle for clean water each day. If 300 attendees complete the challenge, RSA Conference will fund two water projects in Nepal, each of which will serve 400 students.
  • STEM Education Coalition RSA Conference is challenging the industry to cultivate future information security leaders by joining the STEM Education Coalition. The Conference’s goal is to partner with 20 security organizations to join the STEM Education Coalition, fund STEM awareness, lobby Congress on education policy and deliver curriculum to students from kindergarten through higher education. Attendees are encouraged to interact with the STEM Education Coalition during RSA Conference by tweeting @StemEdCoalition

RSA Conference would like to extend its thanks to 2014 sponsors: IS THERE SOME REASON FOR THE ORDER OF SPONSORS? Juniper Networks; Microsoft, RSA Cisco; FireEye; Akamai, Ixia; Splunk; HP; Intel Security; Qualys; Symantec; HOB; Sophos; TeleTrusT; Trend Micro; Websense; AhnLab, Barracuda; Blue Coat; CA Technologies; Entrust; HID; Narus; Palo Alto Networks; SafeNet; Secunia; Tripwire; Trustwave; Venafi; Veracode; Verizon; Aligiance; Attachmate; BeyondTrust; Checkmarx; Citrix; Covisint; Entersekt; Identity Finder; Intel; Jiransoft; Lancope; Lieberman Software; LynuxWorks; NagraID Security; Proofpoint; Quintessence Labs; Sourcefire; SSH Communications Security; Sypris; Tenable Network Security; UNICOM Engineering; Unisys; viaForensics; and, Vormetric.

A complete RSA Conference 2014 agenda can be found at: http://www.rsaconference.com/events/us14/agenda

RSA CONFERENCE ONLINE

About RSA Conference

RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at www.rsaconference.com.

EMC2, EMC, RSA and their respective logos are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, highlighted the current challenges of these transformative technologies and shared strategies for preparing your organization for these changes. This “view from the top” outlined the latest trends and developments i...
Artificial intelligence, machine learning, neural networks. We’re in the midst of a wave of excitement around AI such as hasn’t been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. Will this time be different? Most likely. Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Furthermore, the funding and research going into AI now comes from a wide range of com...
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo Silicon Valley which will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is at the intersection of technology and business-optimizing tools, organizations and processes to bring measurable improvements in productivity and profitability," said Aruna Ravichandran, vice president, DevOps product and solutions marketing...