To hopefully let my readers in on what is upcoming I wanted to share my RSA schedule so you know what I am attending in case it interests you and you had questions:
For the rest of today:
Crypto panel – too fast to keep up so will post some early stuff online later but not “live”. All times are PST:
11:50 Smile you’ve been pnwed – by Juniper
1:10 The future of endpoint security
2:30 Mobile security smackdown – how government “PWNED” private sector
3:50 Detecting the 1%: Advanced Targeted Malware Detection
Wednesday:
8:00 passwords as an authentication mechanisms are dead
9:20 How software defined datacenter s turning security on it’s head
10:40 Tactical Sec Ops – a guide to precision security operations
12:00 Debate: Does Security awareness training actually improve enterprise security?
1:00 Legal and technical issues of forensics in the cloud. How to prepare
2:20 Collaborative recon – dicuss a community approach to security intelligence
2:50 THe hyperconnected word of inteligent devices – a new era for security
3:20 Securing the data center’s future today
3:40 Cracking cyber stress – how to stay healthy at work
3:50 The new fundamentals of security (not sure if I will attend this one since it conflicts with the previous one)
4:20 Studio -security smarts for the self-guided IT profeassional
5:00 How to identify & validate which security controls are working, need tuning or are missing.
Thursday
8:00 Studio 20 2013: The top privacy issues to watch
9:20 Malware hunting with the sysinternals tools
10:40 Cyber security, technology, and social networking in crisis management
12:00 !CON – RSA conference Rump Session
1:00 Endpoint integrity and access control / NAC is back; making work
2:20 Enabling cloud & BYOD with data-centric security model
3:00 Criminal education: lessons from the criminals and their methods
3:30 The lifecycle of cybercrime
4:00 Mind over matter – managing risk with psychology instead of brute force
4:30 How gaming can make a better world
Friday
9:00 Big data calls for big security
10:20 Advanced techniques for registry forensics – a study of 3 scenarios
11:40 What? me worry? I’ve already been hacked haven’t you?
1:00 The hugh thompson show
1:40 closing remarks with Conoleeza Rice