Hunt for Malware at Your Most Vulnerabl...
Endpoints – now more than ever – remain the most vulnerable attack vector. Complicating matters further, security solutions such as antivirus software on endpoints, are simply unprepared for these new threats. Join us on May 25th to learn how RSA NetWitness® Endpoint helps address this challenge by helping security teams detect and respond to known, unknown, and non-malware endpoint attacks. NetWitness® Endpoint is the endp...
RSA and Assurance Data Spy Museum Lunch...
Join us for a luncheon briefing where you can join an exclusive group of your peers to learn how others are approaching the problem of hunting for malware on your networks and endpoint. Gone are the days of "set it and forget it" antivirus and firewall preventative tools, which gave you confidence that your network and endpoints were protected. We are now in the days of advanced persistent threats (APTs) and zero-day malware, which is malware...
Increased Government Security Through E...
Since large and small government organizations rely on a safe, secure, and resilient infrastructure, it's essential to understand how technology can help preserve operational continuity without interruption. Business resiliency programs can enable a centralized, consistent, and automated approach to business continuity and disaster recovery planning, allowing government organizations to apply best practices across their enterprise while enabli...
Stronger Authentication With RSA SecurI...
Strong identity assurance rests on more than just strong authentication, it requires a context-based approach that links authentication and access policy to determine the appropriate level of authentication, while minimizing the impact on the end-user experience. View our complimentary on-demand webcast, and learn how RSA SecurID Access can help your agency: Enable centralized access to SaaS, web, and on-premises applications Extend the numbe...
RSA Conference USA 2017
Power of Opportunity Take advantage of this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you. In the digital world in which we now live, information is a very highly valued commodity. Safeguarding that...
February 13-17, 2017
Organizer:
RSA Location:
San Francisco, CA
RSA Public Sector Day
Register today to join your peers in public service, government IT luminaries, and RSA executives, for engaging government-specific sessions, high-profile keynotes, and the premier public sector networking event of the conference. RSA Public Sector Day is offered at no cost, for Federal, State, and Local government employees. Attendees of RSA Public Sector Day must obtain a RSA Conference pass to be eligible to attend. An expo pass for RSA Con...
Virtual Session: Top Privacy Issues for...
For decades, information security functions have fought for the responsibility to monitor the flow of information through the organization, in paper and digital formats, throughout its entire life cycle, and to determine the existence and accuracy of data classification. This effort has largely been successful. However, if all data flows through security’s filters, it is incumbent upon security professionals to implement the proper cont...
Enabling Rapid Data-Driven Security Dec...
Organizations have deployed multiple scanners that identify vulnerabilities but produce too much data to actually be helpful in managing security risk. Many organizations have implemented vulnerability scanning solely for compliance purposes and receive limited added value effectiveness of this fundamental control. Missed vulnerabilities, outstanding issues, and lack of clarity of ownership of vulnerabilities leave serious, ongoing holes in th...
Identity Assurance with RSA SecurID Access
During this on-demand webcast you will learn how RSA SecurID Access can help your agency: Enable centralized access to SaaS, web, and on-premises applications Extend the number of authentication options available to end-users to include not only SecurID tokens, but also mobile OTP, fingerprint, eyeprint, and FIDO tokens Map initial, as well as step-up authentication, policies to individual applications Automatically invoke step-up authenticat...
Combatting Advanced Threats With RSA Ne...
Federal security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue their advance by using sophisticated techniques to infiltrate government systems. Tools, Tactics, and Procedures (TTPs) are the ways attackers work to target, exploit, and compromise organizations. Recently, attacker TTPs have become more sophisticated, mimicking normal Federal...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.