RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your...

12
Call for Speakers Offline Submission Form This form is to be used ONLY as a rough draft of submission; ALL final submissions must be done using the ONLINE form which can be found at rsa.com/charge-cfs SUBMITTER INFORMATION: The information you provide in this section pertains to you as the Submitter. If you’re also the Speaker, your account information can be carried forward in the Speaker Information section. Please note that Press will be in attendance at RSA Charge 2017 and will have access to sessions. Badges will clearly signify their status as members of the Press. Please fill out the following information *= required input Salutation * Dr./Mr./Mrs./Ms. First name * Middle Initial Last Name * Suffix Company/Organization * Job Title * Address 1* Address 2 City* Country* o If Country is USA or Canada State/Province* Zip/Postal Code* o If Country is United Kingdom UK Country* Foreign Postal Code* o If Country is NOT USA, Canada or United Kingdom Foreign State Foreign Postal Code Primary email address *

Transcript of RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your...

Page 1: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

Call for Speakers Offline Submission Form

This form is to be used ONLY as a rough draft of submission; ALL final submissions must be done using the ONLINE form which can be found at rsa.com/charge-cfs

SUBMITTER INFORMATION: The information you provide in this section pertains to you as the Submitter. If you’re also the Speaker, your account information can be carried forward in the Speaker Information section.Please note that Press will be in attendance at RSA Charge 2017 and will have access to sessions. Badges will clearly signify their status as members of the Press.

Please fill out the following information

*= required input Salutation * Dr./Mr./Mrs./Ms. First name *       Middle Initial   Last Name *       Suffix       Company/Organization *       Job Title *       Address 1*       Address 2       City*       Country*      

o If Country is USA or Canada State/Province*       Zip/Postal Code*      

o If Country is United Kingdom UK Country*       Foreign Postal Code*

o If Country is NOT USA, Canada or United Kingdom Foreign State       Foreign Postal Code      

Primary email address *       Confirm Primary email address * Secondary email address       Business Telephone *       Mobile Telephone      

IMPORTANT SESSION INFORMATION

Please keep in mind:

Page 2: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

All sessions are 45 minutes long, including Q&A. Presentations should provide information/insight that attendees can apply to their jobs (e.g. best practices and/or lessons learned).

We are very interested in highlighting examples of how more than one RSA solution is used to address a challenge.

Vendor product and/or solution sales-oriented presentations will not be accepted.

RSA Partner presentations need to include an RSA customer who will co-present and share their experience and lessons learned.

* = required input

Are you the proposed speaker or panel moderator?*   Yes /No 

If you are not the proposed speaker:

We require each proposed participant to approve their participation in the submission. Notifications will go out to all speakers, moderators and panelists and submissions will be disqualified if any participants have not approved their participation in the session.

Session Title * (Limit 75 characters including spaces)Your session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation. Your title should attract the interest of the Program Committee – and subsequently your audience.

Enter Session Title Here

Session Objective* (Limit 250 characters including spaces)In this section complete this sentence: In this session, attendees can expect to learn ____________________________. 

Your response should include no more than 3 learning objectives and be limited to 250 characters including spaces. This statement may be used in conjunction with the abstract in our marketing materials, website and pocket agenda (please do not use bullets).

Enter Session Objective Here

PAGE 2 of 8

Page 3: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

Short Session Abstract * (Limit 400 characters including spaces) In a few sentences, explain what your session will cover (please do not use bullets in your submission). This abstract will be included in our marketing materials, website and pocket agenda. NOTE: How long is 400 characters? The next paragraph is 404 characters, including spaces.

If you are an RSA Customer and would like to lead or participate on a panel discussion, please include an overview of your use case, your area of focus, expertise, and RSA products used so the Program Committee can determine common theme(s) with other submitters when building Panel Discussion sessions. You will have an opportunity, in the ‘Add a Speaker’ section, to identify your participation desires.

Enter Short Abstract Here

Quick Abstract * (Limit 140 characters including spaces) Sell it in a Tweet!

Enter Quick Abstract Here

Session Format *

Individual Speaker - One speaker only

Co-Speakers - This format has two speakers, one is designated as Primary Speaker and the other as Secondary Speaker. The Primary Speaker is the main contact for the RSA Charge Speaker Manager.

