Dates: February 25 - March 1
Register Now: https://ae.rsaconference.com/US13/portal/newreg.ww
Webroot at RSA: http://mysite.webroot.com/content/rsa2013
The Gutenberg Printing Press.
Data by itself is nothing but a collection of facts and figures, letters and numbers. However, when ignited by understanding and context, data can become so much more.
In 1440, Johannes Gutenberg, a goldsmith by profession, completed his invention of the printing press, which sparked a revolution in the way people see and describe the world they live in. This collection of wooden and metal letters, regarded as one of the most influential inventions of the second millennium, led to the mass distribution of information and a wave of enlightenment that modernized and transformed culture.
Today, we live in a digital age where the printed page is becoming obsolete. But we find ourselves amidst our own information revolution. Data has grown big and gets bigger with every digital transaction we make. It also is more accessible than ever, which leads to the questions, “how do we use, secure and share the information that surrounds us?” As we stand in the midst of the change we look back to the time of Gutenberg to find inspiration for the future of security. Knowledge has always been power. Knowledge has always kept us one step ahead of security threats. We’ve found security in knowledge. And just as Gutenberg’s wooden and metal letters sparked the evolution of culture, at RSA Conference 2013, we bring our security insights and perspectives together to ignite the mass of information that surrounds us.
________________________________________________________
Grayson Milbourne and Armando Orozco of Webroot to present
Android Malware Exposed - An In-Depth Look at its Evolution
Presented by: Armando Orozco - Senior Threat Research Analyst, Webroot
Grayson Milbourne - Director of Global Threat Research, Webroot
Location: Wednesday, February 27, 10:40 AM - 11:40 AM, Room 301
This presentation will explore the rapidly evolving world of Android malware and shed light on the various techniques used to exploit devices using this OS. We will start by looking at some of the earliest examples; comparing them with the latest threats, exposing patterns and highlighting characteristics which are often unique to malicious apps.
________________________________________________________
RSA Conference continually evolves program offerings to meet the ever-changing needs of our delegates in the dynamic infosec industry. This year we will be debuting:
- 275+ sessions across 22 tracks – including seven newly created tracks
- 20-minute and 60-minute sessions are offered so you can acquire more knowledge and maximize your Conference experience.
- An additional Expo space to accommodate even more industry-leading vendors!
- And more...