RSA Conference Europe 2009 opens its doors

European RSA Conference opens its doors today with a set of keynotes by Art Coviello and Chris Young – President and Senior Vice President of RSA. Herbert Thompson, Chief Security Strategist at People Security, will also present a keynote session on Beyond Credit Card Numbers: The New Threat of Gateway Data.

Help Net Security staff is attending RSA Conference Europe 2009 and we will be publishing live updates with news and happenings from the event.

The 10th annual RSA Conference Europe, which runs until the 22nd October 2009 at the Hilton London Metropole Hotel in the U.K. delivers its educational content through pre-Conference tutorials, keynotes and 70+ sessions across 10 tracks.

This year’s event features additional keynote speeches from guest speakers including Nick Leeson, the rogue trader whose unchecked risk-taking caused the biggest financial scandal of the 20th century with the collapse of Barings Bank. Keith Mularski, Supervisory Special Agent, Cyber Initiative & Resource Fusion Unit at the U.S. Federal Bureau of Investigation , and Andy Auld, Head of Intelligence, e-Crime Department, Serious Organised Crime Agency, will also present a joint keynote entitled, “The Underground Economy.”

RSA Conference Europe will also provide topical panels and sessions in a Hot Topics Track, including Governments Face Up to the Cyber Security Challenge. In this panel, Roger Dean, Executive Director, EEMA and Howard Schmidt, President & CEO, Information Security Forum Ltd., will evaluate recent announcements by world leaders and their implications for Europe, in particular.

A panel on Collateral Hacking – moderated by Dr. Hugh Thompson, with panelists Andrew Nash, Senior Director of Identity Services, PayPal; Ira Winkler President, ISAG; and David Ostertag, Global Investigations Manager, Investigative Response, Verizon Business Services – will discuss how organisations can best defend themselves against collateral hacking as more and more companies outsource for SaaS solutions, pooling resources with other unknown companies that could be targets for attacks.

Don't miss