Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE

Top 10 Data Security Sessions at the RSA Conference 2017

Blog >Top 10 Data Security Sessions at the RSA Conference 2017
RSA Conference 2017

It is that time of year again, time to get our bags packed and head to San Francisco for the RSA Conference. This year’s theme is the Power of Opportunity–which is a fitting theme for most security companies as they move toward partnerships that benefit end users.

As a cybersecurity company that focuses on credentials and data, we thought it would be helpful to select a top 10 list of data security sessions for you to attend while at RSA. Don’t forget to also visit us in the North Hall, Booth 4312 for some great conversations and the chance to win a Star Wars Drone.

Tuesday, February 14

EU Data Privacy: What US Orgs Need to Do Now to Prepare for GDPR     PRV-T11

February 14, 2017 | 3:45 PM – 4:30 PM | Moscone West | 2020

C-Suite View | Governance, Risk & Compliance | Privacy | Classroom

The European General Data Protection Regulation is the most significant development in data protection in the last 20 years. With a May 2018 compliance deadline looming, and more privacy and security requirements than ever, this presentation will help…

Speaker: Chris Zoladz, Founder, Navigate LLC

Security Awareness Training: How to Keep It Fresh and Engaging for Employees     P2P4-T11

February 14, 2017 | 3:45 PM – 4:30 PM | Marriott Marquis | Nob Hill D

Human Element | Security Strategy | Peer2Peer

Technology is easy, people are hard. Employee mistakes are the most difficult security threat to mitigate and also the most likely to cause inadvertent breaches. Many people have reached the point of security fatigue, so how can organizations keep se…

Facilitator: Melissa Moreno, Executive Director, Infrastructure & Cybersecurity, Gallup

Integrating IT Risk Management and Business Continuity Planning for Business Resilience (MetricStream)

February 14, 2017 | 4:50 PM – 5:10 PM | South Expo Briefing Center

With sophisticated cyber-attacks and data breaches increasingly becoming the top threats to business operations, IT risk management and business continuity are top of mind for enterprises to build business resilience. This session focuses on how integrating IT risk management, cyber incident response strategies, and business continuity planning within the enterprise risk management program, enables organizations to respond with a well-coordinated plan in the case of an event.

Wednesday, February 15

Find Map, Get Treasure, Avoid Pirates—Data Security and Privacy Best Practice     PRV-W02

February 15, 2017 | 8:00 AM – 8:45 AM | Moscone West | 2020

Governance, Risk & Compliance | Privacy | Security Strategy | Classroom

The best practices of data security and privacy are like playing “Treasure Hunt.” Imagine yourself in a tropical paradise. You need to find and guard a cache of valuable buried treasure. Learn about these top 10 data security and privacy best practice…

Speaker: Cindy Compert, CTO Data Security & Privacy, IBM Security, IBM

Are You Protecting Data That Has Already Been Compromised? (Capgemini)

February 15, 2017 | 10:20 AM – 10:40 AM | South Expo Briefing Center

The large number of successful ransomwares, highly visible due to their immediate impact, leaves one wondering how many other attacks might have gone unnoticed, especially those with long-term objectives, such as cyberespionage. Arnauld Mascret, Global Leader of Threat Hunting Services for Capgemini Group, will present a new approach to search for those unnoticed attacks in an IT system.

Threat is the New Risk (RiskVision)

February 15, 2017 | 11:30 AM – 11:50 AM | South Expo Briefing Center

Sharing the latest in threat-centric risk intelligence, including how new threat objects and management, operational risk and compliance enhancements and big data analytics and visualization extends RiskVision’s strategy for empowering organizations to manage risk centralized and decentralized across their three lines of defense.

An Aflac Case Study: Moving a Security Program from Defense to Offense     CXO-W11

February 15, 2017 | 2:45 PM – 3:30 PM | Marriott Marquis | Yerba Buena 9

C-Suite View | Security Strategy | Classroom

The strategy of companies taking a more offensive cybersecurity posture has been a trending industry topic, with discussions around companies developing counterattack or hack back strategies against attackers. This presentation will examine proven methods to move from a traditional, defensive in-depth posture to taking an offensive approach on the premise that “the best defense is a good offense.”

Speaker: Tim Callahan, SVP, Global Chief Security Officer, Aflac

Thursday, February 16

Data Futures: Protecting the Changing Value of Data

February 16, 2017 | 11:20 AM – 11:40 AM | Moscone West | Level 3

The value of data is in constant flux due to aggregation, correlation and usage. Hear how new cryptographic models, including quantum cryptography, homomorphic cryptography and Blockchain, protect both the current and future value of data—allowing business professionals to create, use and dispose of data with the confidence that they will be protected over time.

Terence Spies, HPE Distinguished Chief Technologist, Hewlett Packard Enterprise

The General Data Protection Regulation and the Impact on Incident Response     PDAC-W11R

February 16, 2017 | 2:45 PM – 3:30 PM | Moscone West | 2001

Governance, Risk & Compliance | Protecting Data & Applied Crypto | Classroom

The GDPR will enforce strict data protection rules for PII of EU citizens, as well as a breach notification requirement. For incident responders, this introduces some tough questions: how can you assess whether PII was accessed and how far should your investigation go? This session will recount experiences with similar legislation in the Netherlands and the challenges encountered while performing IR.

Speaker: Krijn de Mik, Head of Security Research Team, Fox-IT


Friday, February 17

Successful Implementation of UEBA into Your Organization’s Environment     HUM-F02

February 17, 2017 | 10:15 AM – 11:00 AM | Moscone West | 2018

Analytics, Intelligence, & Response | Human Element | Classroom

The growth of organizations using behavior analytics in the last two years has been exponential, with UEBA potentially becoming a BILLION-dollar market by 2020. But how can you successfully implement this technology? How do you plan and execute? What More…

Speaker: Stewart Draper, Insider Threat Program Manager, Large Financial Institute


For more information on the keynotes and session, here is a link to the catalog:

Don’t miss a post! Subscribe to The Insider Threat Security Blog here:


Featured Asset

Leave a Reply

Your email address will not be published. Required fields are marked *




© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.