Skip navigation
All Places > Products > RSA Web Threat Detection > Blog
Yael Gour

Launching RSA Ideas

Posted by Yael Gour Employee Apr 3, 2018

For years RSA has been in business of providing best-in-class security  and Anti fraud products and services to you, our customers.  I am proud to be surrounded by extremely intelligent and creative coworkers who amaze me with their knowledge, imagination, and ability to make abstract a reality on daily basis.  However, I am even more astounded by the unending well of new ideas I see coming from our customer community every time I interact with or observe an interaction between us and you.  You are the true inspiration and driving force of our innovation.  We build products that solve your problems, we offer services that help you, and everything we do - we do with you and your success in mind.

 

This is why I am happy to officially introduce you to a new way to harvest and crowdsource our collective ideas together.  This month, we have launched new idea pages on our RSA Link Community:

These destination pages are places for you to show off your creativity and need, to suggest ways that would improve our offerings to help you be more successful.  It is also the place where you can collaborate on your ideas with other like-minded individuals and vote on ideas suggested by others.

 

We have a great customer community, let’s harness its creative power to see what we can come up with together.

 

For more information, please check out the following FAQs:

With RSA Web Threat Detection v6.3, which is now generally available, we continue on our journey toward “run anywhere.” Web Threat Detection can be deployed on premises and can now be deployed on a public cloud.  So if your website is on the public cloud, this latest release offers new guidelines on how to deploy Web Threat Detection. 

 

Technical Service Providers can benefit from a granular multi-tenant deployment option that allows them to offer Web Threat Detection as a fully or partially managed service to their customers.  Web Threat Detection customers who leverage a multi-tenant deployment already will benefit from additional granularity.

 

Finally, Web Threat Detection 6.3 includes support for data streaming using Kafka messaging system to ease the data streaming process in near real time and enhance performance.

 

With each new release in the Fraud and Risk Intelligence Suite, we continue to build on the foundation of the releases that have come before. In this way we are able to continuously improve our scalability, performance and fraud detection capabilities to keep up with the ever evolving fraud landscape.

 

Download the 451 Research Pathfinder Report to learn more about the benefits of web behavior analytics for threat detection and investigation and the many unique use cases that other organizations have used Web Threat Detection to mitigate.

Stay up to date on the latest fraud news.  Follow us on Twitter @RSAFraud.

This year’s RSA Charge event is definitely one not to miss. If you have not yet registered please do so today to secure the Discount Rate of $745, saving you $200 through September 15. Registration on the RSA Charge 2017 website couldn’t be easier.

 

Still on the fence? Check out the Full Agenda with over 90 sessions, 35 hands-on labs, and 140+ thought leader industry experts you’ll agree this is the premier event on RSA Business-Driven Security™ solutions. You can also take this opportunity to build your own personal business-driven security experience for Charge.

  

Another way to save: Friends with Benefits! They say sharing is caring, so ‘already registered’ RSA Charge attendees can now share the love by forwarding this code to a peer or colleague and he/she will receive $100 off the current $745 registration fee by using this code from you: FRIENDS17. This code too expires on Sept. 15, so share the love today!

 

And, finally, in case there are still some doubters amongst you, watch these two RSA Charge videos – you’ll be convinced that RSA Charge 2017 is the place to be seen and heard, Oct. 17-19 @ Hilton Hotel Anatole, Dallas. See you soon!

                                                  

RSA President Rohit Ghai

RSA Fraud & Risk Intelligence Matthew Long

 

RSA Charge 2017, the premier event on RSA® Business-Driven Security™ solutions, unites an elite community of customers, partners and industry experts dedicated to tackling the most pressing issues across cybersecurity and business risk management. Through a powerful combination of keynote speeches, break-out sessions and hands-on demos, you’ll discover how to implement a Business-Driven Security strategy to help your organization thrive in an increasingly uncertain, high-risk world. Join us October 17 – 19 at the Hilton Anatole in Dallas, Texas.

