Celebrating its 25th anniversary this year, the RSA Conference creates invaluable opportunities for attendees to connect with top security leaders, discover innovative technologies and deliberate the industry’s most pressing issues.With over 30,000 attendees, this annual event continues to help drive the information security agenda worldwide, and plays an integral role in educating – and inspiring – infosec professionals.With the 2016 conference just a week away, here’s a look at what Tripwire has in store for you.
Visit Us At Booth #3301Join us at the expo floor and learn how Tripwire solutions can help you combat today’s ever-changing threat landscape. Watch our live demos for a chance to win awesome prizes, and don’t forget to pick up your free copy of our new ebook, Endpoint Detection and Response for Dummies.Check out our in-booth speaking schedule below, including customer success stories and a look at our technology integrations with Blue Coat, Palo Alto Networks, Mandiant and more.Monday, February 29 Tuesday, March 1 Wednesday, March 2 Thursday, March 3Tripwire RSA® Conference 2016 Sessions
Title: Converging IT and OT for Secure, Reliable, Resilient Industrial NetworksSpeakers: David Meltzer, Chief Research Officer, Tripwire and Chief Architect – Cyber Security, Belden, Jeff CaldwellDate/Time: Tuesday, March 1 at 3:30 PMLocation: Room 131 – Moscone NorthAbstract:Responding to targeted attacks against critical infrastructure demands improved communications between IT and OT teams, but this convergence can be difficult to achieve. This session will discuss IT and OT myths and misconceptions and how to address cultural differences in each group with the goal of improving security and reliability in industrial control system environments.
Title: Dreaming of IoCs: Adding Time Context to Threat IntelligenceSpeaker: Travis Smith, Senior Security Research EngineerDate/Time: Wednesday, March 2 at 10:20 AMLocation: Room 2006 – Moscone WestAbstract:Using commercial and open-source threat intelligence tools, this talk will demonstrate how to get additional intelligence from your current security infrastructure in order to detect historic and real-time indicators of compromise. Adding valuable time context to threat intelligence allows you to pinpoint when a breach occurred as well as gain critical forensic analysis information.