Skip to content ↓ | Skip to navigation ↓

Celebrating its 25th anniversary this year, the RSA Conference creates invaluable opportunities for attendees to connect with top security leaders, discover innovative technologies and deliberate the industry’s most pressing issues.

With over 30,000 attendees, this annual event continues to help drive the information security agenda worldwide, and plays an integral role in educating – and inspiring – infosec professionals.

With the 2016 conference just a week away, here’s a look at what Tripwire has in store for you.

edr-for-dummies-book-coverVisit Us At Booth #3301

Join us at the expo floor and learn how Tripwire solutions can help you combat today’s ever-changing threat landscape. Watch our live demos for a chance to win awesome prizes, and don’t forget to pick up your free copy of our new ebook, Endpoint Detection and Response for Dummies.

Check out our in-booth speaking schedule below, including customer success stories and a look at our technology integrations with Blue Coat, Palo Alto Networks, Mandiant and more.

Monday, February 29

Time
Company/Speaker
Title
5:30 PM
Belden – Mandy Huth
It’s Your Move: Creating a Grand Master’s Security Strategy
6:00 PM
Tripwire – Travis Smith
Knowing the Unknown – Monitor Your Endpoints for Enemies

 

Tuesday, March 1

Time
Company/Speaker
Title
11:00 AM
Splunk – Ken Westin
Do You Have Visibility of Your Vulnerabilities? Your Adversaries Do.
11:45 AM
Skillsoft – Lou Saviano
Customer Success Story
12:30 PM
BlueCoat – Joel Ebrahimi
Complete Defense – Ground Troops with Air Support
1:15 PM
Walgreens-Boots – Ed Yousfi
How to Realign Your Defenses and Protect On All Fronts
2:00 PM
Lastline – Dan Mathews
Integrating Breach Detection and Endpoint Detection to Win the Cyberwar
2:45 PM
Chi-X – Mike Aikins
Tripwire and Chi-X: A Cyberwar Strategic Partnership
3:30 PM
Microsoft – Greg Winston
Helping to Protect Your Data in a Highly Elastic Environment
4:15 PM
Tripwire – Craig Young
Browser Extensions: Friend or Foe?

 

Wednesday, March 2

Time
Company/Speaker
Title
11:00 AM
Belden – Dave Meltzer
The Belden 1-2-3 Approach to Industrial Cybersecurity
11:45 AM
Skillsoft – Lou Saviano
Customer Success Story
1:15 PM
Walgreens-Boots – Ed Yousfi
How to Realign Your Defenses to Protect On All Fronts
2:00 PM
ServiceNow – Alex Cox
Cutting Edge Sec-Ops: Techniques for Modernizing Incident & Vulnerability Response
2:45 PM
Chi-X – Mike Aikins
Tripwire and Chi-X: A Cyberwar Strategic Partnership
3:30 PM
Microsoft – Greg Winston
Helping to Protect Your Data in a Highly Elastic Environment
4:15 PM
Tripwire – Craig Young
Browser Extensions: Friend or Foe?
5:00 PM
Palo Alto Networks – Ariel Cohen
Partner Spotlight

 

Thursday, March 3

Time
Company/Speaker
Title
11:00 AM
Mandiant – Dan Scali & Tripwire – Dave Meltzer
Protecting Your Critical Infrastructure
11:45 AM
Tripwire – Travis Smith
Knowing the Unknowing – Monitoring Your Endpoints for Enemies
12:30 AM
Belden – Mandy Huth
It’s Your Move: Creating a Grand Master’s Security Strategy
1:15 PM
Tripwire – Véronique Anxolabéhère
Under Siege? Forget the Silver Bullet — You Need a Well-Integrated Arsenal

Tripwire RSA® Conference 2016 Sessions

oTxxsEVBRHDf2nvj5CR56dgqbJ7SXMTitle: Converging IT and OT for Secure, Reliable, Resilient Industrial Networks

Speakers: David Meltzer, Chief Research Officer, Tripwire and Chief Architect – Cyber Security, Belden, Jeff Caldwell

Date/Time: Tuesday, March 1 at 3:30 PM

Location: Room 131 – Moscone North

Abstract:

Responding to targeted attacks against critical infrastructure demands improved communications between IT and OT teams, but this convergence can be difficult to achieve. This session will discuss IT and OT myths and misconceptions and how to address cultural differences in each group with the goal of improving security and reliability in industrial control system environments.

 

travis-smithTitle: Dreaming of IoCs: Adding Time Context to Threat Intelligence

Speaker: Travis Smith, Senior Security Research Engineer

Date/Time: Wednesday, March 2 at 10:20 AM

Location: Room 2006 – Moscone West

Abstract:

Using commercial and open-source threat intelligence tools, this talk will demonstrate how to get additional intelligence from your current security infrastructure in order to detect historic and real-time indicators of compromise. Adding valuable time context to threat intelligence allows you to pinpoint when a breach occurred as well as gain critical forensic analysis information.