Looking Ahead: RSA Conference

There are lots of great reasons to attend next week’s RSA conference in San Francisco. With keynotes by industry thought leaders and in-depth panel sessions with security experts, RSA is the seminal event for the cybersecurity industry and you’ll see many of us from Microsoft in attendance.

The cloud, of course, will be the focus of many discussions and the conference will show that the industry has made strong progress on cloud security along with roadmaps and information about what still needs to be done. Another strong theme I think we’ll see coming through is how to strategize for mobile devices and the consumerization of IT.

Perhaps you’re curious about what Scott Charney will be covering in his keynote, or who Tim Rains will be interviewing next for his Cloud Fundamentals video series. As for me, I’ll be backstage, meeting with reporters, talking to customers in the Microsoft booth and checking out the show floor, attending as many sessions  as possible and hanging out at a few of the evening events. Interesting and fun times ahead!

RSA is a good opportunity for Trustworthy Computing to listen to customers and learn from other industry experts and share what we have going on. You can find us in the pavilion hall and at a number of sessions sprinkled throughout the event. Here’s a rundown of these sessions:

Monday, February 27, 2012

Time

Location

Session Agenda

Microsoft Participant(s)

8:30 AM

Room 305

Application Security Seminar

Katie Moussouris

Tuesday, February 28, 2012

Time

Location

Session Agenda

Microsoft Participant(s)

8:50 AM

North Hall D

KEYNOTE: TwC for our Computing-centric Society

Scott Charney

1:10 PM

Room 302

Making Sense of Software Security Advice: Best vs. Practiced Practices

David Ladd

3:50 PM

Room 301

Targeted Exploits & Spear Phishing – Will it be the Demise of Trusted Email?

John Scarrow

3:50 PM

Room 102

Vulnerability Panel: Is it ZERO Day or ZERO Care?

Katie Moussouris

Wednesday, February 29, 2012

Time

Location

Session Agenda

Microsoft Participant(s)

8:00 AM

Room 302

War Stories: The Good, Bad and the Ugly of Application Security Programs

Doug Cavit

8:00 AM

Room 305

Application Access Control – Taming the Wild West

Mike Convertino

10:40 AM

Room 300

Attacks on Advanced Encryption Standard: Results and Perspectives

Dmitry Khovratovich

10:40 AM

Room 120

Compliance, Audits and Fire Drills: In the Way of Real Security?

John Howie, Mark Estberg

Thursday, February 30, 2012

Time

Location

Session Agenda

Microsoft Participant(s)

8:00 AM

Room 302

What Motivated My Company to Invest in a Secure Development Program?

Steven Lipner

8:00 AM

Room 301

Always-On SSL: A Necessity to Deal with an Inconvenient Truth

John Scarrow

8:00 AM

Room 102

Code Red to Zbot: 10 Years of Tech, Researchers and Threat Evolution

Tim Rains, Jeff Jones

10:10 AM

Room 103

Zero Day: A Non-Fiction View

Mark Russinovich

10:40 AM

Room 305

Securing the Mobile Device When Employees are the Decision Makers

Mike Convertino

11:20 AM

Room 104

Evil Through the Lens of Web Logs

Russ McRee

1:00 PM

Room 302

Privacy by Design: Baking Privacy into Business and Product Development

Brendon Lynch

1:00 PM

Room 309

Collaborative Defense: How the Defenders Can Play to Win

Maarten Van Horenbeeck

3:00 PM

Room 309

Mark Russinovich: Zero Day: A Novel

Mark Russinovich

 

I hope to see many of you there. Look for a blog post next week about Scott’s keynote.

About the Author
Adrienne Hall

General Manager, Trustworthy Computing

Adrienne Hall is a General Manager in the Microsoft Trustworthy Computing group, where she leads a team of information technology (IT) professionals who are focused on the security, privacy, reliability, and accessibility of devices and services built on Microsoft technology. Read more »