The consumer world is at a historical inflection point in which the ways individuals are interacting and transacting is changing more than we have ever seen before. Organizations are now managing multiple digital channels and face unprecedented business and security challenges ranging from legislative pressure, competition from new entrants forcing organizations to offer consumers more convenience and flexibility and the increase in potential points of vulnerabilities in which cybercriminals can gain access. These disruptors in the consumer space are all interrelated and if not looked at that way will have grave consequences to the security of those environments. Especially, the financial services industry which is facing disruptive pressures on many fronts:

  • Customer expectations are changing – digital transactions are expected to be fast, frictionless, personalized, channel agnostic and secure.
  • FinTech innovation is leading to new competition offering digital services forcing organizations to rethink their strategy and create new partnerships powered by the API economy.
  • Sweeping global regulations are being created to drive more accountability for consumer data protection, security and privacy such as PSD2, GDPR, SEPA and FFIEC.
  • Dramatic growth in digital interactions driven by flexibility in transacting through Internet of Things (IOT), shift towards online shopping and payments innovation like 3DS 2.0. Yet, minimal growth in organizational resources to mitigate fraud and keep pace with cybercrime is forcing organizations to leverage new technologies like data analytics and automation and case management.

The Fraud and Risk Intelligence track at RSA Charge will address many of these trends and how RSA’s strategy and roadmap is helping our customers on their journey to an omni-channel fraud management strategy. The track title is aptly named “Reducing Fraud – Not Your Customers” as we recognize the challenge our customers face to reduce fraud without impacting the user experience. We will be featuring some interesting customer case studies on fraud detection and prevention in the cloud, some great discussions planned on the consumer authentication and mobile revolution, best practices for securing the open banking API economy, and how organizations can leverage machine automation to mitigate fraud more effectively.

 

Also, we will be hosting a peer birds of a feather luncheon which will include topics such as mobile fraud strategies, planning for 3D Secure 2.0 and digital payments and there will be an exclusive meetup for RSA Web Threat Detection customers to engage. We will also be providing a first look at new innovations in our lab environments and the partner Innovation Zone.

 

RSA Charge Fraud and Risk Intelligence track is designed to empower Anti-fraud leaders to be better equipped to discuss the current business impact of fraud risk and prepare for the future by enabling them to work more collaboratively with business leaders to ensure they are protecting what matters most.

 

The full schedule for this year’s event on the RSA Charge website with more than 35 hands-on labs, 90 sessions and 140 thought leaders and industry experts who are ready to share with you the key insights needed to take your security strategy to the next level. register today

 

RSA Charge 2017, the premier event on RSA® Business-Driven Security™ solutions, unites an elite community of customers, partners and industry experts dedicated to tackling the most pressing issues across cybersecurity and business risk management. Through a powerful combination of keynote speeches, break-out sessions and hands-on demos, you’ll discover how to implement a Business-Driven Security strategy to help your organization thrive in an increasingly uncertain, high-risk world. Join us October 17 – 19 at the Hilton Anatole in Dallas, Texas.

 

To learn more about this upcoming event and fraud trends, follow us on Twitter @RSAFraud

Summer is nearing an end, the kids are heading back to school, and RSA Charge 2017 is less than two months away, October 17-19.

 

We invite you to peruse the full schedule for this year’s event on the RSA Charge website with more than 35 hands-on labs, 90 sessions and 140 thought leaders and industry experts who are ready to share with you the key insights needed to take your security strategy to the next level.

 

Here are a few of the great sessions you can attend:

Rolling-out a Company Wide Risk & Control Framework Supported by RSA Archer

Third Party Governance: Perspectives from a Panel of Pros

The RSA Archer Admin Dashboard (Yes, it's really here!)

From Discovery to Remediation in 9 Days: Defend against Determined and Well-Resourced Adversaries

Maximizing Your Investment in RSA Identity Governance and Lifecycle

Deep Entity Profiling & Machine Automation – How to Use These Powerful Technologies to Mitigate Fraud While Reducing Costs and End-User Friction

 

See the full schedule here.

