Visit Deloitte Advisory at RSA® 2017
Experience the world's largest cybersecurity conference with us
The RSA Conference is where the world talks security. Throughout the conference, Deloitte Advisory will offer activities and experiences to help our clients make the most of the event, learn about new approaches to address cyber threats, and explore opportunities offered by cyber innovation and new technologies.
- What is the RSA Conference?
- Why is Deloitte Advisory there?
- How can I connect?
- Attend our sessions
- Related topics
What is the RSA Conference?
The annual RSA Conference, one of the world’s largest cybersecurity forums, is where practitioners, researchers, and technology innovators go to gain fresh perspectives on how to combat the latest cyber threat trends and challenges. Offering renowned keynote speakers and thousands of educational sessions over five days, the 2017 event takes place February 13-17 in San Francisco, CA, and will draw tens of thousands of participants and thousands of exhibitors.
Date and time
Monday, February 13 through Thursday, February 16, 2017
South Expo Hall, Booth 427
Why is Deloitte Advisory there?
Deloitte Advisory brings a distinct voice to the cybersecurity dialog by helping organizations take a risk-focused approach that ties directly to their top business initiatives and priorities. This year, Deloitte will be showing how Secure.Vigilant.Resilient.TM programs can help organizations get ahead of cyber risks associated with an extended supply chain, defend the business against intellectual property theft, address the growing risk of critical infrastructure disruption, and build cyber strength despite the significant gap in cyber talent. We are also a premier sponsor of the RSA Conference Security Scholar Program, reflecting our commitment to cultivating the next generation of cyber leadership.
How can I connect with Deloitte at the RSA Conference?
Visit our booth: South Expo Hall, Booth 427
Monday, February 13 through Thursday, February 16
Join our cyber leaders in the exhibit hall and explore interactive materials that show how Secure.Vigilant.Resilient.TM programs can be architected to help address examples of some of today’s most pressing business challenges:
- Managing cyber risks in the extended supply chain
- Managing cyber threats to critical infrastructure
- Protecting the business against intellectual property theft
- Overcoming the cyber talent gap
Attend our sessions
Monday, February 13, 2017
11:00 am–5:00 pm
Marriott Marquis San Francisco
Confusion and deception: New tools for data protection
Craig Astrich, managing director, Deloitte Advisory
Dan Frank, principal, Deloitte Advisory
Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecosystem, old data protection methods leave many gaps. By looking through the adversary’s eyes, you can create subterfuges, extend the attack horizon, or reduce the value of any data ultimately accessed–and shift the risk equation.
Tuesday, February 14
Moscone West 3014
Deep impact: Explore the wide-reaching impact of a
Daniel Soo, Mary Galligan, Lawrence
The impacts of a
Thursday, February 16
10:30 a.m.–12:30 p.m.
Moscone West 2024
Market-driven cybersecurity: Cyber innovation as competitive advantage
Moderator: Emily Mossburg, principal, Deloitte Advisory
Steven Witt, operating partner, DataTribe
David Hannigan, managing vice president–Information Security and Risk Management, Capital One Financial Corporation
Brent Conran, chief information security officer, Intel Corporation
As consumers and citizens grow more aware of cyber safety and privacy, cyber risk is an inherent factor in business growth and innovation. Hear leading executives talk about how top companies forge paths that abandon the IT silo to embed cyber into every function–from product development to operations. It’s no tweak-and-tune, it’s total transformation to harness cyber risk for market advantage.
Thursday, February 16
Marriott Marquis–Yerba Buena 9
The quest to measure strength of function for authenticators: SOFA, so good
Dr. Elaine Newton, Deputy Standard Liaison, National Institute of Standards and Technology Information Technology Lab
Dr. Colin Soutar, senior manager, Deloitte Advisory
As more online services are transitioning to mobile applications, the task of authenticating users is increasingly accomplished by biometric mechanisms built into mobile phones and devices. But, how secure are these systems? Join NIST’s Dr. Elaine Newton and Deloitte’s Dr. Colin Soutar as they seek to address this question through NIST’s Strength of Function for Authenticators (SOFA) Framework.
Friday, February 17
Moscone West 2014