Blog  What to Expect at RSA Conference 2024

What to Expect at RSA Conference 2024

| News

compliance
Every year, business leaders, security professionals, and industry innovators eagerly anticipate the RSA Conference, a pivotal gathering to discuss the latest threats, solutions, and trends in cybersecurity.  

For TrustNet, staying abreast of the developments showcased at RSA is not just about maintaining relevance; it’s a strategic necessity. The insights from this conference directly inform our practices, ensuring that we offer our clients cutting-edge compliance and security solutions. 

This article is designed to give you a comprehensive preview of what to expect at RSA 2024, with a curated overview of scheduled event highlights. 

Keynote addresses:

The RSA Conference 2024 is set to feature an impressive lineup of speakers, each bringing a wealth of knowledge and experience to the forefront of cybersecurity discussions. Among the notable speakers are: 

  • Morgan Adamski, Chief of the NSA Cybersecurity Collaboration Center, DOD, whose leadership and insights into national security cyber strategies are invaluable in an era of increasing digital threats. 
  • Aleksandar Acev, Technical Advisor for the Critical Infrastructure Digitalization and Resilience (CIDR) Program at DAI, brings a unique perspective on protecting critical infrastructure in our increasingly interconnected world. 
  • Moira Bergin, Subcommittee Director of Cybersecurity and Infrastructure Protection at the House Committee on Homeland Security, offers a glimpse into cybersecurity’s legislative landscape. 
  • Rich Agostino, CISO at Target, whose experiences at the helm of cybersecurity in one of the largest retail corporations, will provide key insights into industry-specific challenges and solutions. 
  • Mohamad Ali, COO of IBM Consulting, IBM, will share cutting-edge developments and strategic consulting insights from one of the world’s leading technology firms. 
  • Sundhar Annamalai, President of AT&T Cybersecurity, offers perspectives on the role of telecommunications in cybersecurity defense strategies. 
  • And many more… 

This “meeting of the minds” facilitates unparalleled networking opportunities, fosters collaborations, and ignites innovative solutions to cybersecurity’s most pressing challenges. 

Event highlights: 

ARTIFICIAL INTELLIGENCE: THE ULTIMATE DOUBLE-EDGED SWORD 

CSA AI Summit at RSA Conference 

Stop by the CSA AI Summit at RSA Conference, scheduled for Monday, May 6, from 8 AM to 3 PM, to learn more about harnessing the power of AI and the cloud to build essential security tools and best practices for the ever-changing landscape of the most impactful technology of our time. 

— DevOps Connect: DevSecOps and Generative AI: Security in an AI Universe 

Experience a deep dive into securing AI implementations within DevSecOps on Monday, May 6, from 8 AM to 3 PM at the RSA Conference. Discover how AI transforms security in development and applications with knowledge from industry practitioners. 

— AI Governance & Risk Management: Fortifying Your Cybersecurity Strategies 

Explore AI governance and its impact on cybersecurity on Tuesday, May 7, from 1:15 to 5:15 PM. This session provides a roadmap for managing AI risks and compliance, which is pivotal for cybersecurity professionals today. 

— OWASP AI Security Summit: Safeguarding AI with OWASP’s Top 10 for LLMs & Gen AI 

Join the forefront of AI security at the OWASP AI Security Summit on Thursday, May 9, from 8:30 AM to 1:30 PM. Delve into strategies for securing LLMs and generative AI against OWASP’s top-identified vulnerabilities. 

ENSURING INTELLIGENCE, NATIONAL SECURITY IN A RAPIDLY CHANGING TECHNOLOGY WORLD 

— Cyber Defenders: Guardians of Critical Infrastructure 

Engage in a vital seminar on Tuesday, May 7, from 8:30 AM to 5:30 PM, addressing the defense of U.S. critical infrastructure against cyber threats. Gain insights from FBI briefings, mock trials, and robust cyber program development strategies. 

— SBOM: The Good, The Bad, and The Ugly 

Delve into the complexities of SBOMs on Wednesday, May 8, from 8:30 AM to 12:30 PM. Understand the benefits and challenges and how they influence vulnerability management and transparency in the tech landscape. 

— Mastering Cybersecurity Risk with FAIR: An Introduction and Case Study 

Attend the FAIR Institute’s seminar on Tuesday, May 7, from 8:30 AM to 12:30 PM to unlock the secrets of effective cyber risk management using FAIR™. Learn through an in-depth introduction and case studies to enhance your cybersecurity strategies. 

— Getting Serious Workshop: Critical Disruptions/Thinking/Responses (& Rumors of War) 

Participate in a critical workshop on Wednesday, May 8, from 1:15 to 4 PM, focusing on preparing for disruptions and hybrid warfare scenarios. Assess resilience and develop effective communication strategies for these emerging challenges. 

— The State of Authentication 2024: The Global Progress Past Passwords 

Explore the future of passwordless technology with the FIDO Alliance on Wednesday, May 8, from 1:15 to 5:15 PM. Learn about advancements in authentication, hear success stories of passwordless implementations, and gain insights into adopting these practices for enhanced security and user experience. 

Check out the programs: 

From first-time attendees to conference veterans, RSA caters to all experience levels. Explore cutting-edge innovations, earn valuable CE credits, and connect with the cybersecurity community. 

  • Innovation Sandbox: A dynamic competition where ten finalists pitch their groundbreaking cybersecurity solutions in just three minutes, seeking to impress the judges and win the spotlight. 
  • Launch Pad: An engaging platform for early-stage startups to present their ideas in a Shark Tank®-style format, gaining exposure and strategic advice from industry experts. 
  • Sandbox: The RSAC Sandbox offers an interactive environment with villages, the RSAC Cybrew Café, and research talks designed for networking and relaxation. 
  • Early-Stage Expo: This is an exhibition space showcasing fifty emerging startups in cybersecurity, providing a unique opportunity to meet the industry’s future leaders. 
  • Security Scholar: An exclusive program that introduces selected cybersecurity students to the RSAC community, fostering knowledge exchange and connections. 
  • College Day: A special day dedicated to helping students explore career paths in cybersecurity by connecting them with top companies in the industry. 

Network with top executives, industry experts, etc. 

RSAC 2024 transcends traditional informative sessions and thought-provoking keynotes—it’s an opportunity to engage with the cybersecurity community and enhance your expertise.  

Across four immersive days, you’ll interact with fellow security professionals at networking events, exchanging valuable insights and forging enduring connections. Interactive activities extend your learning beyond conventional lectures, challenging you to apply your knowledge in a dynamic setting.  

By the conclusion of RSAC, you’ll feel empowered and equipped with actionable insights from industry leaders and peers, ready to tackle the challenges ahead with newfound confidence. 

TrustNet: Pioneering Cybersecurity Excellence 

Industry events like the RSA Conference serve as a vital lifeline, connecting us to the latest trends, innovations, and discussions shaping cybersecurity. By engaging with thought leaders, innovators, and fellow professionals at prestigious gatherings like RSAC, TrustNet not only enriches its reservoir of knowledge but also ensures that our solutions and strategies are cutting-edge, robust, and comprehensive.  

Our unwavering commitment to excellence and forward-thinking leadership positions us as your trusted ally in navigating the complexities of cybersecurity and compliance today and beyond. 

To get ahead in your cybersecurity and compliance needs, schedule a chat with us today.
Building Trust and Confidence with TrustNet.
TrustNet has performed hundreds of Assessments and has tremendous experience successfully guiding businesses through the process.