And, if this isn’t enough to convince you to register today for RSA Charge, over the next six weeks, every Tuesday on the RSA Link Community, you’ll also see blogs from the RSA Charge team detailing presentation highlights from each of the product tracks being offered this year at Charge, including:

Taking Command of Your Risk Management Journey

Transforming Compliance

Managing Technology Risk in Your Business

Inspiring Everyone to Own Risk

Detecting and Responding to Threats That Matter

Secrets of the SOC

Identity and Access Assurance

Reducing Fraud, While Not Reducing Customers

RSA Archer Technical

RSA Archer Technical, Advanced

 

 

This year’s RSA Charge event is definitely one not to miss. If you have not registered as yet, please do so today to secure your spot and take advantage of the Discount Rate of $745, saving $200 through Sept. 15.

Additionally, if you also register for one of the Pre-Charge training courses offered by RSA University, you can save even more – the expired Early Bird Discount Rate of $645 will be extended to you up until the official start of RSA Charge on October 17. Click here to see the full course offering and for registration details. Classes are filling up quickly so don’t delay.

RSA Charge 2017 will provide you the ultimate opportunity to network with RSA customers from across the product portfolio, partners, and industry experts while discovering how to implement a Business-Driven Security™ strategy in an increasingly uncertain, high-risk world.

See you in Dallas, October 17-19 at the Hilton Anatole Hotel for RSA Charge 2017! 

 

RSA Charge 2017, the premier event on RSA® Business-Driven Security™ solutions, unites an elite community of customers, partners and industry experts dedicated to tackling the most pressing issues across cybersecurity and business risk management. Through a powerful combination of keynote speeches, break-out sessions and hands-on demos, you’ll discover how to implement a Business-Driven Security strategy to help your organization thrive in an increasingly uncertain, high-risk world.

Credit for the notion of having “too much of a good thing” goes to William Shakespeare, who used the phrase in As You Like It, a comedy of love, politics and mistaken identity.  However, Shakespeare couldn’t anticipate the dawn of the cyber age. Although there are a number of areas in our digital lives where moderation should rule, as anyone who has been sucked into playing Candy Crush for any length of time can attest, fraud management is not among them. When it comes to fraud detection, you simply cannot have too much of a good thing!

 

This is why each new release in the RSA Fraud and Risk Intelligence Suite includes features or capabilities that enhance fraud detection. RSA Web Threat Detection v6.2 – which is now generally available – is no exception.

With Web Threat Detection v6.2, we continue on our journey toward integrating siloed capabilities and data sources to provide a holistic view of online activities and behaviors. This cross-product pollination delivers more accurate fraud detection while still providing you the ability to control the end user experience on a highly granular level.  

 

Now RSA Adaptive Authentication can leverage information captured by Web Threat Detection v6.2 to monitor any online activity or transaction. With Transaction Scoring in RSA Adaptive Authentication, Web Threat Detection generates SOAP calls to Adaptive Authentication allowing easy integration of additional event types in Adaptive Authentication without code changes to the website. This capability increases the number of event types sent for risk assessment, thus enriching the RSA Risk Engine data and ultimately helping catch more fraud. This is great news for customers who leverage both Adaptive Authentication and Web Threat Detection within their environment today.

 

Web Threat Detection v6.2 also enhances fraud detection in the mobile channel.  Through support of JSON Web Tokens (JWT, Web Threat Detection provides visibility into the details of a mobile transaction allowing you to write mobile-specific rules to identify even more fraud across channels.  

 

Finally, Web Threat Detection 6.2 includes support for AES128-GCM encryption of transaction log files. Although the RC4 cipher offers both simplicity and speed, exploitable vulnerabilities have been discovered in the cipher.  With Web Threat Detection v6.2, you can configure the application to use either AES128-GCM or RC4 encryption, providing you the ability to balance the need for speed and higher security.

 

We will be hosting a webcast for our Web Threat Detection and Adaptive Authentication customers to cover the details within this latest release and demonstrate the benefits of this latest integration. The event will take place on Tuesday, July 25 at 1:00 ET.  You can register here

For existing Adaptive Authentication customers who are looking for more information on Web Threat Detection, I would recommend downloading the Pathfinder Technology report published by 451 Research. 

