On Tuesday 27 February 2024, join us for RSA Identity Day! We’ll be in Adelaide where we’ll be:
- Showcasing recent identity security innovations
- Detailing how to accelerate the journey to passwordless
- Discussing recent attacks that targeted organisations’ identity infrastructures
- Demonstrating the value of the RSA Unified Identity Platform
- And lots more!
Due to limited spacing registrations are required to secure your place
Agenda
Time |
Topic |
Abstract |
0930 -1000 |
Registration |
Registration |
1000 - 1030 |
Welcome |
Introduction and welcome to Identity Day |
1030 - 1100 |
AI in the new Abnormal |
AI and ML have an incredibly powerful role to play in supporting a strong defence against existing and emerging threats. Learn how AI driven cybersecurity helps to reduce risk while increasing operational resilience and efficiencies. |
1100 - 1130 |
The Journey to Passwordless Authentication |
Passwordless authentication is a hot topic and with good reason. When you eliminate passwords, you reduce the risk of identity theft through stolen end user credentials. A world without passwords is a realizable vision for the future, however it’s not a sprint, but rather a marathon. Join this session to learn about passwordless authentication and the journey towards adoption. |
1130 - 1200 |
BYOD Mobile Device Security |
The corporate security perimeter is blurry and to get work done anywhere, at anytime, a significant number of employees rely on BYOD mobile devices for efficiency and productivity. These devices are often self-managed by end users and are an attractive threat vector for bad actors. Learn about how to secure your end users BYOD devices without MDM and protect corporate assets while striking a balance with end user experience. |
1200 - 1230 |
The Force Unleashed: RSA's Approach to Centralised Identity |
The principles of least privilege are pivotal to securing and strengthening the cybersecurity posture of organisations. As organisations continue to scale and comply with government regulation, a quality identity governance and administration (IGA) solution is critical for identity management. Learn how to unlock the power of Governance and Lifecycle and gain assurance of who has access to what, identify and prioritize identity risks as they arise, and keep up with compliance policies and regulations. |
1230 - 1245 |
Closing Remarks |
Event closing remarks |
1245 - 1330 |
RSA Hosted Lunch |
Hosted Light Lunch |