June 6 – 9, 2022

RSA Conference

RSA Conference 2022

This event has already occurred.
Moscone Center & Digital

RSA Conference is the world’s leading cybersecurity event, offering a multitude of opportunities to gain valuable insights, network with peers, and get hands-on with cutting-edge demos. If you’re already registered, log in now to view or create your schedule. If you’re not registered, now’s the time to save your spot for an experience like no other.

And be sure to join Venable's team for informative deep-dive discussions within the sessions at the following dates and times.

The Missing Supply Chain Link: A Safe Harbor for Sharing Risk Information

Tuesday, June 7 | 2:25 – 3:15 pm PT | Moscone West 3006

Venable Speaker:Ari Schwartz 

Seasoned public-private sector co-speakers will discuss the missing link in supply chain risk and a path forward to sharing relevant, impactful, and robust information. Learn how to join the effort and reap the benefit of more actionable information to mitigate supply chain risk and security threats before they affect your organization.

The Steps to Successfully Baking Privacy into an IAM Implementation

Tuesday, June 7 | 2:25 – 3:15 pm PT | Moscone West 2006

Venable Speaker:Jamie Danker

With ever-increasing international laws and regulations relating to privacy, it is imperative for organizations to bake privacy into their IAM implementations. This session will work through the steps of a successful, privacy-preserving IAM and Zero Trust implementation.

Can You Hear Me Now? Security Implications of Voice as the New Keyboard

Thursday, June 9 | 10:50 – 11:40 am PT | Moscone West 2001

Venable Speaker:Jeremy Grant

Use of voice as a biometric identifier or as a virtual keyboard is growing. While AI/ML have vastly improved capabilities, there are challenges to relying on voice. Get it right and remove user friction and accelerate input. Get it wrong and introduce new vulnerabilities. As uses for vocal and silent speech recognition emerge and expand, security teams need to consider the potential security risks.

For more informationclick here.