We know you really want to join the more than 2,000 security, risk and compliance professionals at the premier Business-Driven Security event, RSA Charge 2017, Oct. 17-19 in Dallas. Now you have one final, limited opportunity to enjoy a $300 savings with our ‘throwback’ to the Early Bird Discount Rate of $645.

 

This is your opportunity to network with RSA customers, partners, and industry experts while discovering how to implement a Business-Driven Security  strategy in an increasingly uncertain high-risk world.

 

Use the Throwback Thursday code 87CTHRWBCKJUL and save $300 on your attendee pass.

 

Need a little more convincing, in addition to the $300 savings? Well, we have this covered too!

 

Check out our latest Keynote Lineup, including

  • Marc Goodman, Global Security Advisor, and Futurist will explain how to cultivate informed workforce to create a human firewall, in what promises to be a highly engaging and humorous keynote presentation

 

Sneak Peek at our Upcoming Agenda of robust programming you can expect at RSA Charge 2017. Tracks include:

  • Taking Command of Your Risk Management Journey
  • Transforming Compliance
  • Managing Technology Risk in Your Business
  • Inspiring Everyone to Own Risk
  • Detecting and Responding to Threats That Matter
  • Secrets of the SOC
  • Identity and Access Assurance
  • Reducing Fraud, While Not Reducing Customers
  • RSA Archer Technical
  • RSA Archer Technical, Advanced

 

Don’t miss out on your chance to attend RSA Charge 2017 with the limited ‘Throwback Thursday’ event. Use code 87CTHRWBCKJUL to register.

 

Discount code expires Thursday, July 27, 2017, at 11:59 PM PST. Offer cannot be combined with any other promotional code.

 

RSA Charge 2017’s ‘Call for Speakers’ resulted in an unprecedented number of abstract submissions across all RSA product solutions – RSA Archer Suite, RSA NetWitness Suite, RSA SecurID Suite (including RSA Identity Governance & Lifecycle), and RSA Fraud & Risk Intelligence. The submissions from RSA customers and partners included the sharing of first-hand knowledge, advice, ideas, experiences, case studies, and even war stories that submitters wanted to share with their RSA product peers at the Charge event in October.

                          

Though the RSA Charge Program Selection Committee is thrilled by the high caliber of submissions, the Committee now faces the hard task of whittling down the list of submissions to 100 across all RSA products. Though no final decisions have yet been made, the Committee noticed that there were many submissions that had similar titles and themes, so they decided to allow you the opportunity ‘voice your choice’ from a small, random subset from the abstracts received.

 

And, for the first time, with a registered RSA Link account, you can vote on Tracks across the entire RSA product portfolio. That’s right, you can vote on any of the product Tracks listed, but you can only vote once ‘per abstract.’

 

So let your voice be heard - this is your chance to 'vote your choice' and have a say in this year's RSA Charge 2017 Agenda. To vote, simply click on the Proposal Abstracts and cast your vote across all RSA Product Tracks.

 

Thank you for the amazing ‘Call for Speakers’ submissions for RSA Charge 2017 – it’s going to be an event you will not want to miss. If you haven’t registered for RSA Charge 2017, be sure to do so today!  

 

We heard you loud and clear - with the upcoming long Memorial Day weekend fast approaching, school classes ending in the Midwest for the summer, and a host of work-related commitments, you wanted more time to submit Call for Speakers (C4S) Abstracts.

 

We are pleased to tell you that the deadline for C4S submissions has been extended and is now EOD on June 9, 2017.

 

This is a hard deadline, however, and will not be extended again so we can meet all the time-sensitive event activities leading up to RSA Charge 2017.

 

All of the information to help you submit your proposal can be found on the RSA Charge 2017 microsite, including Charge registration information – though RSA Charge ‘Speakers’ receive a complimentary pass to the Charge event – another solid reason to submit!

 

First, check out the webinar replay of 'What You Should Know Before Submitting Your Proposal' and then use the Offline Submission Form (for practice) before submitting your proposal using the Online Submission Form. There are also FAQs to help you too. 

