RSA Conference 2014: Microsoft’s commitment to protecting customers

The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which runs next week, from Feb. 24-28.

Microsoft is a conference sponsor and we’ll present several speaker sessions during the week. One highlight is the keynote presentation on Feb. 25 by Scott Charney, Corporate Vice President of Trustworthy Computing. In his session, entitled: Conundrums in Cyberspace: Exploiting security in the name of, well, security, Scott will discuss the company’s commitment to protecting customers in the wake of recent disclosures of widespread government surveillance programs.

My colleague Tim Rains will deliver another interesting session: A Deep Dive into the Security Threat Landscape of the Middle East.

The full list of Microsoft’s sessions is below, and if you are at the conference, I hope you will come see them. We’ll be posting regular updates from the conference on this blog and on our Twitter handle:  @MSFTSecurity, so check back often.

Scheduled Time Title Speaker(s)
Tuesday, Feb. 258:45-9:15 Conundrums in Cyberspace: Exploiting security in the name of, well, security Scott Charney
Tuesday, February 251:20-2:20 Welcome & Non-Integral Asymmetric Functions Patrick Longa
Wednesday, February 268:00 AM – 9:00 AM A Deep Dive into the Security Threat Landscape of the Middle East Tim Rains
Wednesday, February 269:20 AM – 10:20 AM New Foundations for Threat Modeling Adam Shostack
Wednesday, February 2610:40 AM – 11:40 AM Pass-the-Hash:  How Attackers Spread and How to Stop Them Nathan Ide, Mark Russinovich
Wednesday, February 2610:40 AM – 11:40 AM Raising the Security Bar with Windows 8.1 Chris Hallum
Thursday, February 278:00 AM – 9:00 AM Public Cloud Security:  Surviving in a Hostile Multitenant Environment Mark Russinovich
Thursday, February 279:20 AM – 9:40 AM How Microsoft IT “Does” Data Protection Laura Hunter
Thursday, February 279:20 AM – 10:20 AM Mutiny on the Bounty:  The Epic Tale of How Data Defeated Dogma Katie Moussouris

We’ll also have a booth on the expo floor where you can check out some great phones and tablets, talk with Microsoft staff, or enjoy a free beverage from our espresso cart. Booth staff will also be handing out passes for the Microsoft Appreciation Party on the night of Feb. 25. Hope to see you there!

About the Author
Jeff Jones

Principal Cybersecurity Strategist

Jeff Jones a 27-year security industry professional that has spent the last decade at Microsoft working with enterprise CSOs and Microsoft's internal teams to drive practical and measurable security improvements into Microsoft products and services. Additionally, Jeff analyzes vulnerability trends Read more »