RSA 2015 | April 20 - 23, 2015 | Moscone Center, San Francisco, CA
Use code X5STENBLE to register
Tenable has a new way for you to know if all your security systems are working—introducing Assurance Report Cards. Learn how Tenable's Assurance Report Cards can report your security posture up to senior management and your board.
Fill out the form to learn about Tenable's Critical Cyber Controls, get a free copy of The Definitive Guide to Continuous Network Monitoring, and get a small prize by bringing the Critical Cyber Controls to our booth at the show.
Come see us in Booth N3228. Take five minutes to talk to Tenable to make sure your security passes with flying colors. Stop by our booth to see how Tenable's Critical Cyber Controls can assure and protect your system.
What’s the hottest trends and topics to watch for at the RSA Conference this year? We’ve got you covered with the top security trends that are sure to be hot topics at this year’s show.
Tuesday, April 21st
2:20 p.m. – 2:40 p.m.
South Expo Hall
Expo Briefing Center
Enterprises need to know the effectiveness of their security systems as a whole, including event monitoring, patch management, malware defenses, inventory control, user access, and many other security defenses. Tenable’s continuous network monitoring solution leverages automation, unique sensors, and security content to directly measure how effective your security program is.
Thursday, April 23rd
9:10 a.m. – 10:00 a.m.
Security is increasingly becoming more embedded in operations and development. InfoSec professionals will become more specialized, either at a technical level or they will become liaisons among various groups, ensuring that security is consistent across the organization. This panel will cover this important shift and what it means to the future of security.
Tuesday, 4/21 at 11:30 a.m.
Wednesday, 4/22 at 11:30 a.m.
Thursday, 4/23 at 1:30 p.m.
Some surprises are good, like unexpected birthday gifts. Other surprises are not so good, like finding stray devices on your network. The first steps to eliminate unpleasant network surprises are building and maintaining complete inventories of all devices and applications in your environment. Armed with accurate inventories, you can prioritize security projects, assure compliance and meet configuration requirements. In this presentation we will discuss asset, application, and vulnerability discovery using Tenable's Passive Vulnerability Scanner, Log Correlation Engine, Nessus agents, and SecurityCenter CV.
Tuesday, 4/21 at 1:30 p.m.
Wednesday, 4/22 at 2:30 p.m. and 3:30 p.m.
Thursday, 4/23 at 11:30 a.m.
Doctors do basic things like taking your pulse and checking your temperature to determine how healthy you are. Do you know what basic things to check to determine if your network is secure? It’s important to be on the lookout for APTs and zero-days, but most networks fail at the basics. Let’s take a look at the fundamentals to get a good picture of your overall network health.
Tuesday, 4/21 at 2:30 p.m.
Wednesday, 4/22 at 1:30 p.m.
Tenable's SecurityCenter Continuous View helps you determine if their security systems are effective. It also has a new feature that provides an easy to understand reporting mechanism for visually communicating security status and business objectives to executives and board members. In this presentation, we'll explore the newest features in SecurityCenter CV and demonstrate how easy it is to convey your security posture to senior management at a moment's notice.