 

The Tracks for RSA Charge 2017 include:

 

(Governance, Risk & Compliance)

Inspiring Everyone to Own Risk

Managing Technology Risk in Your Business

Taking Command of Your Risk Management Journey

Transforming Compliance

RSA Archer Suite Technical

RSA Archer Suite Advanced Technical

 

(Security Operations, Identity, Anti-Fraud)

Detecting and Responding to the Threats That Matter

Identity Assurance

Reducing Fraud, while Not Reducing Customers

Secrets of the SOC

 

Complete Session details are also available.

 

With the extended deadline through June 9, we hope you will consider sharing your first-hand knowledge, advice, ideas, experiences, case studies, and war stories with your peers at Charge 2017. For the many who have already submitted proposal abstracts, ‘thank you’ and we look forward to seeing you in Dallas, Oct. 17-19.

Visibility: RSA Archer Staging

RSA CHARGE 2017: CALL FOR SPEAKERS CLOSES MAY 26

It’s down to the final weeks for Call for Speakers (C4S) proposal submissions for the RSA Charge 2017 event.

 

If you are still on the fence, time is running out but there are some helpful aids to get you started. First, check out the webinar replay of ‘What You Should Know Before Submitting Your Proposal’ and then use the Offline Submission Form (for practice) before submitting your proposal using the Online Submission Form.  There’s also FAQs to help you before submitting your proposal.

 

You may also check out the complete RSA Charge 2017 Session details.  

 

All of the information to help you submit your proposal can be found on the RSA Charge 2017 microsite, including Charge registration information – though RSA Charge ‘Speakers’ receive a complimentary pass to the Charge event – another solid reason to submit!

 

We strongly encourage you to attend the RSA Charge event, even if you are not considering a speaker’s proposal submission.

 

Meet up with your Fraud and Risk Intelligence peers at RSA Charge and learn how to defend your digital channels to reduce fraud - not your customers or revenue. There will be several engaging sessions where you will learn about: 

 

  • Creating an Omni Channel Fraud strategy with RSA Adaptive Authentication ecosystem
  • Accelerating your Digital Strtegy with Open Banking API Economy Panel
  • Fighting Fraud with Deep Entity Profiling & Machine Automation
  • And, so much more! 

See you in Dallas, Oct. 17-19 !

Overview of WannaCry/Wanna Decryptor

As you know, starting late Thursday and hitting mainstream over Mother’s Day there is a current outbreak of a ransomware threat known as “WannaCry” or “Wanna Decryptor”. Ransomware attacks like “WannaCry” are meant to be very visible in order to pressure the victim to pay the ransom. The scale of this attack, together with this specific ransomware family, is unique in that it has worm-like capabilities leveraging an exploit against vulnerable Microsoft Windows® operating systems. This exploit was recently made publicly available and appears to be associated with the “Shadowbrokers” release of nation state hacking tools. As of 5/15/2017 at 1pm ET, the associated income achieved is less than $50k the best we can estimate, less than 150 individuals or businesses impacted that were willing to pay.

 

While details are still emerging, RSA believes it follows a typical attack pattern where a malicious link is delivered through email as part of a phishing scam, whereby the malware installs itself. The malware can spread rapidly when an already infected computer is able to locate additional open and vulnerable computers with outbound internet connections. This malware can travel quickly through an internal network as a result of a core Windows networking function exploit. Microsoft issued a patch for this vulnerability under advisory (MS17-010).

 

The vulnerability exploited in this attack was made public in September, 2016. Microsoft released a patch in March, 2017. If an organization looks at their enterprise risk management with proper cyber hygiene, they may not have been vulnerable to this attack.

 

While mitigating attacks like this, which include host blocking, a robust backup strategy and comprehensive patch management, IT leaders should also be mindful that because of Microsoft’s patch support policy, any organization still running Windows XP, Windows 8 or Windows Server 2003 remain at high risk. Microsoft has issued specific guidance for this attack, which can be found here. This is not a new phenomenon and like in most major attacks, resistance is achieved with disciplined patching hygiene.

