INGATE

From The Sip Trunking Experts

TMCNet:  RSA® Conference 2013 Opens Today in San Francisco

[February 25, 2013]

RSA® Conference 2013 Opens Today in San Francisco

SAN FRANCISCO --(Business Wire)--

RSA® Conference, the world's leading information security conferences and expositions, kicked off its annual show today at San Francisco's Moscone Center. Taking place February 25 to March 1, RSA Conference 2013 brings together the top information security professionals and business leaders to discuss emerging cybersecurity trends and formulate best strategies for tackling current and future threats.

This year's Conference includes a notable lineup of featured speakers, including:

  • Vint Cerf, Vice President and Chief Internet Evangelist, Google
  • Scott Charney, Corporate Vice President for Trustworthy Computing, Microsoft Corporation
  • Philippe Courtot, Chairman and Chief Executive Officer, Qualys
  • Art Coviello, Executive Vice President of EMC Corporation and Executive Chairman of RSA, The Security Division of EMC
  • Francis deSouza, President, Products and Services, Symantec Corporation
  • Andy Ellis, Chief Security Officer, Akamai Technologies
  • Mike Fey, Worldwide Chief Technology Officer, McAfee
  • Art Gilliland, Senior Vice President and General Manager, HP Software Enterprise Security Products, Hewlett-Packard (News - Alert) Company
  • Dr. Ari Juels, Chief Scientist, RSA, The Security Division of EMC and Director, RSA Laboratories, RSA
  • David Kirkpatrick, CEO and Chief Techonomist ,Techonomy Media
  • Jane McGonigal, Game Designer, Inventor of SuperBetter and author of 'Reality is Broken'
  • Srikanth Nadhamuni, Advisor to UID Authority of India and Chief Executive Officer, Khosla Labs
  • Nicholas Percoco, Senior Vice President, Trustwave Spider Labs
  • Erik Rasmussen, Special Agent, U.S. Secret Service
  • Condoleezza Rice , 66th Secretary of State of the United States
  • Herbert "Hugh" Thompson, Ph.D, Program Committee Chair, RSA Conference
    • With Special Guests: Billy Beane, General Manager, Oakland A's; and Gary Wolf, Founder, The Quantified Self and Contributing Editor at WIRED
  • Jimmy Wales, Internet Entrepreneur and Founder of Wikipedia
  • Chris Young, Senior Vice President, Cisco (News - Alert) Security and Government Group, Cisco

"As cyber attacks continue to grow in strength and numbers, information security has continued to rise to the top of IT agendas around the world," said Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conference. "It's now crucial for businesses, vendors and government agencies to band together and confront today's vulnerabilities. RSA Conference has become the number one place for industry luminaries and emerging and established companies to collaborate and drive innovation within information security. Together, we can arm ourselves with the best resources and strategies to combat threats."

Some of the highlights at RSA Conference 2013 include:

  • Innovation Sandbox - Taking place on Mnday, February 25, this half-day interactive program features demonstrations from 10 finalists comprised of today's rising information security stars; interactive whiteboard sessions facilitated by industry experts; and the opportunity to speak with industry-leading experts to learn what may lay ahead for the information security industry. The program will culminate with one finalist being named "RSA Conference 2013's Most Innovative Company".
  • Special Government Sessions - Throughout the week, RSA Conference will be hosting featured government sessions and panels. On Tuesday, February 26, Jim Lewis, CSIS, will moderate a government forum on developments in U.S. cybersecurity policy featuring former Department of Homeland Security (DHS) Secretary Michael Chertoff; White House Cybersecurity Coordinator Michael Daniel; and Deputy Assistant Secretary of Defense Eric Rosenbach. On Thursday, February 28, Michael Daniel will delve more into the Administration's cybersecurity agenda and the application of national power with respect to cyber incidents, followed by FBI Director Robert S. Mueller, III, who will discuss how the FBI is dealing with cyber threats to national security. The day will also include a Town Hall with the DHS and National Mission to Secure Cyberspace tenth anniversary forum, where former Secretary Tom Ridge and former cybersecurity czar Howard Schmidt will look at the growing sophistication of cyber attacks over the last decade.
  • Privacy Panel: A Conversation with Facebook (News - Alert), Google, Microsoft & Mozilla - On Wednesday, February 27, Trevor Hughes, President & CEO of the International Association of Privacy Professionals, will lead a panel that will address the explosion of privacy issues in the marketplace, including Do Not Track, third-party applications, mobile privacy and social media. This panel will feature leaders from Facebook, Google, Microsoft and Mozilla as they explore the state of privacy in the online and IT worlds.
  • Keynote with Jane McGonigal - Drawing on the latest findings in psychology, cognitive science and sociology, video game developer Jane McGonigal is turning gameplay to socially positive ends, developing new reality-based games that are designed to find solutions to business, health, social and environmental problems. She explores the power and future of gaming and reveals how its collaborative aspects are being used to solve some of the most difficult challenges facing humanity. During her keynote on Thursday, February 28, McGonigal will challenge attendees to consider how the security industry might solve problems through the valuable "collective intelligence" that gaming generates."


RSA Conference would like to extend its thanks its 2013 sponsors: Microsoft; RSA, The Security Division of EMC; Symantec Corporation; Akamai Technologies; Qualys, Inc.; FireEye; SafeNet; Splunk, Inc.; Cisco; HP; McAfee, Inc. an Intel Company; Trustwave; CA Technologies; nCircle; Sophos; TeleTrusT - IT Security Association Germany; Websense (News - Alert), Inc.; Blue Coat Systems; Check Point Software; Dell SecureWorks; Entrust; ESET North America; Juniper Networks; Narus, Inc; Redseal Networks; Secunia; Verizon; TITUS; Trend Micro (News - Alert); Tripwire; Venafi; and, Veracode.

A complete RSA Conference 2013 agenda can be found at: https://ae.rsaconference.com/US13/connect/agenda.ww

RSA CONFERENCE ONLINE

About RSA Conference

RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security's most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at www.rsaconference.com.

RSA and the RSA Conference logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.


[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.