Symantec at RSA Conference 2017

Securing the Cloud Generation

Book a Meeting

Symantec Keynote: Radical Innovation: Revolutionizing the Future of Cyber Security

Hugh Thompson, Chief Technology Officer, Symantec

Cyber Security is a young discipline that has been forced to mature quickly. We must look at models from other dynamic fields and embed innovation into the very heart of the way we work. Join this unique session for an inspiring look at the evolution of other disciplines and discover what our industry can and must become to embrace the opportunities of today and get ahead of the attacks of tomorrow.

Symantec Booths #3901 & #3727

Visit our two booths in the North Expo to learn:

  • More about the industry’s first Integrated Cyber Defense Platform
  • How you can be better protected against advanced threats
  • Why the world leader in cloud security is uniquely qualified to protect your data - on premise, online and in the cloud

DATE AND LOCATION

February 13 – 17, 2017

Moscone Convention Center, San Francisco, CA

Visit Symantec:  Booths #3901 and #3727

Register for your free Expo pass at RSA website code: XS7SYMNTC

Symantec Sessions

Title: Symantec Keynote: Radical Innovation: Revolutionizing the Future of Cyber Security
Date & Time: 4:00 – 4:20pm, Wednesday February 15th
Location: Moscone West, Level 3
Speaker: Hugh Thompson, Chief Technology Officer, Symantec
Abstract: Cyber Security is a young discipline that has been forced to mature quickly. We must look at models from other dynamic fields and embed innovation into the very heart of the way we work. Join this unique session for an inspiring look at the evolution of other disciplines and discover what our industry can and must become to embrace the opportunities of today and get ahead of the attacks of tomorrow.
Title: Symantec Session Track: Corporations: The New Victims of Targeted Ransomware
Date & Time: 1:15 – 1:45pm, Monday February 13th
Location: Moscone West, Room 2024 SEM
Speaker: Candid Wueest, Threat Researcher, Symantec Security Response
Abstract: While wide-scale, indiscriminate crypto-ransomware campaigns remain the most prevalent threat, a growing number of gangs have begun to focus on targeted attacks against large organizations. Learn how the attackers plant crypto ransomware in large corporations, what methods and tactics they use (scripts, lateral movements, diversion, etc.) and how to better mitigate the threat.
Title: Symantec Session Track: Combatting Advanced Cybersecurity Threats with AI & Machine Learning
Date & Time: 3:45 – 4:30pm, Tuesday February 14th
Location: Moscone North, Room 130
Speaker: Andrew B Gardner, Senior Technical Director, Symantec
Abstract: Advanced machine learning (ML) and artificial intelligence (AI) are the future of cybersecurity. They learn complex patterns and understand subtle interactions from oceans of diverse security telemetry data. This is critical for protecting against increasingly sophisticated attacks. Learn how Symantec uses ML & AI to scale, automate, personalize and innovate our products and research.
Title: Symantec Session Track: CISO Panel on Cloud Security and Artificial Intelligence
Date & Time: 9:15 – 10:00am, Wednesday February 15th
Location: Moscone North, Room 130
Speaker: Mark Urban, Vice President, Product Strategy & Operations, Symantec
Panelist: Chris Larsen, Architect Threat Research Team Blue Coat Systems, Symantec
Abstract: We’ll explore security challenges in each of these areas, how identity ties them together, and how data science and artificial intelligence are being used across channels to close down the vulnerabilities of a fragmented security stack.
Title: One-Hit Wonders: Dealing with Millions of Anomalies
Date & Time: 8:00 - 8:45am, Thursday February 16th
Location: Marriott Marquis, Yerba Buena 8
Speaker: Chris Larsen, Architect Threat Research Team Blue Coat Systems, Symantec
Abstract: Anomaly detection is often presented as a natural application of machine learning technology. Yes, it has its uses, but it's not a magic solution. For example, we observe millions of single-request hosts in our daily traffic. (You probably have a ton, too.) By definition, each one is an anomaly. So what do you do with a million of them? Fortunately, there are some ideas that work.
Title: General Session Track: Securing the Things with Internet: Law and Technical Issues for IoT
Date & Time: 1:30 - 2:15pm, Thursday February 16th
Location: Marriott Marquis, Yerba Buena 13
Panelist: Jeffrey Greene, Senior Director, Global Government Affairs & Policy, Symantec
Abstract: Many are talking about IoT security, but what are researchers, companies and government actually doing about it? This panel will cover both technical and policy issues related to IoT, including common vulnerabilities, recent security research, and government initiatives that could promote or harm IoT security. Speakers include an IoT security researcher, a lawyer and a government official.
Title: Modern Cyber-Defense with Automated Real-Time Response: A Standards Update
Date & Time: 9:00 - 9:45am, Friday February 17th
Location: Marriott Marquis, Yerba Buena 8
Panelist: Bret Jordan, Director of Security Architecture and Standards, Symantec
Abstract: Cyber-defense strategies are transitioning from the monolithic “complete” solutions toward systems with modular functional blocks that may be distributed. This model will facilitate sharing of cyberthreats, situational awareness and enable coordinated response to cyberattacks. This presentation will show how STIX, TAXII and OpenC2 can enable real-time cyber-defense.

Comparison Chart

Download the Chart

Resources

 

Messaging

Information Protection

Endpoint

Cyber Security Services

Website Security Services

Internet Security Threat Report 2016

Cloud

Web

ProxySG and Web Security Services

CASB