 

This latest wave of ransomware continues a trend with this popular attack method. Attackers are shifting away from stealing information for profit, rather taking advantage of the fact that data is critical to its victims for daily business operations.

 

Was RSA or Dell Technologies Impacted?

While we continue to monitor and validate, at this time there appears to be no impact to the internal networks of any of the major Dell Technologies networks.

 

Are RSA Products Impacted?

Individual alerts have been sent to clients using specific products. Because many clients leverage Microsoft OS and products as underlying components of RSA Products, there is a risk they could be impacted. That said, the actual product applications that RSA distributes are not impacted.

 

How RSA Can Help You?

You may be asking how RSA can help. First, recognize that ransomware threats, by design, are noisy and are obvious to the infected victim … this is part of the criminal’s objective and business model. RSA NetWitness® Suite is designed to help identify and provide visibility into a ransomware attack – but as part of this attack method, the victim organization’s data is being encrypted by the malware. This is the same for any advanced threat detection and response technology platform.

 

From a risk perspective, RSA Archer is designed to help automate risk management, prioritizing activities to reduce risk (i.e. Vulnerability Risk Management) to mission-critical systems, and consistently and effectively manage an actual incident.

 

From an investigation and readiness standpoint, RSA can provide strong visibility and expertise, helping users to reconstruct, analyze, and understand the attack for current and future identification of ransomware behavioral indicators and operational performance optimization. Analysts within Security Operations Centers (SOC) can see suspicious activities such as lateral movement of infected systems, and/or attempts to infect workstations and other network and critical business assets to more readily determine the overall operational, business continuity, governance, regulatory and compliance impact of the attack to their business. Lastly, RSA can help security programs and IT operational functions see the last known good state of the workstation to understand when the incident first began in order to measure “dwell time”, determine SOC visibility and detection, gaps and remediation requirements as well as the ability to restore from known good backup. This can help limit data loss and reduce the prospect of paying ransom to the attackers.

 

In a large-scale attack like this, expertise and experience in readiness, response, resilience and business risk management is imperative. RSA can help organizations in their response and readiness efforts and programs. These attacks can be contained and preemptive efforts can be taken to block similar attacks from occurring in the future, minimizing the impact and scale of ransomware campaigns.

 

For a deeper dive on using RSA Netwitness to improve you visibility and make decisive steps to reduce the impact on your environment, see WannaCry from the RSA NetWitness Suite's Perspective and Blocking WannaCry with Netwitness Endpoint.

 

Other RSA and Third Party References

Here are some additional resources if you’d like to learn more about the attack.

 

What's to Come?

New attacks are often followed by attack variants that use a similar infection vector with minor changes to bypass common defenses such as port and allowed path blocking. As such, four broad predictions:

  • Many organizations will not patch core systems, rather put in protective defensives such as AV, blocking ports and IP addresses, and other supplemental actions. Thus, future morphs of WannaCry will continue to impact customers.
  • After some minor reductions in volume of attacks we will see continued:
    • Increase in leveraging attack tool leaks to fuel new attacks. Increase in attacks that focus on incidents that demand immediate monetary payment. (i.e. DDOS, Ransomware, identity change, etc.)
    • Exploit of older vulnerabilities will continue to make headlines.
  • Industry and government regulatory bodies always respond to major cybersecurity events, thus you can assume there will be a continued tighten requirements around vulnerability management and patch hygiene.
  • Risk management will become more fundamental in the scheme of prioritizing resource allocation and spend. More alignment between business needs and underlying security activities are on the horizon … this is still a year of planning and early walks for most organizations.

 

In Summary

While newsworthy and certainly impacting organizations, the underlying issue for WannaCry is patch hygiene. Understanding the IT investments needed to be able to upgrade applications tied to OS changes (i.e. config, patches, etc.) must be a focus for organizations to better improve vulnerability to patch to deployment. Understanding major newsworthy hacking event, can reveal defensive commonalities that can have broad, risk reducing impacts to the organization short and long term.

