• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Cyber Security Market

Cyber Security Technologies & Markets

  • Cyber Security Events 2022-2023
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

RSA Conference 2020 APJ Virtual Learning Event, July 15 – 17, 2020

July 8, 2020 By CybersecurityMarket.com

RSA Conference, the world’s leading information security conferences and expositions, today provided a deep dive on the key session tracks for this year’s virtual learning event, which will run from July 15 to 17, 2020 during Singapore business hours (GMT+8).

Participants can expect a comprehensive agenda, featuring leading information security professionals from across the globe who will address today’s most pressing matters across the cybersecurity landscape. The agenda includes track sessions, Ask the Experts roundtables, Capture the Flag programs and networking time, all delivered as a global virtual learning experience.

“Our programs and sessions seek to offer the most relevant and thought-provoking content participants need to be prepared for the changes in the cybersecurity landscape ahead,” explains Britta Glade, Director of Content & Curation, RSA Conference. “We want to ensure we are communicating with our community year-round and have made our session recordings available one hour after the live sessions take place, so participants won’t miss any information that’s important to them.”

Ten core program tracks at RSAC 2020 APJ

“In our current global climate, we’re seeing businesses and individuals adapting to the new normal. Recovery from a cybersecurity attack can be a long process, and we want to help organizations prevent these attacks and reduce any chances of being economically and digitally vulnerable as a result.”

“We’re committed to being a one-stop platform for cybersecurity professionals to discuss and exchange ideas on the latest issues. During our virtual learning event, we aim to address crucial topics and facilitate discussions on how organizations can stay resilient and cybersafe,” said Linda Gray Martin, Senior Director and General Manager, RSA Conference.

The 10 session tracks are:

Analytics, Intelligence & Response
Back by popular demand from last year’s conference, participants will get to uncover the application of investigative and analytic techniques that help organizations anticipate, identify, contain, investigate, and resolve incidents in the enterprise.
Cloud, Mobile & IoT Security
Find out how the industry is using and leveraging cloud services, hybrid architectures and more, with expert speakers who will share how security can be improved in the cloud, and practical ways to protect and manage user data in a mobile workplace.
DevOps Connect: DevSecOps
Hear from practitioners within the security software development space, who will expound on navigating real-world problems in building a development pipeline, and their plans moving forward.
eFraud & Threats
Explore the threat landscape, understand emerging crime threats, and learn the latest techniques to address eFraud and the growing underground economy.
Global Insights
Leading security professionals will address the most pressing matters across the cybersecurity spectrum and on an international level.
Identity & Privacy
Understand the processes, technologies, and policies for managing and controlling digital identities in this program track. Participants will also explore the privacy issues related to Big Data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise.
Risk Management & Governance
Find out how risk management frameworks are created and implemented, through compliance-related sessions on standards, and instituting governance across the extended enterprise. Security metrics and measurements will also be covered in this track.
Software & Product Security
Discover the development, delivery, support, and processes needed to deliver secure products through topics on secure application design, regulatory compliance considerations for products, secure diagnostics and more.
Strategy, Architecture & Operational Security
Participants will be taken through policy, planning and evolving areas of enterprise security architecture. Specifically, the most challenging elements of current and emerging security infrastructure and focus on the structures and tools needed to build a security program that will enable cyber-resilience.
The Human Element

Explore the role of people in making trust choices, building successful culture, and developing innovative ways to safeguard others. Topics and sessions will range from social engineering to insider threats, information operations and user behavior analytics.

About RSA Conference:
RSA Conference is the premier series of global events and on-demand programs where the world talks security and leadership gathers, advances and emerges. Whether attending in the US, the EMEA region, the Asia-Pacific region or online, RSA Conference events are where the security industry converges to discuss current and future concerns and get access to the people, content and ideas that help enable individuals and companies to win, grow and do their best. It is about bringing all people in the cybersecurity industry together and empowering the collective “we” of the cybersecurity industry to stand against cyberthreats around the world. RSA Conference is the ultimate marketplace for the latest technologies and hands-on educational opportunities that help industry professionals discover how to make their companies more secure while showcasing the most enterprising, influential, and thought-provoking thinkers and leaders in security today. For information on events, online programming and the most up-to-date news pertaining to the cybersecurity industry visit www.rsaconference.com.

