Security Research
Showing results for 
Search instead for 
Do you mean 

HP Enterprise Security Products at RSA 2013

abekang ‎02-22-2013 06:31 PM - edited ‎02-23-2013 02:54 PM

RSA Conference 2013 begins in San Francisco next week with another round of engaging keynotes and informative sessions. HP Enterprise Security Products is delighted to bring to you a number of sessions that you wouldn’t want to miss:

 

-        If you rely on standards like ISO and PCI to measure the security risk to your enterprise, then you must attend the Thursday keynote by Art Gilliland, SVP and GM of HP Enterprise Security Products (HP ESP). He will explain how an overreliance on security frameworks and standards has often left organizations on the losing end of the battle against attackers. In his keynote, Art will discuss various enhancements that will help make these same standards a truly valuable weapon against cyber criminals.

-        Do you own a smartphone? Do you use or develop mobile applications? Do your employees like to use their mobile devices to access corporate email? If yes, then we are sure that mobile security is on your mind. Jacob West, CTO of HP ESP, will force you to think and rethink the implications of your mobile strategy in five big mobile security questions in Who, What, Where and How: Five Big Questions in Mobile Security.

-        John Pirc, Director in HP ESP and the author of Blackhatonomics, will take a deep dive into the world of cybercrime to shed light on the primary economic motivations that drive malware authors and distributors, as well as identity thieves generally.

-        Ryan English, Director of Fortify on Demand and Mobile Application Security at HP ESP will review the major application security threats and lay down the measures that enterprises can implement to protect their mobile, cloud and traditional applications against these threats.

-        Abraham Kang, Principal Researcher on the Fortify Software Security Research team within HP Security Research, focuses on evaluating programming language APIs and web frameworks for security weaknesses. In his free time, Abraham loves studying ways to augment technological safeguards for security and privacy with legal and constitutional protections. In his session, Abraham will review past cases and educate the audience on How the Constitution Protects your Cell Phone and Laptop Encryption Key.

 

Session Details:

Art Gilliland [Keynote], KEY-R37: Criminal Education: Lessons from the Criminals and their Methods – Thursday, February 28, 3:00 PM – 3:30 PM – Hall D

 

Jacob West [Track Session], ASEC-R31: Who, What, Where and How: Five Big Questions in Mobile Security – Thursday, February 28, 8:00 AM – 9:00 AM – Room 132

 

Jacob West [Studio Session], STU-R35A - Studio: Who, What, Where and How: Five Big Questions in Mobile Security – Thursday, February 28, 1:00 PM – 1:20 PM – Room 300

 

John Pirc, The Real Economics of Cybercrime - Wednesday, February 27, 10:40 AM – Room 123

 

Ryan English, Can You Trust Your Mobile Applications? - Wednesday, February 27, 11:20 AM – Room 123

 

Abraham Kang, LAW-F42: How the Constitution Protects your Cell Phone and Laptop Encryption Key – Friday, March 1, 10:20 AM – 11:20 AM – Room 302

 

Also don’t forget to stop by the HP booth to meet and talk security with the HP ESP team.

0 Kudos
About the Author

abekang

Labels
Events
27 Feb - 2 March 2017
Barcelona | Fira Gran Via
Mobile World Congress 2017
Hewlett Packard Enterprise at Mobile World Congress 2017, Barcelona | Fira Gran Via Location: Hall 3, Booth 3E11
Read more
Each Month in 2017
Online
Software Expert Days - 2017
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all