Panel Discussion - This is a session with a Moderator (Panel Leader) and up to three Panelists. The Moderator is responsible for facilitating the panel discussion and is the main contact for the RSA Charge Speaker Manager. Panel Discussions are not presentations.

Session Profiling Information – The following information will help ensure your session is targeted to the right audience. Sessions will be targeted on specific topics and levels of experience.

Target Audience *

Foundation – Getting started with solutions, learning the basics, gaining confidence Advanced – Creative use of solutions; unique, advanced challenges and innovative solutions

PAGE 3 of 8

Page 4: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

Proposed RSA Charge Topics* Please choose all that apply:

Detecting and Responding to the Threats that Matter Sessions should focus on approaches your organization has used to leverage RSA NetWitness® Suite to better detect, investigate and respond to threats. Examples include incident detection war stories, “hunting” for threats, investigating alerts, incident management, leveraging behavioral analytics, developing and using threat intelligence, product tips and tricks, collaboration with MSSPs, deployment and integration case studies, etc. The sessions should include an explanation of the business problem that is being addressed, but will focus more on the technical challenges that were overcome and how the product(s) were used to accomplish this.  The goal is to give the audience specific technical ideas and best practices that they can take home and apply in their deployments.

Identity and Access AssuranceSessions should focus on how you have used RSA SecurID® Suite, RSA SecurID® Access, or RSA® Identity Governance and Lifecycle to reimagine your IAM strategy which enabled you to solve a critical business problem, enabled a business initiative, improved compliance, reduced risk, improved efficiency, and lowered the cost of identity lifecycle management. Content should include best practices, case studies, or war stories. Examples could include how to deploy convenient authentication to the modern workforce across applications that reside both on-premises and in the cloud, enabling line-of-business and organizational priorities.  The presentation should include an explanation of the business problem, desired outcomes, required functionality, solution outcomes, and success metrics.

Inspiring Everyone to Own RiskSessions should focus on how you were able to inspire your organization to own risk - especially in terms of the Three Lines of Defense.  Risks could include operational risks, third party risk, or enterprise risk.  Content should include best practices, case studies or war stories. Examples include how to identify, assess and monitor risk, track loss events, model and assess risk of business processes, and third party risk and governance. The presentation should include an explanation of the business problem, desired outcomes, required functionality, solution outcomes, and success metrics.

Managing Technology Risk in Your Business Sessions should focus on approaches for leveraging Archer solution(s) to address critical IT, Security and/or technology risks. Content should include best practices, case studies, or war stories. Examples include how to integrate security tools, vulnerability management, security incident management, managing IT Security policy & compliance, and presenting IT risk in Business terms.    The presentation should include an explanation of the business problem, desired outcomes, required functionality, solution outcomes, and success metrics.

PAGE 4 of 8

Page 5: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

Reducing Fraud, while not Reducing CustomersSessions should focus on how to leverage the RSA® Fraud and Risk Intelligence Suite to solve specific business and technical problems such as gaining visibility into cybercriminal underground tactics; best practices for collecting, sharing and leveraging intelligence; and transaction protection and fraud mitigation techniques for login and post login activities. Content should include best practices, case studies, or war stories. The sessions should include an explanation of the business problem, desired outcomes, required functionality, solution outcomes, success metrics, and key takeaway lessons for the audience.

RSA Archer ® Suite Advanced Technical Sessions should cover advanced uses of RSA Archer Suite, custom objects, data feeds, on demand applications, integrations, etc. The content must include demonstrations of a business problem that is addressed using the platform. Screen shots, recorded, or interactive demonstrations are required. This is a “How To” presentation to instruct the audience on optimal platform configuration.  Other technical presentations may cover topics such as the administration of the platform, backup/recovery, system architecture, etc.

RSA Archer Suite Technical Sessions should cover beginner-to-intermediate uses of RSA Archer Suite, custom objects, data feeds, on demand applications, integrations, etc. The content must include demonstrations of a business problem that is addressed using the platform. Screen shots, recorded, or interactive demonstrations are required. This is a “How To” presentation to instruct the audience on optimal platform configuration.  Other technical presentations may cover topics such as the administration of the platform, backup/recovery, system architecture, etc.