Cybersecurity Market Research:

  • Military Applications of Extended Reality
  • Quantum Computing Market Forecast
  • CybersecurityMarket.com (Cybersecurity Market): Advanced hackers succeeded in breaking in to Apple’s most guarded fortress
  • ESG Complied: ESG complied.com, domain name for sale
  • InfographicArt.com (Infographic Art): Cybersecurity Strengthens U.S. Manufacturers
  • Saudi Arabia Mass Surveillance Market Forecast
  • Modernization of U.S. Federal Government IT, Market Scenario
  • U.S. Federal Cybersecurity Market Forecast
  • U.S. Federal Government Wireless Mobility Market Forecast
  • U.S. Government: National and Defense Intelligence Market Analysis & Forecast
  • Cyber Security Press Room
  • Deep Packet Inspection (DPI), U.S. Government Market Forecast
  • U.S. Federal IT Business Continuity and Disaster Recovery Market Forecast
  • Israeli Quantum Computing Market to Reach $1 Billion by 2024
  • U.S. Federal IT Market Forecast
  • U.S. Federal Artificial Intelligence (AI) Market to Grow Dramatically
  • Adoption of Blockchain Technology By U.S. Government, Market Forecast
  • Impact of Israeli Cybersecurity Technology on Selected Markets
  • MultimodalSurveillance.com (Multimodal Surveillance): AI Facial Recognition Solutions at CES 2022
  • Autonomous Vehicle Technologies, Market Analysis
  • Context Brokering Market Forecast
  • DecoyNetworks.com (Decoy Networks): Deception Cybersecurity Market Forecast
  • IoT Blockchaining: IoTblockchaining.com, domain name for sale
  • HR Software Market for New Collar Jobs, Market Analysis
  • Cyber Security Market Dashboard
  • Hadoop Market Analysis, The End of Big Data Bluff but the Market is Still There
  • AgileSoftDev.com (Agile Soft Dev): Apache Spark Market Forecast
  • Browser as a Service Market Forecast
  • U.S. IT Business Continuity and Disaster Recovery Market Forecast
  • High-Assurance Cyber Military Systems (HACMS) Market Forecast
  • Government Compliance Spending, Datasets

Related

Filed Under: Cybersecurity Market Tagged With: event

Primary Sidebar

Market Analysis

The future belongs to Ethereum app store
Top predictions for what comes next in 2022
The global semiconductor industry is poised to become a trillion-dollar industry by 2030
Europe’s Electricity Mix
Market Impact of Trade War on Chinese High Tech Industries

Tech Events

FPGA-Conference Europe, September 29-30, 2020
IEEE International Conference on Quantum Computing and Engineering, 18-23 September 2022, Broomfield, Colorado
DVCon U.S. 2023 will be held February 27-March 2, 2023, at the Doubletree Hotel in San Jose, California
Bloomberg Technology Summit, June 8, 2022 San Francisco, CA & Virtual
KubeCon+CloudNativeCon, October 11-15, 2021, in person in Los Angeles or virtually

Market Research

ResilientSupplies.com: Resilient Supplies, the Name of the Game for the Global Supply Chain
GenZnomads.com: Gen Z Nomads Prefer Europe
Alternative Data Storage Technologies
Gaming-Disorder.com: Gaming disorder is now recognised by the World Health Organisation
Worldwide Public Cloud Services Revenues Grew 29.0% to $408.6 Billion in 2021, According to IDC

Secondary Sidebar

Technologies

A flurry of new product announcements from Apple and Canon
Ginkgo Bioworks has built the world’s largest DNA factory in a bid to alter the code behind life
Technology sector jumped to a market value of over $13 trillion during the pandemic
EU moves to wean itself off Russian fossil fuels
10 Technology Trends with Momentum
IDC FutureScape: Top 10 Predictions for the Future of Intelligence
Looming obsolescence of the internal combustion engine
A New Hydrogen-Powered Behemoth
Apple Unveils M2, Taking the Breakthrough Performance and Capabilities of M1 Even Further
Introducing IonQ Forte, Improving Quantum Performance with a Software-Configurable Dynamic Laser System

Footer

Recent Posts

  • CyberArk Announces Impact 2022: The Identity Security Event, July 12-14 2022, Boston
  • The first hybrid Security Congress will take place at Caesars Palace in Las Vegas and online from October 10-12, 2022
  • FIC 2022, Forum International de la Cybersécurité, June 7-9 2022, Lille Grand Palais, Lille, France
  • Behavioral cybersecurity platform CybSafe raises $28M
  • Forum Internacional de la Cybersécurité – FIC 2022, 7 to 9 June 2022, Lille Grand Palais, Lille, France
  • IBM Tackles Growing Attack Surface Risks with Plans to Acquire Randori
  • Talon Cyber Security Announces Integration with CrowdStrike to Extend Endpoint Protection to Unmanaged Devices
  • Secure Cloud Architecture with Policy as Code
  • Cybersecurity talent gap
  • JFrog Ushers in New Era of Open-Source Software Security, Launching Project Pyrsia to Help Prevent Software Supply Chain Attacks

Media Partners

  • Opinion
  • Press Media Release
  • Briefly
  • OPINT
  • VPNW
  • S3H
  • Domain Aftermarkets
  • App Coding
  • API Coding
  • Blockchaining

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • OSINT
  • Event Calendar
  • Calendarial
  • Domain Market Research

Copyright © 2015 CyberSecurityMarket.com

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT