RSA Conference 2012 – The Sessions I Don’t Want to Miss

The sessions I don’t want to miss (but probably will). These sessions all strike my fancy in some way, and I would love to make it to them. Some are time competing and others take place after I am gone, but I wish I could attend. There are at least two that I am sure I will attend:

Session Code: P2P-108C
Session Title: Where will InfoSec be in 2020?
Facilitator: Pete Lindstrom Research Director
Spire Security
Scheduled Date(s)/Time(s): Tuesday, February 28 03:50 p.m.
Room 112
Session Length: 50 minutes
Session Abstract: Take off your flak jacket and put on your thinking cap. It’s not often we get to be fearless prognosticators, but now is the time. Come to this session to listen, brainstorm, and debate the nature of risk and security in the year 2020. What will IT architectures look like? How will we protect them? Come with an open mind and leave with strategic ideas and interests for your security program.
Session Code: DEB-001
Session Title: Software Liability: Our Saving Grace or Kiss of Death?
Moderator: Pete Lindstrom Research Director
Spire Security
Panelist: Bruce Schneier Chief Technology Security Officer
BT
Marcus Ranum Chief Security Officer
Tenable Network Security, Inc.
Scheduled Date(s)/Time(s): Wednesday, February 29 12:00 p.m.
Room 134
Session Length: 50 minutes
Session Abstract: “Software could be more secure” may be the understatement of the century. Vulnerabilities have infested our code for as long as there’s *been* code. Nobody refutes the notion that we want more secure code; it is getting there that is the challenge – and also the focus of this debate.Software liability is oft-cited as one potential approach to creating more secure code. Clearly, there are strong advocates and as strong detractors. Today is the day we work everything out and decide whether software liability would be our saving grace or the kiss of death.

For these others, I will do my best to make them:

ASEC-203 Never Waste a Crisis — Necessity Drives Software Security Improvements Wednesday February 29 10:40 AM
ASEC-302 Remediation Statistics: What Does Fixing Application Vulnerabilities Cost? Thursday March 1 9:30 AM
ASEC-401 Engineering Smart Grid Security Friday March 2 9:00 AM
ASEC-402 Hacking’s Gilded Age: How APIs Will Increase Risk and Foment IT Chaos Friday March 2 10:10 AM
AUTH-003 David Brooks: The Social Animal: The Hidden Sources of Love, Character, and A… Wednesday February 29
DAS-201 Can Data Breaches Be Stopped, Really? Wednesday February 29
DAS-302 Message in a Bottle – Finding Hope in a Sea of Security Breach Data Thursday March 1 9:30 AM
EXP-108 The Six Most Dangerous New Attack Techniques and What’s Coming Next Tuesday February 28 3:50 PM
EXP-204 The Role of Security in Company 2.0 Wednesday February 29 1:00 PM
EXP-302 Hacking Exposed: Embedded – The Dark World of Tiny Systems and Big Hacks Thursday March 1 9:30 AM
EXP-303 Terrorist Groups in the Online World Thursday March 1 10:40 AM
EXP-401 Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous” Friday March 2 9:00 AM
EXP-403 From Technology to Psychology: Understanding the Social Psychology of Hackers Friday March 2 11:20 AM
GRC-106 Risk Management Smackdown II: The Wrath of Kuhn Tuesday February 28 1:10 PM
GRC-107 Taking Information Security Risk Management Beyond Smoke & Mirrors Tuesday February 28 2:40 PM
GRC-203 The Metric System: Why Meaningful Metrics Matter Wednesday February 29 10:40 AM
HOT-107 BYOD(evice) without BYOI(nsecurity) Tuesday February 28 2:40 PM
HOT-201 Embedded Insecurity: What Lies Beneath Wednesday February 29 8:00 AM
HOT-203 Hacking Exposed: Mobile RAT Edition Wednesday February 29 10:40 AM
HT1-108 Vulnerability Panel: Is it ZERO Day or ZERO Care? Tuesday February 28 3:50 PM
HT1-203 The Psychology of a Cyber Predator; Decoding the Deviate Mind Wednesday February 29 10:40 AM
HT1-204 Why is Search Engine Poisoning Still the #1 Web Malware Vector? Wednesday February 29 1:00 PM
HT1-402 The Three Myths of Cyberwar Friday March 2 10:10 AM
HT1-403 Estimating the Likelihood of Cyber Attacks When There’s “Insufficient Data” Friday March 2 11:20 AM
HT2-107 SSL and the Future of Authenticity Tuesday February 28 2:40 PM
HT2-202 Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers Wednesday February 29 9:30 AM
LAW-204 Tackling the Identity Management Liability Problem Wednesday February 29 1:00 PM
MBS-302 Vetting Mobile Apps for the Warfighter Thursday March 1 9:30 AM
MBS-303 BYOD: Securing Mobile Devices You Don’t Own Thursday March 1 10:40 AM
MBS-402 iOS Security Internals Friday March 2 10:10 AM
P2P-204B Cloudy With a Chance of Risk Wednesday February 29 1:00 PM
SECT-201 Innovation and Technology Transfer in Security: From the Lab to General Use Wednesday February 29 8:00 AM