Engage virtually to learn more about Cisco Security strategy, hear the latest announcements, see new solutions in action and get answers to your questions from Cisco experts and your peers.
Join Cisco at RSA Conference 2015, April 20–24, at the Moscone Center in San Francisco where we will showcase threat-centric security solutions that are integrated, pervasive, continuous, and open.
Our security experts will be in booth N3801 showcasing advanced threat protection solutions and services that reduce complexity while offering advanced threat protection.
In addition to stopping by our booth, be sure not to miss:
Experienced Cisco security experts, engineers, and partners will be presenting during RSA Conference 2015. Sessions are listed in the following. Additionally, the Cisco security team will be presenting sessions in our booth.
Keynote (open to all pass types):
“Advanced Strategies for Defending Against a New Breed of Attacks”
Martin Roesch, Vice President and Chief Architect, Cisco Security Business Group
Thursday, April 23, 2:40 p.m., South, Room: Live at Esplanade
Business leaders are now tasked with protecting their organizations from the effects of catastrophic attacks that cause significant losses in minutes and take months to discover, contain, and remediate. Roesch will outline strategies to evolve security to include new approaches that address incidents efficiently, enable visibility, facilitate appropriate actions, and support business growth.
Martin Roesch is vice president and chief architect for Cisco Security Business Group. Roesch is responsible for shaping the technology strategy and design of the company’s security portfolio and also oversees threat research, including the Talos Security Intelligence and Research Group. He joined Cisco through the acquisition of Sourcefire, which he founded in 2001. A respected authority on intrusion prevention, and detection technology and forensics, Roesch is the author and lead developer of the Snort Intrusion Prevention and Detection System (www.snort.org) that forms the foundation for Next-Generation Intrusion Prevention Systems (NGIPS).
Roesch has received many awards for his innovation and vision. Most recently, he was selected as one of the Top 25 Disrupters of 2013 by CRN Magazine and one of eWeek's Top 100 Most Influential People in IT.
Other Speaking Sessions (RSA conference pass required)
|“Incident Response: A Test Pilot’s Perspective”||Steven Ransom-Jones, Senior Consultant for Risk and Advisory Services at Neohapsis (now part of Cisco)||Tuesday, April 21,|
1:10–2:00 p.m., North, Room: 131
|An effective incident response capability is becoming increasingly critical. High-profile breaches and increased oversight both amplify the importance of acting decisively and appropriately when an event occurs. We will review foundational elements of building a mature, adaptable incident response process, embracing complementary approaches used to manage operational risk in real-time.|
|“Cisco’s Security Dojo: Raising the Technical Security Awareness of 20,000+”||Christopher Romeo Chief Security Advocate, Cisco||Tuesday, April 21,|
2:20–3:10 p.m., West, Room: 2022
|More than 20,000 global Cisco employees and contractors improved their knowledge of product security in two years. How? Through creative and humorous technical security training delivered by experts throughout Cisco. The team captured, educated, and entertained a critical engineering audience. We share our “Top Ten Secrets of Success” with advice on how you can build this into your organization.|
|Panel: "From Nonexistent to Gartner's Number-One Security Technology in Three Years: What's a CASB?"||Moderated by Neil MacDonald, VP, Distinguished Analyst and Gartner Fellow Emeritus, Gartner||Tuesday, April 21, 2015, 3:30–4:20 p.m., West, Room: 2014||The rapid adoption of cloud services has led to a new class of security, compliance, and data governance headaches. Enter the cloud access security broker, or CASB. Learn why CASB is a critical security technology in your portfolio. World-renowned IT leaders will describe the cloud risks and opportunities that created the CASB market and will share their real-world experiences deploying a CASB. |
|Peer2Peer Session: “Effective Security Governance in Critical Infrastructure”||Jon Stanford, Principal, Cisco Security Solutions||Wednesday, April 22, 11:30 a.m.–12:20 p.m., West, Room: 3010, P2P-W04C||Today’s threats to critical infrastructure (for example, oil and gas, utilities, manufacturing, chemical) require boards and executives to extend governance into their operational technology (OT) environments. These include control systems and networks with unique requirements and challenges. This session facilitates dialog around the characteristics of effective OT security governance implementation.|
|Panel: “Deconstructing Incident Response”||Moderated by|
Bret Hartman, Vice President and Security CTO, Cisco
|Thursday, April 23, 10:20–11:10 a.m.||Highly visible security breaches have serious consequences for organizations, such as lost revenue and stolen intellectual property. The security industry is improving its effectiveness at collecting and analyzing security telemetry, resulting in better detection rates of malicious attacks. We will explore why breaches occur at an alarming rate despite this progress, and what we should do about it.|
Martin Nystrom, Cisco Managed Threat Defense
Richard George, Senior Advisor for Cyber Security, Johns Hopkins University Applied Physics Lab
Colby Clark, Director of Solutions Architecture, Advanced Cyber Threats, FishNet Security
Martin Brown, Chief Security Futures Architect, BT
|“Making Threat Intelligence Actionable: Recommending Responses with STIX”||David McGrew, Cisco Fellow, Cisco and Jyoti Verma, Technical Leader, Cisco||Thursday, April 23, 11:30 a.m.–12:20 p.m., West, Room: 2009||To accelerate the response to newly detected incidents and new types of threat indicators, we developed ways to express recommended actions in the Structured Threat Information Expression (STIX) language, which can be reviewed and selected by an operator and then executed by a threat defense system. We demonstrate how our extensions provide actionable details to go along with the threat information in STIX and point the way towards better automation.|
