This page contains a Flash digital edition of a book.
KEyNOTE SpEAKERS SpECIAL EvENING
Day: Monday 27th October Day: Wednesday 29th October
SESSIONS EvENTS
Start: 10.00 End: 10.40 ID: KEY-101 Start: 14.00 End: 14.45 ID: KEY-304
Art W. Coviello Jr Richard Thomas
TRUSTED CoMPUTInG GRoUP SEMInAR WELCoME RECEPTIon
Executive Vice President, EMC Corporation and Information Commissioner,
President, RSA
®
, The Security Division of EMC Information Commissioners Offi ce, U.K
Trusted Computing in Action:
Day: Monday 27th October
Day: Monday 27th October
Art Coviello is responsible for RSA’s strategy and Richard Thomas has a range of A Hands-On Day to Secure Data
Start: 11.30 End: 17.00 ID: SEM-100
Start: 17.15 End: 19.30
day-to-day operations as it delivers EMC’s global responsibilities under the Freedom of
and Systems
vision of information-centric security. To read Art’s Information Act 2000, the Data Protection
Meet and mingle with your fellow
Heard about the Trusted Platform Steve Hanna,
full biography click here Act 1998 and related laws. To read Richard’s information security professionals over
full biography click here
Module (TPM) but wondering what Juniper Networks and Co-Chair,
Information Security: From Ineffective to Innovative
drinks and hors d’oeuvres at the Welcome
to do with it? What about network Trusted Computing Group, Trusted
Security spending continues to rise, but few organisations feel safer
ICO – Higher profi le? Stronger powers?
Reception in the Exhibition Hall.
access control and trusted storage? Network Connect Work Group
today than they did fi ve years ago. In fact, conventional wisdom
More effective?
Join experts from the Trusted
tells us that the approach most organisations take in developing an
The impact of several recent data losses across the public
Brian Berger,
Computing Group at
information security strategy is largely ineffective.
and private sectors mean that the profi le of information
Executive Vice President Sales
EXHIBITIon HAPPY HoUR
RSA Conference Europe to
Art Coviello explores this paradox and discusses how focusing on the
security is at an all-time high. The media is fi lled with stories and Marketing, Wave Systems and
learn how to put these security
key variables of vulnerability, probability and materiality can enable
calling into question the competence of organisations TCG Board of Directors and Chair,
Day: Tuesday 28th October
organisations to successfully balance the risk-reward equation.
and government collecting and sharing people’s personal
technologies into practice.
Marketing Work Group
Start: 18.15 End: 19.45
information. The offi cial investigations and reports that have
This session starts with brief Gary Moorhead,
followed highlight mistakes, procedural shortcomings and the
Day: Tuesday, 28th October
need for civil penalties, but they also place great emphasis
overviews of TPMs, Trusted Advanced Technology Development
Relax after a busy day at the Conference.
Start: 14.30 End: 15.05 ID: KEY-205 on the need for change in organisational culture relating to
Network Connect network security Staff, Seagate Technology
Come and enjoy cocktails and canapés
leadership, governance and accountability.
and trusted storage and then
with your colleagues at the Exhibition
Dave Anderson,
Ken Silva
The landscape of information security is ever-evolving.
moves on to live, multivendor
Happy Hour in the Exhibition Hall.
Director of Strategic Planning,
CTO, Verisign
How can organisations learn from the mistakes of the past?
demos. You will learn how to use
Seagate Technology Sample great cocktails from around the
As Chief Technology Offi cer, Ken Silva oversees
How do we manage the risks? What does the future hold? the TPM, set up network security
world and celebrate the different locations
VeriSign’s mission critical Internet infrastructure
How is the role of the Information Commissioner’s Offi ce and use trusted storage.
that enables and protects billions of interactions
that RSA Conference Europe attendees
(ICO) being strengthened? What will be ICO’s approach?
every day across the world’s voice and data
come from. And that could be just the start
Richard Thomas will be discussing the latest developments
networks. To read Ken’s full biography click here of a great evening...
and topical issues to answer these questions and more.
Security in the Era of Identity 2.0
Today, there are many emerging approaches to realizing the
DINNER & DISCuSSION
potential of Identity 2.0, and various inevitable debates over how the
Day: Wednesday 29th October
concept of digital identity should evolve and how large enterprise
Start: 14.45 End: 15.30 ID: KEY-305
Day: Tuesday 28th October
security systems should be managed. A growing number of
vendor-driven and “open” community initiatives are being adopted
The Baroness Pauline
Start: 19.45 onwards
by enterprises, however the variety of protocols, standards and
Neville-Jones
Shadow Minister for Security, former
turn-key solutions have led to more concerns than answers.
After the Exhibition Happy Hour, make it
Chairman, Joint Intelligence Committee
They present interoperability challenges, tend to lack a unifying
a night to remember and mix business
Through her current role as Shadow Minister
framework and, by doing so, threaten the promise of Identity 2.0. A DIALOGuE WITH ENISA
with pleasure.
for Security and her life-long involvement
Drawing upon his experience managing large enterprise security
in diplomacy and intelligence, Pauline
Why not arrange a dinner with fellow
systems, with responsibility for the security of a key DNS top-
Neville-Jones brings a unique global perspective to RSA
®

Attend this roundtable discussion
Day: Monday 27th October
professionals who want to discuss the same
level-domain databases, Ken will provide insight on the efforts
Conference Europe. To read Pauline’s full biography click here and learn about ENISA’s ongoing
Start: 12.30 End: 13.15 ID: SPEC-300
currently being made to scale Internet-wide identity systems.
topics as you? “Dinner & Discussion” is a
activities. You’ll hear about ENISA’s
new programme at RSA Conference Europe
recent papers: Security and Privacy Mathea Fammels,
designed for small discussion groups of
KEyNOTE pANEL Day: Monday 27th October
in Virtual Worlds and Massively
Expert in Relations with Industry and
2-10 people. Just sign up at a special area
Multiplayer Online Role-Playing
International Institutions, ENISA
Online Privacy and the World of Behavioral Targeting: Challenges and Options
Start: 10.40 End: 11.30 ID: KEY-102 in the Exhibition Hall where you’ll fi nd a list
Games (MMORPGS) and Web 2.0 Giles Hogben,
Moderator: of nominated subjects or you can nominate
In this moderated panel, representatives from industry and government will discuss
Christopher Kuner
Security and Privacy. Plus you will Expert in Network and Information
your own topics! The RSA Conference
online privacy with regard to ‘traditional’ online advertising (e.g., through use of tools
Partner and Head,
also have a chance to ask the Security Policies, ENISA
such as Google’s AdWords and AdSense), and how a newer move to behavioral
Europe and ExCeL guest services teams will
Hunton & Williams team questions.
Dr. Panagiotis Trimintzios,
targeting may impact online privacy and security. - Brussels Centre
work with you to make reservations at local
Expert in Relations with Industry and
for International
restaurants. Please note, this programme is
While online advertising is striving to become more focused, and increase revenues,
Policy Leadership
International Institutions, ENISA
not paid for by RSA Conference Europe.
is that increased focus decreasing the privacy of online surfers? Is this a privacy
Panelist:
Adam Martin,
policy dispute only, or are there technical solutions available that can simultaneously
All dining expenses will be the responsibility
Paul Goad, Managing Director, Freelance MMO Consultant, NCSoft
preserve anonymity?
of each participant.
UK, NebuAd Ltd
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18
Produced with Yudu - www.yudu.com. Publish online for free with YUDU Freedom - www.yudufreedom.com.