- RSA Charge & Archer Summit 2015

advertisement
RSA® CHARGE 2015
Call for Speakers Offline Submission Form
This form is to be used ONLY as a rough draft of submission; ALL final
submissions must be done using ONLINE form which can be found at
charge.rsa.com
SUBMITTER INFORMATION:
The information you provide in this section pertains to you as the Submitter. If
you’re also the Speaker, your account information can be carried forward in the
Speaker Information section.
Please fill out the following information
*= required input

Salutation * Dr./Mr./Mrs./Miss/Ms.

First name *

Middle Initial

Last Name *

Suffix

Company *

Job Title *

Address 1*

Address 2

City*

Country*
o If Country is USA or Canada
 State/Province*
 Zip/Postal Code*
o If Country is United Kingdom
 UK Country*
 UK County*
 Foreign Postal Code*
o If Country is NOT USA, Canada or United Kingdom
 Foreign State
 Foreign Postal Code

Primary email address *

Secondary email address

Primary Telephone *

Mobile Telephone
PAGE 1 of 6
SESSION INFORMATION
All sessions are 45 minutes long, including Q&A. Presentations should target providing
information/insight that attendees can apply to their jobs (e.g. best practices/lessons
learned). Vendor product/solution sales oriented presentations will not be accepted. Please
note that RSA Partner presentations (excluding Sponsor presentations) need to include an
RSA Customer who will co-present and share their experience and lessons learned.
* = required input
Are you the proposed speaker or panel moderator?* Yes /No
If you are not the proposed speaker:
We require each proposed participant to approve their participation in the submission.
Notifications will go out to all speakers, moderators and panelists and submissions will
be disqualified if any participants have not approved their participation in the session.

Session Title * (Limit 75 characters including spaces)
Your session title should clearly indicate the topic of your presentation, and do so in a
way that attracts potential attendees for your presentation. Your title should attract the
interest of the Program Committee – and subsequently your audience.
Enter Session Title Here

Short Session Abstract * (Limit 400 characters including spaces)
In a few sentences, explain what your session will cover (please do not use bullets in
your submission). This abstract will be included in our marketing materials, website
and program guide. NOTE: How long is 400 characters? This paragraph is 274
characters including spaces.
If you are an RSA Customer and would like to lead or participate on a panel
discussion, please include an overview of your use case, your area of focus, expertise
and RSA products used to the Program Committee can determine common theme(s)
with other submitters when building Panel Discussion sessions. You will have an
opportunity, in the Add a Speaker section, to identify your participation desires.
Enter Short Abstract Here

