Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Posted by: Adrienne Hall, General Manager, Trustworthy Computing
There are lots of great reasons to attend next week’s RSA conference in San Francisco. With keynotes by industry thought leaders and in-depth panel sessions with security experts, RSA is the seminal event for the cybersecurity industry and you’ll see many of us from Microsoft in attendance.
The cloud, of course, will be the focus of many discussions and the conference will show that the industry has made strong progress on cloud security along with roadmaps and information about what still needs to be done. Another strong theme I think we’ll see coming through is how to strategize for mobile devices and the consumerization of IT.
Perhaps you’re curious about what Scott Charney will be covering in his keynote, or who Tim Rains will be interviewing next for his Cloud Fundamentals video series. As for me, I’ll be backstage, meeting with reporters, talking to customers in the Microsoft booth and checking out the show floor, attending as many sessions as possible and hanging out at a few of the evening events. Interesting and fun times ahead!
RSA is a good opportunity for Trustworthy Computing to listen to customers and learn from other industry experts and share what we have going on. You can find us in the pavilion hall and at a number of sessions sprinkled throughout the event. Here’s a rundown of these sessions:
Monday, February 27, 2012
Application Security Seminar
Tuesday, February 28, 2012
North Hall D
KEYNOTE: TwC for our Computing-centric Society
Making Sense of Software Security Advice: Best vs. Practiced Practices
Targeted Exploits & Spear Phishing – Will it be the Demise of Trusted Email?
Vulnerability Panel: Is it ZERO Day or ZERO Care?
Wednesday, February 29, 2012
War Stories: The Good, Bad and the Ugly of Application Security Programs
Application Access Control - Taming the Wild West
Attacks on Advanced Encryption Standard: Results and Perspectives
Compliance, Audits and Fire Drills: In the Way of Real Security?
John Howie, Mark Estberg
Thursday, February 30, 2012
What Motivated My Company to Invest in a Secure Development Program?
Always-On SSL: A Necessity to Deal with an Inconvenient Truth
Code Red to Zbot: 10 Years of Tech, Researchers and Threat Evolution
Tim Rains, Jeff Jones
Zero Day: A Non-Fiction View
Securing the Mobile Device When Employees are the Decision Makers
Evil Through the Lens of Web Logs
Privacy by Design: Baking Privacy into Business and Product Development
Collaborative Defense: How the Defenders Can Play to Win
Maarten Van Horenbeeck
Mark Russinovich: Zero Day: A Novel
I hope to see many of you there. Look for a blog post next week about Scott’s keynote.