|“A Case Study for Building Cybersecurity Policies for Industrial Robots”||Bryce Barnes, IoT Solutions Architect, Manufacturing and Energy, Cisco and Francis Cianfrocca</>, Founder and Chief Executive Officer, Bayshore Networks||Friday, April 24,|
11:20 a.m.–12:10 p.m., West, Room: 3008
|The industrial robot is no longer an isolated system. It is part of a highly integrated and increasingly flexible model, which extends from the production line to private clouds beyond the plant. Robots not only share data, but also function with other robots and systems beyond their local reach. Presenters will look at how to design a multitiered security architecture to meet this challenge.|
An Invitation-Only After-Hours Event
Dark Arts Party hosted by Cisco
Music · Food · Drink
Date: Wednesday, April 22, 2015
Time: 8–11 p.m.
Location: The W San Francisco, 181 3rd Street, San Francisco, CA 94103
There’s no point trying to resist. Join Cisco for an RSA celebration like none other, complete with an open bar, snacks, giveaways, DJ and a graffiti wall, of course. Space is limited. Register for location and details.
Cisco booth N3801 will feature hardware viewing, a session theater, giveaways, daily raffles, and live demonstrations, including:
|Control Secure Access with Context: Cisco Identity Services Engine and Cisco ISE Ecosystem Integrations||With Cisco Identity Services Engine (ISE) 1.3, we will demonstrate simplified secure access for bring-your-own-device (BYOD) programs, including integration with Cisco Meraki Systems Manager for MDM.|
|Threat-Focused Next-Generation Firewall: Cisco ASA with FirePOWER Services||The new Cisco next-generation firewall delivers integrated threat defense across the entire attack continuum, before, during, and after an attack. It combines the proven Cisco ASA firewall with industry-leading Sourcefire threat and advanced malware protection.|
|Limit the Spread of Threats: Cisco TrustSec Segmentation||Cisco TrustSec technology allows administrators to map business assets and functions directly to contextual access policies. These security policies can be used to segment the extended network, enforce resource usage, dynamically manage and simplify security configurations, and eliminate the need for complex network changes.|
|Edge-to-Core Threat Protection: Cisco FirePOWER Next-Generation IPS||Threat protection across the entire attack continuum: integrated visibility of your network before an attack, industry-best threat protection during an attack, and scoping and remediation after an attack.|
|Protect Against Blended Attacks and Malware: Cisco Cloud Web Security, Email Security Appliance, and Web Security Appliance||Cisco security solutions for web and email combine comprehensive defense with superior deployment flexibility to address these two major attack vectors. A combination of Cisco Advanced Malware Protection and cognitive-threat analytics provides detection and threat blocking, and remediation.|
|Advanced Malware Protection: AMP For Networks and Endpoints and Cisco AMP Threat Grid||Cisco Advanced Malware Protection provides protection before, during, and after an attack. Using unified malware analysis, deep threat analytics, continuous monitoring capabilities, and retrospective security, security teams can more quickly detect, track, respond to, and remediate advanced threats in their environments.|
|Real-Time Threat Monitoring: Cisco Managed Threat Defense Service||Cisco Managed Threat Defense (MTD) is a fully outsourced, managed security service that rapidly detects and responds to known intrusions, zero-day attacks, and advanced persistent threats by using big data analytics, expert staff, and global threat intelligence 24 hours a day, 7 days a week.|
|Hosted Security as a Service: Service Provider Cloud Security Services||The Cisco Hosted Security as a Service (HSS) solution enables service providers to provide cloud-based security services, such as email security, web security, and firewall and VPN services to their customers.|
|Secure Data Center for Cisco ACI: Security and Visibility for the Virtualized Data Center||This demonstration showcases our latest Cisco Secure Data Center Solution for virtualized environments. By combining the Cisco virtualized ASA, FirePOWER NGIPS, and Identity Services Engine appliances with Cisco open APIs--including Cisco pxGrid--this solution provides new levels of visibility to next-generation virtualized data centers, including Cisco Application Centric Infrastructure.|
|Securing Next Gen Data Centers: Cisco ASA and NGIPS for Cisco ACI and Amazon AWS||Securing Cisco ACI Fabric with ASA and NGIPS Security Services: This is a demonstration of security services insertion in the ACI fabric to enable on demand application based security. This will showcase how application administration will enable security templates for the delivery of new applications in the data center and how the security policy decommissioned with application retirement.|
|Building In Trust and Security: Trustworthy Systems||Visibility into technologies, processes, and policies that make Cisco solutions more trustworthy and secure. Trustworthy Systems demos Secure Boot, Simplified Secure Transport, and Trustworthy Cloud as examples of technologies used to secure and assure Cisco products. Mandating Cisco Secure Development Lifecycle and supply chain security along with these technologies, Cisco continually builds assurance and security in all its products and solutions.|
|Advanced Protection Starts Here: Cisco Cyber Threat Defense||Cisco Cyber Threat Defense (CTD) is a Cisco Validated Design that focuses on increasing your resiliency to attack, blocking known threats, and reducing the time to discovery and containment for advanced threats that have penetrated your defenses.|
Private meetings with Cisco security executives and engineers are available. To confirm a date and time, contact your account manager.
