Who needs long sessions to learn about security?

Tech Talk track highlights key security issues in 15 min. Visit booth #3109 at RSA Conference.

CA Technologies has something new on tap for this year’s RSA Conference. Taking a page out of the successful Tech Talks that CA held at CA World, we have developed a few Tech Talks for RSA Conference that address some of today’s more pressing security challenges, from insider threats and mobile app security, to protecting digital businesses and securing the Internet of Things.

What’s a Tech Talk?

Tech Talks are short, 15 to 20 minute presentations and discussions about some of the security issues facing organizations today. They’re not meant to be deep dives into an issue, but rather raise awareness and provide the opportunity for follow-on discussion. The CA Tech Talks at RSA Conference will be held right in the CA Technologies booth #3109 in the North Hall.

Here is the schedule and a short summary of each talk. Add this to your agenda or just stop in, have a seat and hear about some of the noteworthy challenges facing security pros today.

Tuesday, March 1 @ 12 p.m.

Defend against data breaches:  It’s been shown that privileged users, and the accounts and credentials they use, are a crucial element in conducting a successful attack. But it’s possible to protect those users and stop data breaches in their tracks. This session will review how attackers exploit privileged users and their credentials to carry out breaches. And then it will review how to stop attackers at multiple points in the data breach lifecycle, preventing damage, loss, and operational disruptions.

Tuesday, March 1 @ 2 p.m.

Putting security in identity-as-a-service: The identity-as-a-service solutions of today are helping many businesses address the password management problem, but as more and more enterprises put the cloud at the center of their enterprise IT, is that enough? This session will address the security challenges of a SaaS-first world and the transformation needed in identity-as-a-service to address these challenges.

Tuesday, March 1 @ 4 p.m.

Knock, knock – the IoT wants to come in?: The Internet of Things (IoT) will connect users to the enterprise or just connect to the enterprise independently. But what will be used to secure this access?

Wednesday, March 2 @ 12 p.m.

Preventing data breaches with risk-aware session management: Strong authentication and Single Sign-On can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session? This Tech Talk will discuss how to improve session security.

Wednesday, March 2 @ 2 p.m.

Centralized, convenient application access: This session will explore how a centralized point for everything related to user identities and application access can benefit an organization.

Wednesday, March 2 @ 4 p.m.

Creating an omnichannel experience for your customers: Digital business initiatives are at the forefront of enterprise growth strategies in today’s application economy. This session will address the connectivity required to launch these initiatives and how to empower developers to securely create apps across all of these new channels.

Thursday, March 3 @ 12 p.m.

Mobile risk analysis: Take your mobile app security to the next level: A critical success factor for business is the ability to accurately identify employees and customers in a way that is both convenient to them and cost effective, while also protecting their identities and data from potential fraudsters. This session covers how to transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to log in or perform a sensitive transaction.

Thursday, March 3 @ 2 p.m.

Protect your digital business with one click resolution: Bots and denial of service attacks are impacting digital businesses today and are on an upward trend. They typically result in loss of data, image and revenue. Learn how an analytics-driven approach protects digital business against such threats with one-click resolution, to maximize IT utilization and increase productivity.


Leanne Agurkis has spent 20 years in the communications field. She has worked for CA…

Comments

rewrite

Insights from the app driven world
Subscribe Now >
RECOMMENDED
Managing a DevOps Transition >A Meeting of (Artificial) Minds >Corporate Finance Gets API Makeover >