Celebrating its 25th anniversary this year, the RSA Conference creates invaluable opportunities for attendees to connect with top security leaders, discover innovative technologies and deliberate the industry’s most pressing issues. With over 30,000 attendees, this annual event continues to help drive the information security agenda worldwide, and plays an integral role in educating – and inspiring – infosec professionals. With the 2016 conference just a week away, here's a look at what Tripwire has in store for you.
Visit Us At Booth #3301 Join us at the expo floor and learn how Tripwire solutions can help you combat today's ever-changing threat landscape. Watch our live demos for a chance to win awesome prizes, and don't forget to pick up your free copy of our new ebook, Endpoint Detection and Response for Dummies. Check out our in-booth speaking schedule below, including customer success stories and a look at our technology integrations with Blue Coat, Palo Alto Networks, Mandiant and more.
Monday, February 29
Time |
Company/Speaker |
Title |
5:30 PM |
Belden - Mandy Huth |
It's Your Move: Creating a Grand Master's Security Strategy |
6:00 PM |
Tripwire - Travis Smith |
Knowing the Unknown - Monitor Your Endpoints for Enemies |
Tuesday, March 1
Time |
Company/Speaker |
Title |
11:00 AM |
Splunk - Ken Westin |
Do You Have Visibility of Your Vulnerabilities? Your Adversaries Do. |
11:45 AM |
Skillsoft - Lou Saviano |
Customer Success Story |
12:30 PM |
BlueCoat - Joel Ebrahimi |
Complete Defense - Ground Troops with Air Support |
1:15 PM |
Walgreens-Boots - Ed Yousfi |
How to Realign Your Defenses and Protect On All Fronts |
2:00 PM |
Lastline - Dan Mathews |
Integrating Breach Detection and Endpoint Detection to Win the Cyberwar |
2:45 PM |
Chi-X - Mike Aikins |
Tripwire and Chi-X: A Cyberwar Strategic Partnership |
3:30 PM |
Microsoft - Greg Winston |
Helping to Protect Your Data in a Highly Elastic Environment |
4:15 PM |
Tripwire - Craig Young |
Browser Extensions: Friend or Foe? |
Wednesday, March 2
Time |
Company/Speaker |
Title |
11:00 AM |
Belden - Dave Meltzer |
The Belden 1-2-3 Approach to Industrial Cybersecurity |
11:45 AM |
Skillsoft - Lou Saviano |
Customer Success Story |
1:15 PM |
Walgreens-Boots - Ed Yousfi |
How to Realign Your Defenses to Protect On All Fronts |
2:00 PM |
ServiceNow - Alex Cox |
Cutting Edge Sec-Ops: Techniques for Modernizing Incident & Vulnerability Response |
2:45 PM |
Chi-X - Mike Aikins |
Tripwire and Chi-X: A Cyberwar Strategic Partnership |
3:30 PM |
Microsoft - Greg Winston |
Helping to Protect Your Data in a Highly Elastic Environment |
4:15 PM |
Tripwire - Craig Young |
Browser Extensions: Friend or Foe? |
5:00 PM |
Palo Alto Networks - Ariel Cohen |
Partner Spotlight |
Thursday, March 3
Time |
Company/Speaker |
Title |
11:00 AM |
Mandiant - Dan Scali & Tripwire - Dave Meltzer |
Protecting Your Critical Infrastructure |
11:45 AM |
Tripwire - Travis Smith |
Knowing the Unknowing - Monitoring Your Endpoints for Enemies |
12:30 AM |
Belden - Mandy Huth |
It's Your Move: Creating a Grand Master's Security Strategy |
1:15 PM |
Tripwire - Véronique Anxolabéhère |
Under Siege? Forget the Silver Bullet -- You Need a Well-Integrated Arsenal |
Tripwire RSA® Conference 2016 Sessions
Title: Converging IT and OT for Secure, Reliable, Resilient Industrial Networks Speakers: David Meltzer, Chief Research Officer, Tripwire and Chief Architect - Cyber Security, Belden, Jeff Caldwell Date/Time: Tuesday, March 1 at 3:30 PM Location: Room 131 - Moscone North Abstract:
Responding to targeted attacks against critical infrastructure demands improved communications between IT and OT teams, but this convergence can be difficult to achieve. This session will discuss IT and OT myths and misconceptions and how to address cultural differences in each group with the goal of improving security and reliability in industrial control system environments.
Title: Dreaming of IoCs: Adding Time Context to Threat Intelligence Speaker: Travis Smith, Senior Security Research Engineer Date/Time: Wednesday, March 2 at 10:20 AM Location: Room 2006 - Moscone West Abstract:
Using commercial and open-source threat intelligence tools, this talk will demonstrate how to get additional intelligence from your current security infrastructure in order to detect historic and real-time indicators of compromise. Adding valuable time context to threat intelligence allows you to pinpoint when a breach occurred as well as gain critical forensic analysis information.