Event Date: April 16, 2018
Hosted By: RSA & Carahsoft
Location: San Francisco, CA
This event included a specialprogram at RSA Conference 2018 designed for Public Service, US Federal, DOD, and State & Local Government. Attendees joined their peers, government IT luminaries, and RSA executives for engaging government-specific sessions, high profile keynotes, and the premier public sector networking event of the conference.
Security teams need to evolve to stay in front of
attackers and the latest threats, but in recent years this
has become much more difficult. Attackers continue to
advance and use sophisticated techniques to infiltrate
organizations which no longer have well defined
perimeters. Attackers spend s...
Together RSA NetWitness Suite and the GigaSECURE Security Delivery Platform provide pervasive and intelligent visibility into the physical and virtual networks for OpenStack, VMware, including NSX, powered private clouds plus Amazon Web Services public clouds.
Attendees of this interactive briefing will discover how, with the right business continuity, disaster recover, and crisis management, they can integrate business resiliency plans to increase security posture, access crisis plans, alert the right personnel, run risk assessments, and minimize harm to...
When was the last time you were surprised by the unexpected? Most of
us go through our data search routines looking for supporting details to
strengthen our existing assumptions. What if we looked at the same data
but from a slightly different perspective?
Let’s walk through a simple yet very ...
This paper illustrates the major challenges faced by today's Federal Information Assurance professional, and enumerates solutions that RSA Archer provides for each of those challenges. Finally, the ROI for each of the proposed solutions is identified for prospective customers. Audience- this paper i...
It’s an exciting yet daunting time to be a security professional. Security threats are
becoming more aggressive and voracious. Governments and industry bodies are
getting more prescriptive around compliance. Combined with exponentially more
complex IT environments, security management is increa...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
RSA(r) Archer(tm) Business Continuity Management (BCM) provides a centralized, consistent and automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in crisis situations to protect your ongoing operations. This web-based solution combines business c...