 

These include:

  • Aligning business risk tolerance to a risk and cybersecurity plan
  • Prioritizing actions to reduce risk (less whack-a--mole)
  • Focus on the fundamentals that positively impact all threats:
    • Educating people
    • Business-driven risk reduction tied to an action-oriented plan
    • Continually test your environment for weaknesses
    • Strengthened identity and access assurance program
    • Assume all defenses will fail and that your understand of your environment isn't optimal.  Make sure you have expert visibility at the perimeter, inside the network, in the cloud and on attached mobile devices.  You must be able to monitor logs, packet traffic and what's actually happening on the endpoint. More importantly, you must have the expert capacity (people) to seek, monitor and respond to threats.
    • Automate your processes wherever possible. Very few organizations can invest at a level that provides enough people to adequately address the workload manually. The more organizations seek to enhance the efficiency and efficacy of their security teams, the greater the probability of success.

 

RSA’s Business-Driven Security solutions uniquely link business context with security incidents to help organizations manage risk and protect what matters most. The RSA Risk and Cybersecurity Practice, our expert professional services team, help organizations identify, assess, and close the gaps; and take command of their evolving security posture. Feel free to contact RSA for further detail or assistance.

 

Additional Resources

Join more than 2,000 security, risk and compliance professionals at the premier Business-Driven Security event, RSA Charge 2017. This year’s event will be held Oct. 17-19 in Dallas at the Hilton Anatole Hotel.

 

This is your opportunity to network with RSA customers, partners, and industry experts while discovering how to implement a Business-Driven Security strategy in an increasingly uncertain high-risk world.

 

To whet your appetite, check out Top 10 Reasons to Attend RSA Charge 2017 and Agenda at a Glance

 

We strongly encourage you to attend the RSA Charge event, even if you are not considering a speaker’s proposal submission.

 

Meet up with your Fraud and Risk Intelligence peers at RSA Charge and learn how to defend your digital channels to reduce fraud - not your customers or revenue. There will be several engaging sessions where you will learn about: 

 

  • Creating an Omni Channel Fraud strategy with RSA Adaptive Authentication ecosystem
  • Accelerating your Digital Strtegy with Open Banking API Economy Panel
  • Fighting Fraud with Deep Entity Profiling & Machine Automation
  • And, so much more! 

RSA University will also once again be offering condensed product-specific training courses beginning Monday, October 16 and on Tuesday, October 17, with information available soon on the RSA Charge microsite.  Visit the microsite often to stay informed and maximize your experience at RSA Charge 2017.

 

Don’t miss this event - inspiring Keynotes, hands-on labs, strategic security sessions, technical deep-dives, and so much more; register today and save $300 with the Early Bird Discount through June 30.

 

See you in Dallas!

                                                         

 

 

Believe it or not, the RSA Charge 2017 event is only six months away, Oct. 17-19 in Dallas at the Hilton Anatole. Visit the RSA Charge microsite, now open!  And this means, 'Call for Speakers' submissions are now being accepted as well.  

 

In case you were not able to attend one of the two live RSA Charge 'Call for Speakers' webinars in April, 'What You Need to Know About Submitting Your Speaker's Proposal'  the webinar replay is now available for your listening pleasure. 

 

To help you get those creative juices flowing, the following 2017 Submission Tracks have been identified for RSA products; for full session descriptions please see attachment:

 

Security Operations, Identity, Anti-Fraud

Detecting and Responding to the Threats That Matter

Identity Assurance

Reducing Fraud, while Not Reducing Customers

Secrets of the SOC

 

Governance, Risk and Compliance

Inspiring Everyone to Own Risk

Managing Technology Risk in Your Business

Taking Command of Your Risk Management Journey

Transforming Compliance

RSA Archer Suite Technical

RSA Archer Suite Advanced Technical

 

It is recommended that you once you listen to the replay, you use the 'offline' form,' available on the microsite as your draft before submitting. You may also have more than one submission. RSA Charge official  'Speaker' Submission Form is also available on the microsite.

 

Please Note: 'Call for Speakers' closes on May 26.'