Quick Abstract * (Limit 140 characters including spaces)
Sell it in a Tweet!
Enter Quick Abstract Here
PAGE 2 of 6
Session Format * (select one)
Individual Speaker - One speaker only
Co-Speakers - This format has two speakers, one is designated as Primary
Speaker and the other as Secondary Speaker. The Primary Speaker is the main
contact for the RSA Charge Speaker Manager.
Panel Discussion - This is a session with a Moderator (Panel Leader) and up to
three Panelists. The Moderator is responsible for facilitating the panel discussion and
is the main contact for the RSA Charge Speaker Manager. Panel Discussions are not
presentations.
Session Profiling Information – The following information will help ensure your session is
targeted to the right audience. Sessions will be targeted on specific topics and levels of
experience.
Target Audience *
Foundation – Getting started with solutions, learning the basics, gaining confidence
Advanced – Creative use of solutions; unique, advanced challenges and innovative
solutions
Session Topics for RSA Charge * Please choose one of the following:
Threat Readiness & Incident Response – Secrets of the SOC (General)
Sessions should focus on experiences and best practices for building, operating and
improving Security Operations Centers and their associated people, processes, and
technology. Examples include how to create and evolve, developing a risk or breach
management program, justifying and measuring Security Operations performance and
lessons learned from building and maturing your SOC or CIRC as well as war stories
related to incident response engagements. The sessions should include an explanation of
the business problem, desired outcomes, solution results, key takeaways, and future
plans and lessons for the audience.
Threat Readiness & Incident Response – Attack Detection and
Investigation (Technical)
Sessions should focus on approaches for leveraging RSA Security Analytics, RSA ECAT
and/or RSA Security Operations Management/RSA Archer to detect, investigate and
respond to threats. Examples include incident detection war stories, examples of
“hunting” through data, investigating alerts, incident management, developing and using
threat intelligence, product tips and tricks, deployment and integrations case studies,
etc. The sessions should include an explanation of the business problem, but will focus
on the technical challenge, desired outcomes, solution result and key takeaway lessons
for the audience.
PAGE 3 of 6
Anti-Fraud (General)
Sessions should focus on how to leverage the anti-fraud portfolio to solve specific
business problems such as gaining visibility into cybercrime underground tactics, best
practices for collecting, sharing and leveraging intelligence, transaction protection and
fraud mitigation techniques for login and post login activities. Content should include
best practices, case studies or war stories. The sessions should include an explanation of
the business problem, desired outcomes, required functionality, solution outcomes,
metrics used to measure success and key takeaway lessons for the audience.
Anti-Fraud (Technical)
Sessions should focus on technical implementations and uses of Adaptive Authentication
(e.g. website and mobile SDK integration, optimizing risk engine, policy and case
management), Web Threat Detection (e.g. leveraging click stream analysis to detect
advanced info security incidents, fraud, threat and profile analysis, and WTD reporting)
or technical deep dive into cybercrime underground tactics, techniques and procedure
(e.g. examples of actual underground forums, intelligence gathering and sharing
standards, Trojan reverse engineering examples) The content must include
demonstrations of a business problem that is addressed using RSA Web Threat
Detection, Adaptive Authentication, Adaptive Authentication for eCommerce or
FraudAction. Screen shots, recorded or interactive demonstrations are required. This is a
“How To” presentation to instruct the audience on optimal platform usage.
Secure Access (General)
Sessions should focus on how you have used RSA Authentication solutions to solve a
critical business problem, enable a business process or reduce risk. Content should
include best practices, case studies or war stories. Examples include how to successfully
rollout authentication requirements to end users, leverage authentication across multiple
applications, enable new business activities by providing secure access etc. The
presentation should include an explanation of the business problem, desired outcomes,
required functionality, solution outcomes and metrics used to measure success.
Secure Access (Technical)
Sessions should cover technical uses of authentication including application integration,
mobile & cloud authentication, product deployment, authenticator provisioning, product
migration, reporting, administration etc. The content must include demonstrations of a
business problem that is addressed using the RSA Authentication Manager or Adaptive
Authentication solutions. Screen shots, recorded/interactive demonstrations or
workshops are required.
Identity and Access Management (General)
Sessions should focus on how you have used RSA’s solution — Identity Management and
Governance (Aveksa) — to improve compliance, reduce risk, improve the efficiency and
cost of identity lifecycle management, or accelerate business access. Content should
focus on case studies, best practices or overcoming a significant obstacle. Examples
include how to successfully engage the line of business, roll out access request and
approval, tackle role management, or automate provisioning. The presentation should
include an explanation of the business problem, desired outcomes, required
functionality, solution outcomes and metrics used to measure success.
PAGE 4 of 6
Identity and Access Management (Technical)
Sessions should cover technical uses of RSA’s solution — Identity Management and
Governance (Aveksa) — including access certification, policy management, role
management, access request, or provisioning. The content should include use cases or
demonstrations of a business or technical problem that was addressed using the RSA
platform. Screen shots, recorded/interactive demonstrations or workshops are
required. Interesting or technically challenging use cases are definitely a plus!
Submitters Comments (limit 400 characters including spaces)
Is there anything you want to tell the Program Committee?
Enter your comments here
PROPOSED SPEAKERS
Add a Speaker
1. The number of participants that can be added to this session is based on the Session
Format selected in the prior Session Information section. An Individual Speaker
session may have only one speaker, a Co-Speakers session has two speakers and a
Panel Discussion session requires a Moderator (Panel Leader) and up to four Panelists.
Speaker roles for Panel Discussion sessions:
 Moderator (Panel Leader) - The Moderator (Panel Leader) will lead in the
development and planning of a panel, is responsible for facilitating the panel
discussion and is the main contact for the RSA Charge Speaker Manager.
 Panelist – The panelists should have differing areas of focus and expertise around
a common theme to ensure interactive debate.
All proposed Speakers, Moderators (Panel Leaders) and Panelists will be notified that
they were included in a proposed submission. If a Speaker, Moderator (Panel
Leader) or Panelists has not approved their participation in a proposed
submission, the proposed submission will be disqualified.
Complete the following information for each participant you wish to add. You will be given
the option to populate the form with your information, if you are a participant in addition to
being the submitter.
NOTE: Each speaker must have a unique email address
* = required input:

Salutation * Dr./Mr./Mrs./Miss/Ms.

First name *

Middle Initial

Last Name *

Suffix

Preferred Name

Company *
PAGE 5 of 6

Job Title *

Address 1*

Address 2

Country*
o If Country is USA or Canada
 State/Province*
 Zip/Postal Code*
o If Country is United Kingdom
 UK Country*
 UK County*
 Foreign Postal Code*
o If Country is NOT USA, Canada or United Kingdom
 Foreign State
 Foreign Postal Code

Primary Email address *
(must be unique)

Primary Telephone *

Secondary email address

Primary Telephone *

Mobile Telephone

Linkedin

Participant Biography/CV * (Limit 400 characters including spaces)
This information will appear on the website and in other marketing materials. Please
do not use bullets.
Enter speaker biography/CV here

Has the participant spoken at an RSA Summit before?
Yes/No
RSA Global Summit 2014
RSA Archer Summit 2014
Security Analytics Summit 2013
RSA Archer Summit 2013
NetWitness Summit 2012
RSA Archer Summit 2012
Other
Enter other conference name(s) here

If participant has a blog, please enter blog link here:
Enter blog link here

If participant has a Twitter handle, enter it here (format @Handle):
Enter Twitter handle here
PAGE 6 of 6
Download