As we bid farewell to 2009, it’s the perfect time to reflect on issues and trends that face the security industry. In this exclusive podcast, world-renowned security expert and RSA Conference 2010 Program Chair Hugh Thompson talks about the top security threats of 2009, including cloud-based computing, the use (and misuse) of social networking and the growth of the underground attacker economy.
Security Reading Room
From workplace computer crimes to common security myths, Ben Rothke’s insightful blog covers interesting and topical security concerns. Rothke is the author of Computer Security: 20 Things Every Employee Should Know, and writes book reviews for Slashdot and Security Management magazine.
Using Claims to Simplify and Secure User Access to Applications and Services
January 20th at 10 a.m. PT / 1 p.m. ET
Growing security demands on applications in addition to application access silos present real challenges for developers and IT. In addition, the advent of cloud-based and SOA software is likely to amplify these challenges. Presented by Kim Cameron, Distinguished Engineer at Microsoft, this webcast shows you how to simplify user access to applications and services with an interoperable claims architecture that is based on Microsoft’s Identity Metasystem vision.
**RSA Conference 2010**
It’s Your Last Chance to Save $400
Don’t miss this final discount on RSA Conference registration fees. Register by January 30th and save $400 instantly.
The Cryptographers’ Panel
Attend RSA Conference 2010 on Tuesday, March 2nd to catch the Cryptographers’ Panel, moderated by Dr. Ari Juels, Chief Scientist and Director at RSA Laboratories. A select panel of industry heavyweights will discuss the latest advances in the field, emerging research areas and practical insights from the past. Panelists include Whitfield Diffie, Martin Hellman, Ronald Rivest, Adi Shamir and Brian Snow.
This year’s RSA Conference features over 250 sessions across 18 tracks. Explore them all with the online Session Catalog, which you can filter and search by keyword, track, speaker and more. Or flip through the virtual pages of the Catalog Brochure, which looks and works just like the printed version.
If you’ve already registered for RSA Conference 2010, start customizing your schedule of sessions with the online Personal Scheduler.
Earn CPE Credits at RSA Conference
Are you working toward certification as an information security professional through (ISC)2 or ISACA? Learn how you can earn continuing professional education (CPE) credits just by attending RSA Conference.
Great ideas don’t happen in a vacuum. That’s why RSA Conference offers Peer2Peer Sessions in addition to a dynamic lineup of regular sessions. This is your chance to interact with a small group of fellow attendees who share a common interest and want to learn more about a specific security issue. Choose from a selection of Peer2Peer Sessions with predetermined topics—or create one of your own!