HP Enterprise Security Products at RSA 2013

RSA Conference 2013 begins in San Francisco next week with another round of engaging keynotes and informative sessions. HP Enterprise Security Products is delighted to bring to you a number of sessions that you wouldn’t want to miss:

 

-        If you rely on standards like ISO and PCI to measure the security risk to your enterprise, then you must attend the Thursday keynote by Art Gilliland, SVP and GM of HP Enterprise Security Products (HP ESP). He will explain how an overreliance on security frameworks and standards has often left organizations on the losing end of the battle against attackers. In his keynote, Art will discuss various enhancements that will help make these same standards a truly valuable weapon against cyber criminals.

-        Do you own a smartphone? Do you use or develop mobile applications? Do your employees like to use their mobile devices to access corporate email? If yes, then we are sure that mobile security is on your mind. Jacob West, CTO of HP ESP, will force you to think and rethink the implications of your mobile strategy in five big mobile security questions in Who, What, Where and How: Five Big Questions in Mobile Security.

-        John Pirc, Director in HP ESP and the author of Blackhatonomics, will take a deep dive into the world of cybercrime to shed light on the primary economic motivations that drive malware authors and distributors, as well as identity thieves generally.

-        Ryan English, Director of Fortify on Demand and Mobile Application Security at HP ESP will review the major application security threats and lay down the measures that enterprises can implement to protect their mobile, cloud and traditional applications against these threats.

-        Abraham Kang, Principal Researcher on the Fortify Software Security Research team within HP Security Research, focuses on evaluating programming language APIs and web frameworks for security weaknesses. In his free time, Abraham loves studying ways to augment technological safeguards for security and privacy with legal and constitutional protections. In his session, Abraham will review past cases and educate the audience on How the Constitution Protects your Cell Phone and Laptop Encryption Key.

 

Session Details:

Art Gilliland [Keynote], KEY-R37: Criminal Education: Lessons from the Criminals and their Methods – Thursday, February 28, 3:00 PM – 3:30 PM – Hall D

 

Jacob West [Track Session], ASEC-R31: Who, What, Where and How: Five Big Questions in Mobile Security – Thursday, February 28, 8:00 AM – 9:00 AM – Room 132

 

Jacob West [Studio Session], STU-R35A - Studio: Who, What, Where and How: Five Big Questions in Mobile Security – Thursday, February 28, 1:00 PM – 1:20 PM – Room 300

 

John Pirc, The Real Economics of Cybercrime - Wednesday, February 27, 10:40 AM – Room 123

 

Ryan English, Can You Trust Your Mobile Applications? - Wednesday, February 27, 11:20 AM – Room 123

 

Abraham Kang, LAW-F42: How the Constitution Protects your Cell Phone and Laptop Encryption Key – Friday, March 1, 10:20 AM – 11:20 AM – Room 302

 

Also don’t forget to stop by the HP booth to meet and talk security with the HP ESP team.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.