ISSUE 65.5 (March 2020)
RSA Conference 2020
ISSUE 65.5
Issue 65.5 Contributors

Gold sponsors

  • Digicert
  • (ISC)2
  • TransUnion

Silver sponsors

  • Bandura Cyber
  • Cymatic
  • Infoblox
  • ProcessUnity
  • Security Compass
  • ThreatQuotient

Bronze sponsors

  • Acunetix
  • CyberArk

RSA Conference 2020

PDF download
Read issue 65.5 now
Share

Table of contents

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

Some of the most pressing topics included privacy, machine learning and artificial intelligence, policy and government, applied crypto and blockchain, and, new for RSA Conference 2020, open source tools, product security and anti-fraud.

“Our mission is to connect cybersecurity professionals with diverse perspectives and backgrounds to inspire new ways of thinking and push the industry forward,” said Linda Gray Martin, Senior Director and General Manager, RSA Conference. “This week proved the importance and impact of the human element in cybersecurity, and we thank all of our attendees for bringing their passion, commitment and ideas to RSA Conference for another amazing year.”

Sponsors

Interesting in becoming magazine sponsor? Click here

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue