RSA Conference 2016
RSA Conference 2016 is your best opportunity to connect with the technology, trends and people that will protect our digital world. Based on feedback from past attendees, we have increased Expo hours, expanded session times, and added more Learning Labs and Crowdsourced Sessions. Plus, we've created new programs such as Birds of a Feather Sessions, Focus-On Series and much more.
February 29 - March 4, 2016
Organizer:
RSA Location:
San Francisco, CA
From PR Manager to PR Leader
8:00-8:30am: Registration, continental breakfast, networking 8:30am-Noon: Program Attend this comprehensive workshop and you will be transformed from a good PR manager into a great PR leader. This workshop offers management skills to PR professionals in all employment settings who aspire to become inspiring and capable leaders of people and successful programs. It will teach you how to motivate and manage the people on your team, how to influe...
March 1, 2016
Organizer:
PRSA Location:
Washington, DC
Active Incident Response for Today's Ad...
It’s no secret that effective and timely incident response increases the chance of success in the face of sophisticated cyber attacks, when time is not on your side. This webcast will reveal how, with careful planning and the right resources in place, you can better detect and more quickly respond to a suspected security incident. Join this webcast and learn: The four key areas to focus on to be amply prepared for a major incident The d...
Security Operation Center Management: T...
RSA Archer Security Operations Management (SecOps) enables enterprises to seamlessly orchestrate people, processes, and technology to effectively detect and respond to security incidents. Architected and designed by benchmarking world-class Security Operations Centers, our software solution is SOC process and persona focused. RSA Archer SecOps enables organizations to manage the overall incident response, breach response, and SOC program that...
Taking FISMA Compliance to the "Ongoing...
As a federal Information Assurance (IA) professional, you must comply with FISMA, but you also strive to integrate operational security data into your compliance activities, make true risk-based decisions using current and accurate metrics, and enhance the ROI of the scanners and sensors that you own. The threats are real and the risks are great, so it’s critical to have a highly efficient and effective IA program in place. Automation an...
Combatting Advanced Persistent Threats:...
Enterprises are constantly centralizing incident-response teams to detect and respond to Advanced Persistent Threats (APTs). As customers implement Standard Occupational Classification System (SOCs), a framework is required to seamlessly orchestrate and automate the multiple roles, processes, and technologies to keep up with APT’s and other threats in a highly cost efficient and effective manner. View our on-demand webcast to learn how R...
RSA Conference Europe 2013
About RSA Conference RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established...
DefendUSA Conference & Exhibition
DefendUSA is the Northeast’s answer for the management, planning, preparedness and response to catastrophes, emergency situations, civil defense, corporate security, personal security, and homeland defense. It is an event that brings together first-responders, local & state government officials, emergency managers, hospitals, private security firms, and corporate security at one time under one roof to see and hear what’s new in...
The Data Center Consolidation Blues
Ways to Improve the Effectiveness of Your Consolidation Efforts Are you responsible for or involved in the consolidation of your agency’s data centers? Are you seeking innovative ideas that can help you get the most from these activities? If so, you may wish to join CTOVision, Cleversafe, and Carahsoft for an informative discussion on this topic. Bob Gourley, CTO of CTOVision and an iconic presence in the D.C. area, and Chris Gladwin, CE...
Data Storage: An Efficient Approach to...
Are your storage requirements growing beyond your budget? Are the inefficiencies of making multiple copies of information creating resource issues for you; not enough rack space, not enough cooling, not enough power, not enough staff to maintain the environment? In an effort to ensure reliability, most storage solutions depend on making copies of data. In some cases, data may be replicated as many as 5 or 6 times. And with each replication, a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.