All Top Banking

RSA Conference Keynotes Available

Posted by John B. Frank Saturday, April 25, 2009

RSA 2009 Webcasts grid
Choose a keynote speaker below. Click "View Interactive Webcast" to see the version with slides and video,
or click "View Video Only" if you only wish to view the video. The webcast version requires Flash Player 9 and
a broadband connection for optimum playback performance.
MINIMUM REQUIREMENTS
RECOMMENDATIONS FOR BEST PERFORMANCE

TUESDAY, APRIL 21
Opening Ceremony
RSA® Conference 2009
Duration: 7 Minutes
View Interactive Webcast
View Video Only
Art Coviello
Executive Vice President, EMC Corporation
and President, RSA, The Security Division of EMC Corporation
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Enrique T. Salem
Chief Operating Officer
Symantec Corporation
Duration: 35 Minutes
View Interactive Webcast
View Video Only
Scott Charney
Corporate Vice President
Trustworthy Computing (TwC), Microsoft Corporation
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Panel Discussion
Chief Scientist and Director
The Cryptographers Panel
Duration: 50 Minutes
View Interactive Webcast
View Video Only
Lieutenant General Keith B. Alexander
Director of the National Security Agency (NSA)
and Chief of the Central Security Service (CSS)
Duration: 30 Minutes
View Interactive Webcast
View Video Only

WEDNESDAY, APRIL 22
Melissa E. Hathaway
Acting Senior Director for Cyberspace
National Security and Homeland Security Councils
Duration: 20 Minutes
View Interactive Webcast
View Video Only
Panel Discussion
Information Governance Goes to Court
Duration: 50 Minutes
View Interactive Webcast
View Video Only
John Chambers
Chairman and CEO
Cisco Systems, Inc.
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Dave DeWalt
Chief Executive Officer and President
McAfee, Inc.
Duration: 29 Minutes
View Interactive Webcast
View Video Only
Brian Smith, Ph.D.
Chief Technology Officer
TippingPoint
Duration: 30 Minutes
View Interactive Webcast
View Video Only
James Bamford
Author
The Shadow Factory: The Ultra-Secret NSA, from 9/11 to the Eavesdropping on America
Duration: 47 Minutes
View Interactive Webcast
View Video Only

THURSDAY, APRIL 23
Brian J. Truskowski
General Manager
Internet Security Systems (ISS), IBM Global Technology Services (GTS)
Duration: 31 Minutes
View Interactive Webcast
View Video Only
Philippe Courtot
Chairman and CEO
Qualys, Inc.
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Dave Hansen
Corporate Senior Vice President and General Manager
Security Management Business Unit, CA, Inc.
Duration: 25 Minutes
View Interactive Webcast
View Video Only

FRIDAY, APRIL 24
Herbert Thompson, Ph.D.
Chief Security Strategist
People Security
Duration: 40 Minutes
View Interactive Webcast
View Video Only
Jamie Hyneman & Adam Savage
Hosts
MythBusters
Duration: 40 Minutes
View Interactive Webcast
View Video Only



MINIMUM REQUIREMENTS
Adobe Flash Player 8+ to view "Interactive Webcasts" Get Flash Player Get Windows Media Player
Windows Media Player 9+ to view "Video Only"
PC: Windows 2000+, Internet Explorer 5.5+, Firefox 1.5+
MAC: OSX+, Safari, Firefox 1.5+
RECOMMENDATIONS FOR BEST PERFORMANCE
Broadband internet connection, Adobe Flash Player 8+


Reblog this post [with Zemanta]

0 comments

Post a Comment

Powered by Blogger.

Blog Archive

Search This Blog

Our Manufacturing Facility

Learn More About Us

Find out how our patented technology can empower your financial institution.

Our secure two-factor online banking authentication eliminates dangerous passwords and usernames and replicates the same trusted process used to access cash at ATM's. (Insert Bank Issued Card, Enter Bank Issued PIN)

There is an R.O.I. as FI's also earn recurring revenue from each transaction conducted using our PCI 2.0 Certified PIN Entry Device. Our technology also provides a unique real-time P2P "Instant-Transfer" which allows your online banking customer to transfer cash from ANY of their bankcards to ANY other bankcard...with the Swipe of a card.

Help your bank eliminate phishing and your customers avoid identity theft by providing them with the ability to stop typing and start swiping. There is no safer way to conduct financial transactions online than by 3DES DUKPT encrypting the cardholder details, which we do at the mag-head "inside the box/outside the browser."

Total Pageviews

SLIM for PC or SmartPhone

SLIM for PC or SmartPhone
Click to Inquire

Chip and PIN eCommerce and Mobile

Chip and PIN eCommerce and Mobile
Click to Inquire

Kapersky Calls for Mass Adoption of Card Readers

Kapersky Calls for Mass Adoption of Card Readers

Translate This Blog

BobCaps

Search ePayment News (example: NFC)

About Me

My photo
Named one of the best Payment Industry News Blogs 4 Years Running

Feedjit

My Zimbio