If you require assistance, contact the Cisco Security Event Team at email@example.com.
Bayshore (speaking session only)
Bayshore and Cisco are partnering on a speaking session during RSA:
Citrix (S314 South Expo)
Lancope (N4211 North Expo)
Logryhthym (S1207 South Expo)
MobileIron (S2432 South Expo)
NetIQ (S1621 South Expo)
Ping Identity (S1833 South Expo)
Splunk (N3321 North Expo)
Tenable (N3228 North Expo)
Free RSA Explorer expo-only passes are available for Cisco customers with the registration pass code X5SCISCO. This badge includes access to keynote speeches (Wednesday through Friday), sponsor session tracks, exhibit hall (Tuesday through Thursday), briefing center, South Expo Pub Crawl, The Sandbox, and shuttle service. The deadline to redeem is Monday, April 20, 2015.
RSA Conference 2015 will be held at:
747 Howard St
San Francisco, CA 94103
For more information about the location of RSA Conference 2015, including parking, shuttles, and more, visit the RSA website: www.rsaconference.com/events/us15/hotels-venue/directions
Check out the latest on-demand webcasts and live events from Cisco Security.
|On Demand Webcasts||Upcoming Events|
Advanced Malware Protection (AMP)
Advanced Malware Protection and the Sourcefire Acquisition
Learn how to evolve your security strategy to address attacks before, during, and after they occur.
Evaluating Leading Breach Detection Systems
Join Cisco and NSS Labs to learn how breach detection systems compare and how to evaluate them based on your environment.
The Sourcefire Security Advantage
See how to fight back against even the toughest malware threats with help from the latest tools.
> View Now
Keeping Up with Secure Mobility
Learn how Cisco's 802.11ac, ISE, and Cisco TrustSec solutions join forces to simplify the high-density, secure mobility experience.
> View Now
Heartbleed: Assessing and Mitigating Your Risk
Hear from Cisco experts about how you can assess and mitigate industry risk.
> View Now
RSAC 2014: Intelligent Cybersecurity for the Real World
Learn how innovating attackers have driven defenders to challenge today's security assumptions and approach security differently.
Five Steps for Securing the Data Center
Learn best practices for integrating security into the data center environment, including a look at the new Secure Data Center Cisco Validated Design
Branch Security Made Simple
Learn how to deploy secure connectivity and comprehensive threat defense in your branches with the Cisco Integrated Services Router (ISR).
Ask Cisco: 2015 Annual Security Report
February 12, 2105 – 9am PST
In this live Q&A, ask security experts your questions about Cisco’s 2015 Annual Security Report and receive a detailed responses. If you don't have a question, sign up to hear the questions your peers are asking.
Cisco Live Australia
March 17-20, 2015
April 20-24, 2015
Interop Las Vegas
April 27-May 1, 2015
June 2-4, 2015
Cisco Live US
June 7-11, 2015
Gartner Security and Risk Management US
June 8-21, 2015
RSA Conference Asia Pacific
July 22-24, 2015
Black Hat USA
August 1-6, 2015
Perspectives from Security Leaders
"Like any high profile organization, Oak Ridge National Laboratory must be diligent about our security strategy because the sad reality is that every organization is the target of an attack as we saw firsthand in 2011." said Kevin Kerr, CISO at Oak Ridge National Laboratory. “We cannot afford another surprise malware attack to disrupt our operations, which is why we are looking at the next generation of protective tools. Cisco ASA with FirePOWER Services is among some of the tools we are considering to help us defend the Lab.” – Kevin Kerr, CISO at Oak Ridge National Laboratory
Read blogs from Cisco Security leaders and share your thoughts.
Ask Cisco Experts
Meet Dave and Sam – just some of the Cisco experts who are available in the community forums to respond to your posts.
Check out the archives from previous announcements and launches. Watch and engage with us!
Learn about the May 2014 Security announcements. View the replay and engage with Cisco experts and your peers.