Connect with HP Software at RSA 2013

Having never been to an RSA Conference before I decided to do some research since I will be attending this year. From my knowledge of being in the technology industry for less than five years, I knew that RSA was a security company that hosted a rather large yearly conference at the Moscone Center in San Francisco, CA.

 

In part of my research I found a really fun fact that RSA is named after its founders, Ron Rivest, Adi Shamir and Leonard Adleman, much like a law firm. These men continued to grow their small security firm into a multibillion dollar company and were acquired by EMC.

 

RSA 2013.png

 

This year, I will be accompanying some of the most intelligent men and women I know in the security field to RSA which takes place Feb. 25 - March 1 in San Francisco. They will be demonstrating products, solutions and the HP Software security portfolio on the showroom floor. If you want up-to-date information about HP Software’s involvement at RSA during the event, visit www.hp.com/go/backstage. I’ll also blog from the conference so check back for more on keynotes, showroom floor pictures and behind the scenes updates.

 

There are two events I highly suggest attending:

 

  • Criminal Education: Lessons from the Criminals and their Methods – a keynote from Art Gilliland, SVP and GM of Enterprise Security Products at HP. Thursday, Feb. 28, 3:00 – 3:30 p.m.
  • The Real Economics of Cybercrime - a track session with John Pirc, Director of Enterprise Security Products at HP. His book, Blackhatomomics, was picked up by NYU’s Professor Joseph Vaisman, Department of Computer Science and Engineering, Polytechnic Institute. Wednesday, Feb. 27, 10:20 – 11:00 a.m.

 

Additional breakout sessions / tracks from HP are below:

Facilitating a Whiteboarding Session, as part of the Innovation Sandbox -- Mobile Security topic TBD

Speaker: Jacob West, Director,  Software Security Research                                                                  

Date/Time: Monday,February 25, between 3:30 – 4:30 p.m.

 

The Real Economics of Cybercrime

In this session, renowned security expert John Pirc will explain the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. John will take practical academic principles, back them up with use-cases and highlights from extensive interviews, placing you right into the mindset of the cyber criminal.

Speaker:  John Pirc, Director,  HP Enterprise Security Products

Date/Time: Wednesday, Feb 27, 10:20 – 11:00 am

 

Can you Trust your Software?

In this session, Ryan English will discuss the truth behind application security and what choices you have.  Ryan will detail the most common application threats and what leading edge companies are doing to ensure their traditional, cloud and mobile applications are not the source of a successful breach.  In addition to real world examples, you’ll see a live demonstration of HPs leading SaaS-based application security solution.  Ryan will upload, test and show the results of a mobile application security test in real time.

Speaker: Ryan English

Date/Time: Wednesday, Feb 27, 11:00 – 11:20 am

 

Who, What, Where and How: Five Big Questions in Mobile Security

This talk shifts the focus from the sexiest new vulnerabilities in Google Android or Apple iOS apps to questions that help organizations understand the far-reaching implications of decisions about the who, what, where and how of the mobile software they develop. We tackle issues ranging from platform support to secure SDLCs and discuss how decisions today have tactical implications.

Speaker: Jacob West, Director, Software Security Research                                                     

Date/Time: February 28, 8:00 – 9:00 a.m.                                                                                            

 

How the Constitution Protects your Cell Phone and Laptop Encryption Key

Can the government search your cell phone or force you to give up your laptop encryption password? A careful analysis of cases around the 4th and 5th amendments gives you the answer.

Date/Time: March 1, 10:20 – 11:20 a.m.

Speaker: Abraham Kang, Principal Security Researcher

 

For more information on the RSA conference, visit their Web site at http://www.rsaconference.com/.

 

And check back regularly on Backstage with HP Software for a behind the scenes look.

 

-Corin Imai

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.