April 30, 2024 at 10:06AM
The RSA Conference theme “The Art of Possible” reflects the challenges and opportunities in data security, particularly with the shift to the cloud and the rise of AI. The upcoming conference will feature sessions on implementing data governance, integrating data security and privacy, leveraging AI for security, data lifecycle management, cloud data security controls, and exploring malicious data marketplaces. The event aims to address emerging threats and provide solutions for cybersecurity professionals.
Based on the meeting notes, here are the key takeaways for the six leading data security sessions at the RSA Conference:
1. Cisco Systems Session on Data Governance (Monday, May 6)
– Attend to discover practical tools for implementing data governance across your organization and engage with other data practitioners in a live discussion.
2. Practical Tools for Data Security and Privacy (Monday, May 6)
– Learn about practical examples of integrating data security and privacy measures in real business environments, sourced from the audience.
3. Data Security Challenge Leveraging AI (Monday, May 6)
– Engage in a unique session where participants use ChatGPT prompts to mitigate a potential data breach and gain insights into the possibilities of AI technology.
4. Building a Data Lifecycle Management Framework (Monday, May 6)
– Gain a step-by-step approach to building a data lifecycle management framework, empowering companies to decide how long to hold onto data and comply with regulations.
5. AWS Controls for Protecting Data (Wednesday, May 8)
– Discover the controls used by AWS to protect data from unauthorized access in the cloud era.
6. Exploration of Criminal Data Marketplaces (Thursday, May 9)
– Gain insight into how stolen data is utilized in clandestine marketplaces and understand comprehensive risk assessments for protecting various data types.
These sessions aim to provide attendees with practical tools, innovative learning experiences, and deeper insights into the evolving landscape of data security.