Selena's Picks for RSAC 2017 - Diversity, Privacy, and Human Behavior

It’s not just that I edit and write for ITSPmagazine’s Equal Respect column that I am interested in diversity (gender, age, race, religion, disabilities, sexual orientation, neurodiversity) within the tech industry; it’s that I am endlessly hungry for solutions to problems that affect us all (if you enjoy any kind of technology in your life, that is).

This year at RSA Conference 2017, I’ll be looking for sessions that involve the human experience, from women in tech to the weakest link (human nature) in cybersecurity to personal privacy & security — and, of course, all the RSA parties….

Here are some of my picks.

Selena Templeton, ITSPmagazine editor for the Equal Respect column

IAPP: The New Technological Approach to Privacy

February 13, 2017 | 1:00 PM - 4:30 PM | Marriott Marquis | Yerba Buena 8

Efforts to protect personal information are now infused with an understanding of how to use and manage personal information in the first place. Privacy is entering its next evolutionary phase, with technological approaches and solutions but in order to operationalize privacy and help it work side by side with cybersecurity, organizations needs frameworks and tools that allow for controls and automation.


  • Keynote: Top 10 Privacy Issues in Cybersecurity | Ari Schwartz

  • Engineering privacy: A primer | Peter Brown

  • Emerging privacy technologies for the enterprise | Kabir Barday, Peter Cranstone, Nimrod Luria, Hilary Wandall

Securing Diversity: Women in Cybersecurity

February 13, 2017 | 2:00 PM - 5:00 PM | Moscone West | 2024

We need diversity to solve the problem in this industry and for the first time ever, the RSA conference is putting together a diversity-focused seminar. Dr. Uma Gupta will discuss the effect of diversity experiences on the human brain, Dr. Chenxi Wang will lead a panel of two female CEOs (Jennifer Sunshine Steffens, Mischel Kwon) and Leyla Seka of Salesforce, and the seminar will close with former covert CIA agent Valerie Plame discussing women in intelligence.


  • Opening Remarks | Jennifer Minella

  • Workplace Diversity Begins with Self | Dr. Uma Gupta

  • Don’t Talk About Diversity, Live It! | Dr. Chenxi Wang, Mischel Kwon, Jennifer Steffens, Leyla D. Seka

  • Cybersecurity & Girls: A mother-daughter perspective on workplace diversity | Bobbie Stempfley, Rachael Skillman

  • Women in Intelligence | Valerie Plame

Developing Super Women in Security

February 14, 2017 | 1:15 PM - 2:00 PM | Marriott Marquis | Nob Hill D

With a gap in qualified professionals upon us as a market, the attraction and retention of women in security is a looming issue. Katherine Kuehn discusses how to attract and develop young talent, how to retain women in security and how to develop more female thought leaders and mentors quickly.


  • Katherine Kuehn, Deputy CISO, Head of Security Practice – BT Americas, BT

The Human Exploitation Kill Chain

February 14, 2017 | 1:15 PM - 2:00 PM | Moscone West | 2006
February 15, 2017 | 2:45 PM - 3:30 PM | Moscone West | 2001

Whenever a user falls victim to a phishing or other social engineering attack, or makes an error, critics claim awareness efforts are useless. However, if a single user action can compromise an entire security program, the problem is the security program. This presentation will detail how technology, process and awareness should combine to stop human failings. Case studies will be presented.


  • Ira Winkler, President, Secure Mentem

Mobile Devices: What Could Go Wrong? Discussion from the Frontlines  

February 14, 2017 | 2:30 PM - 3:15 PM | Marriott Marquis | Nob Hill B

Many enterprises allow employees to bring their own devices and access email, calendars, address books, and sometimes internal web resources, fileshares and apps. Learn how your peers are dealing with hidden BYOD risks from mobile apps and WiFi networks that employees visit.

  • Facilitator: David Jevans, Vice President of Mobile Security, Proofpoint

Cybersecurity Culture in ICS Organization: Human Factor as the Weakest Link  

February 16, 2017 | 10:30 AM - 11:00 AM | Marriott Marquis | The Sandbox - ICS Stage

What is the weakest link in industrial cybersecurity chain? Definitely it’s a human. This talk will review several successful attacks against ICS companies focusing on the human factor as the major cause of security issues. This talk will show personnel mistakes that allow an attacker to penetrate into network and how to change organizational behavior in order to stand against that type of attacks.

  • Speaker: Andrey Nikishin, Special Projects Director, Future Technologies, Kaspersky Lab

Gamification Using “Science of Habit Cycle” to Transform User Behavior

February 16, 2017 | 1:30 PM - 2:15 PM | Moscone West | 2018

Forty percent of our daily activities are automated routines or habits which are not under conscious control. Gamification for security awareness has been tried but almost no work has happened in the context of “Habit Cycle.” What is the science behind the formation of habits in our brain? How can you use gamification in your enterprise or for young kids to help form lasting and sticky security habits?


  • Bikash Barai, Co-Founder, Cigital India  

Privacy Enhancing Technologies Work—But Can Anyone Use Them?

February 16, 2017 | 2:45 PM - 3:30 PM | Moscone West | 2018

Tools that help people assess and protect their own privacy are not new. But as the challenges to protect individuals’ privacy become more substantial, the tools to insulate people from privacy risks require more technical expertise. This panel will discuss specific privacy challenges and review research efforts to make advanced privacy-enhancing technologies more accessible to everyday people.


  • Moderator: Naomi Lefkovitz, Senior Privacy Policy Advisor, NIST  

  • Panelist: Lee Tien, Senior Staff Attorney and Adams Chair for Internet Rights, Electronic Frontier Foundation  

  • Panelist: Tanvi Vyas, Tech Lead, Security and Privacy User Experience, Mozilla

Stay Connected

If you’re interested in our take on these sessions and topics, any other coverage from ITSPmagazine, or our big plans for RSA Conference 2017 as an official media sponsor, be sure to follow all our RSAC coverage here!