Skip to content

Visit Delinea Booth
#N-6345 at RSA Conference

May 6-9 2024 | San Francisco, CA



RSA Conference 2024 logo (no venue) stacked - white

Get ready for an enriching experience at the RSA Conference with Delinea in San Francisco from May 6-9, 2024! Immerse yourself in the dynamic domain of Delinea's security solutions. We offer a seamless integration of Privileged Access Management (PAM) and Identity Governance and Access Controls, elevating organizations' security posture, compliance procedures, and operational effectiveness.


Booth Bytes Presentation Topics

Achieve Compliance/Insurance by Securing Privileged Credentials
  • Tues: 1:30 – 2pm
  • Wed: 10:30 – 11:00am, 3:00 – 3:30pm
  • Thurs: 11:30 – 12:00pm
In today's rapidly evolving digital landscape, ensuring compliance is challenging for organizations of all sizes. This presentation delves into the critical role of an enterprise-grade vault in simplifying proof of compliance. We'll explore how Secret Server not only secures your sensitive credentials but also ensures compliance with stringent regulatory standards. Through real-world scenarios and best practices, learn how to leverage Secret Server to meet compliance requirements while building resilience, improving efficiency, and increasing profitability.​
Mitigate Privilege Risks of MITRE ATT&CK Techniques​
  • Tues: 2:00 – 2:30pm
  • Wed: 11:00 – 11:30am
  • Thurs: 12:00 – 12:30pm
Navigate the complexities of cyber threats using the MITRE ATT&CK framework. This presentation offers an exploration of how the framework provides a comprehensive and actionable guide to understanding and mitigating cyber threats. We'll demonstrate how leveraging the MITRE ATT&CK framework empowers organizational defenders to enhance their security posture, develop robust defense strategies, and stay one step ahead of adversaries. Join us to unlock the full potential of the MITRE ATT&CK framework in fortifying your cybersecurity defenses.​
Reduce Risks from Remote Access
  • Tues: 12:00 – 12:30pm, 5:00 – 5:30pm
  • Wed: 12:00 – 12:30pm
  • Thurs: 11:00 – 11:30am
Dive into securing third-party remote access in a decentralized work landscape, moving beyond the outdated VPN model fraught with security and compliance pitfalls. We'll showcase Delinea's platform, demonstrating how identity verification, precise access control, secure connections, and diligent auditing can fortify your network against external threats. Learn how to streamline vendor access without compromising on security, ensuring your network remains robust and resilient.
Reducing Risks from Misconfigured Cloud Privileges
  • Tues: 10:00 – 10:30am, 3:00 – 3:30pm
  • Wed: 3:30 – 4:00pm
IT complexity and the sprawl of identities  is challenging legacy IAM and cloud service providers that don't have visibility into identities across cloud infrastructures, like AWS, Azure and GCP. This leads to misconfigured or over-privileged cloud privileges for accounts lacking MFA, stale accounts, etc. Too much privilege leads to higher IT workload, risk of breach, data loss, and ransomware. Join us to see how Delinea helps you – continuously monitor and discover across multi-cloud frameworks to control your cloud infrastructure​
Achieve Least Standing Privileges with Just-in-time Privilege Elevation​
  • Tues: 2:30 – 3:00pm
  • Wed: 11:30 – 12:00pm, 3:30 – 4:00pm
Unlock the power of Just-in-time and just enough privilege for server security in this enlightening presentation. We'll dive into the critical importance of implementing least privilege through privilege control on servers, a cornerstone for safeguarding your organization's most vital assets. Discover how enforcing access rights not only minimizes the attack surface but also significantly reduces the risk of internal and external threats. Through practical insights and best practices, learn how to effectively manage privilege controls to ensure your servers are secure, compliant, and resilient against today's sophisticated cyber threats. ​
Mitigate Ransomware Attacks with PAM​
  • Tues: 11:00 – 11:30am, 3:30 – 4:00pm
  • Wed: 2:00 – 2:30pm
  • Thurs: 12;30 – 1:00pm
Cyber criminals have shifted their tactics, emphasizing data exfiltration alongside traditional encryption payloads. Rather than solely encrypting data, they strategically extract sensitive information. The battle against ransomware now demands a comprehensive and multi-layered defense strategy. Organizations need to adopt proactive measures to detect, mitigate, and prevent ransomware attacks. Join us to gain insights into how to empower your organizations to make informed choices in your own security program to address the shifting ransomware landscape. ​
Risks from Over-Privileged Users on Workstations​
  • Tues: 1:00 – 1:30pm
  • Wed: 12:30 – 1:00pm
Explore the significant security risks posed by over-privileged users on workstations, including increased vulnerability to breaches and non-compliance issues. We will discuss implementing the principle of least privilege, automating privilege management, and monitoring privileged activities as key strategies for mitigating these risks. The session includes a practical demonstration of Delinea's solutions for effective privileged access management, demonstrating how organizations can enhance their security framework against overprivileged user threats.​
Discover Identity Threats & Risks​
  • Tues: 11:30 – 12:00pm, 4:00 – 4:30pm
  • Wed: 2:30 – 3:00pm
  • Thurs: 1:00 – 1:30pm
The rise of cloud, particularly cloud service providers like Google, AWS and Azure have changed the IT and security landscape. But they have left dangerous consequences many tools are ill equipped to handle. Network monitoring, application and endpoint protection are all increasingly less effective in this new paradigm, because in our "everything as a service" environment, we lack the tools to gain visibilty across our IaaS, SaaS and IdP platforms. This leads to over privileged  and non-used accounts sitting there waiting to be taken over. Join us to learn how you can better protect your organization with Identity threat detection and response (ITDR)​
How Can Organizations Manage the Growing
Complexity of Identities, Data, and Applications?
  • Tues: 12:00 – 12:30pm, 4:30 – 5:00pm
  • Wed: 1:00 – 1:30pm, 4:00 – 4:30pm
  • Thurs: 10:30 – 11:00am
As organizations navigate the proliferation of identities, applications, and data, they encounter complex security challenges that compromise their security posture. This presentation will discuss how poor identity lifecycle management (ILM) practices and lack of governance can expose organizations to risks. We will explore strategic approaches to managing the identity lifecycle and access with a risk-based approach. Highlighting the benefits of an identity-centric approach, we will demonstrate how automation and continuous monitoring can bolster security across an organization's digital landscape.

On-Demand Session

Join Delinea’s session on Risks of Identity and Credential-based Cyberattacks – Securing Digital Identities. With Joseph Carson. Learn about the intricacies of identity based cyber threats, exploring real-world examples and illustrating the potential consequences for businesses. From phishing attacks to credential stuffing and insider threats, we'll provide a comprehensive overview of the evolving threat landscape including top tips on how to protect identities.


Blog: RSA Conference: 5 top sessions to attend

RSA Conference 2024 is coming soon, and this year’s theme is The Art of Possible.

Cybersecurity is always evolving, and the need to stay ahead means staying innovative and creative, which links to this year’s theme. It's all about working together, collaborating, and using our wisdom to achieve the impossible.

The RSA Conference takes place at the usual location in the Moscone Center, San Francisco, between May 6th and May 9th. Around 45,000 attend the RSA Conference each year to connect, learn, network, share knowledge and new experiences, and discover ways to become more resilient to ever-increasing cyberattacks.

To make your RSA Conference journey a successful one, here are some tips and a few highly recommended sessions that you must not miss.