Secrets of the SOC Sessions should focus on experiences and ideas for building, operating and improving security monitoring programs/ Security Operations Centers (SOCs); covering considerations and linkage across people, processes, and technology. Examples include how to create and evolve a security operations program; how to hire, train, and retain the right security professionals; justifying and measuring SOC performance; lessons learned from building and maturing your security team; and instructive war stories of past incidents. The sessions should include an explanation of the business problem, desired outcomes, solution results, key takeaways, future plans, and lessons that the audience might use to improve their organizations’ security monitoring programs.

Taking Command of Your Risk Management JourneySessions should focus on approaches, strategies and recommendations for building organizational capabilities that bring maturity to your overall risk and compliance program. Content should include case studies and recommendations for assessing maturity, changing organizational culture, building long-term strategies, or removing organizational barriers or obstacles. Examples include how to achieve consensus, measure value of the program, reporting on return on investments, organization change management, or strategic roadmaps.  The presentation should include an explanation of the GRC approach taken (centralized, top-down, decentralized, federated, or some combination), the rationale, the phases of organizational achievement, and the major milestones in risk and compliance maturity.

Transforming Compliance Sessions should focus on how your organization transformed compliance processes by leveraging RSA Archer Suite to solve a critical Corporate, Regulatory Compliance, and/or Industry challenge. Content should include best practices, case studies or war stories. Examples include how to develop policies and standards, measure controls, report on compliance posture, audit program management,

PAGE 5 of 8

Page 6: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

and controls assurance processes. The presentation should include an explanation of the business problem, desired outcomes, required functionality, solution outcomes, success metrics.

Submitters Comments (limit 400 characters including spaces)Is there anything you want to tell the Program Committee?

Enter your comments here

PROPOSED SPEAKERS

Add a SpeakerThe number of participants that can be added to this session is based on the Session Format selected in the prior Session Information section. An Individual Speaker session may have only one speaker, a Co-Speakers session has two speakers, and a Panel Discussion session has a Moderator (Panel Leader) and up to three Panelists.

Speaker roles for Panel Discussion sessions:

Moderator (Panel Leader) - The Moderator (Panel Leader) will lead in the development and planning of a panel, is responsible for facilitating the panel discussion and is the main contact for the RSA Charge Speaker Manager.

Panelist – The panelists should have differing areas of focus and expertise around a common theme to ensure interactive debate.

All proposed Speakers, Moderators (Panel Leaders) and Panelists will be notified that they were included in a proposed submission. If a Speaker, Moderator (Panel Leader) or Panelists has not approved their participation in a proposed submission, the proposed submission will be disqualified.

Complete the following information for each participant you wish to add. You will be given the option to populate the form with your information if you are a participant in addition to being the submitter.

PAGE 6 of 8

Page 7: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

NOTE: Each speaker must have a unique email address* = required input:

Has the proposed speaker or panelist approved his or her participation in the session?*   Yes /No 

Salutation * Dr./Mr./Mrs./Miss/Ms. First name *       Middle Initial   Last Name *       Suffix       Preferred Name       Company/Organization *       Job Title *       Address 1* Address 2 Country*      

o If Country is USA or Canada State/Province*       Zip/Postal Code*      

o If Country is United Kingdom UK Country*       Foreign Postal Code*

o If Country is NOT USA, Canada or United Kingdom Foreign State       Foreign Postal Code      

Primary Email address *       (must be unique) Secondary email address       Business Telephone *       Mobile Telephone       Linkedin public profile (full url please)       Participant Biography/CV * (Limit 400 characters including spaces)

This information will appear on the website and in other marketing materials. Please do not use bullets.

Enter speaker biography/CV here

Has the participant spoken at an RSA Summit before?* Yes/No

If yes:

RSA Charge 2016 RSA Charge 2015 RSA Archer Summit 2015 at RSA Charge RSA Global Summit 2014 RSA Archer Summit 2014 Security Analytics Summit 2013

PAGE 7 of 8

Page 8: RSA Conference Europe 2006 · Web viewYour session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.

RSA Archer Summit 2013 NetWitness Summit 2012 RSA Archer Summit 2012 Other

Enter other conference name(s) here

If participant has a blog, please enter blog link here:Enter blog link here

If participant has a Twitter handle, enter it here (format @Handle):Enter Twitter handle here

PAGE 8 of 8