Archived Event

This event period has closed. The content on this page is meant for reference or informational purposes only. To view upcoming events, visit our Events page.

RSA Conference

May 6 - 9, 2024 | San Francisco, CA

In-person

RSAC 2024

Join CISA at RSAC 2024!

CISA is exhibiting and speaking at the annual RSA Conference (RSAC) on May 6-9, 2024, in San Francisco, CA. This four-day event will feature speakers from CISA, government and industry partners, and presentations and technology demonstrations from across CISA’s portfolio. The conference will feature RSAC Sandbox, startup technology demonstrations focused on Cybersecurity, and the Expo Hall. The event will also include expert panel discussions and breakout sessions. RSAC will be located at the Moscone Center, 747 Howard Street, San Francisco, CA 94103.

This year's theme “The Art of Possible” focuses on staying ahead of today’s threats and foreseeing tomorrow’s challenges requires trusting our intuition and collaborative experiences. Embracing the power of community ignites our drive and imagination, making the impossible seem more possible. In a way, we are all artists, creating works that will bring us all closer together to shape a more secure world.

What to Expect

Expo Hours

  • Monday, May 6, 2024 5:30 PM - 7:00 PM PT

  • Tuesday, May 7, 2024 10:00 AM - 6:00 PM PT

  • Wednesday, May 8, 2024 10:00 AM - 6:00 PM PT

  • Thursday, May 9, 2024 10:00 AM - 2:00 PM PT

Exhibition Location

We are conveniently located in the Moscone Center, South Expo Hall at exhibit space number 1235.

Featured Sessions

View All Sessions

A World On Fire: Playing Defense in a Digitized World... and Winning

The CISA Director and her predecessor discuss what keeps them up at night and what's needed to stay resilient in today's wide world of cyber.

Ending the Game of Telephone: The Future of Cyber Incident Reporting

Join leaders from CISA, the US House of Representatives and CrowdStrike, for a discussion on the impact of reporting cyber incidents, the recent reporting regulation & why it matters.

National Cyber Strategy, Roadmap for a Secure Cyber Future: Year in Review

Join this discussion of fundamental shifts shaping USG partnerships, regulations, and technologies and hear lessons learned, obstacles, pivots, and innovations that lay ahead.

Apocalypse Avoided: The Future According to the Four Horsemen of Cyber

The Four Horsemen reunite publicly for the first time in 15 years to reflect on the evolution of cyber, today’s threats, and how to safeguard the nation in cyberspace.

View All Sessions

Resources

Secure Our World

Secure Our World

Secure Our World is a cybersecurity awareness program aimed at educating individuals and businesses on four easy ways to stay safe online. 

Text of Secure by Design on grid background in a colorful isometric design

Secure by Design

It’s time to build cybersecurity into the design and manufacture of technology products. Find out here what it means to be secure by design and secure by default.

An image saying What's Your Emotion?

Cybersecurity Emotions

At CISA, our commitment to cybersecurity isn't just about technology; it's about the human experience.

Shields Up text on red background

Shields Up

CISA stands ready to help organizations prepare for, respond to, and mitigate the impact of cyberattacks.

3D image of microchip on glowing, digital, blue, circuit board

Artificial Intelligence

CISA will play a key role in addressing and managing risks at the nexus of AI, cybersecurity, and critical infrastructure.

CISA employees smiling while working on laptops in a bright conference room

Work at CISA

We're always searching for diverse, talented, and highly motivated professionals to continue our mission. Learn more about our hiring opportunities. 

Peoples Republic of China CYber Threat

People's Republic of China

Information and guidance to defend against Chinese State-Sponsored cybersecurity risks.

Joint Cyber Defense Collaborative

Joint Cyber Defense Collaborative

CISA established the JCDC to unify cyber defenders from organizations worldwide. 

An illustration of an email sending

Contact Us

For more information on or questions about CISA, email Central@cisa.dhs.gov.

All CISA Speakers

CISA logo

Alejandro Mayorkas

A portrait of Director Jen Easterly

Jen Easterly

Alaina Clark

Alaina Clark

Lisa Einstein

Lisa Einstein

Andrew Scott

Andrew Scott

Monday, May 6

Monday
May 6
-
In 1996, Aleph One wrote “Smashing the Stack for Fun and Profit,” warning us that memory-unsafe code could lead to system compromise. Since then, memory-unsafe code has become a top cause of CVEs. This session will discuss the history of this problem, its real-world consequences, why it’s not widely discussed, and some mitigations all software developers and their bosses should understand.

Location

Moscone West - 3002

Speakers

Monday
May 6
-
The CSA AI Summit focuses on the intersection of AI and Cloud to deliver critical tools and best practices necessary to meet the rapidly evolving demands of the most consequential technology ever introduced: Artificial Intelligence. This is the don’t miss event that brings together influential AI and cloud providers, security experts, and innovators to help navigate these unprecedented challenges. This content is brought to you by Cloud Security Alliance. Open to all pass types. Attendees selecting this seminar will have their contact details shared with Cloud Security Alliance.

Location

Moscone South - 303

Speakers

CISA logo

Caleb Sima

Lisa Einstein

Lisa Einstein

Monday
May 6
-
Volt Typhoon, Chinese cyber actors, hide in plain sight on US networks using living-off-the-land techniques. This panel, consisting of representatives from the FBI, NSA, CISA, and Microsoft, will explore how the private sector and US government works together to identify this threat activity, lessons learned from Volt Typhoon’s TTPs, and how network defenders can best defend themselves.

Location

Moscone West - 2001

Speakers

Andrew Scott

Andrew Scott

CISA logo

Sherrod DeGrippo

Moderators

Tuesday, May 7

Tuesday
May 7
-
AI may well be the most consequential technology of our time, with power to innovate and reshape how nations are secured and communities are protected. This fireside chat will explore how the DHS embraces the responsibility to ensure that AI is developed and adopted in a way that realizes its full potential while protecting the public from any harm its irresponsible or adversarial use might cause.

Location

Moscone South - Keynotes - 203

Speakers

CISA logo

Rumman Chowdhury

CISA logo

Alejandro Mayorkas

Tuesday
May 7
-
With seemingly every corner of the Earth caught up in some geopolitical conflict, and cyber increasingly an aspect of our adversaries' attack doctrine, America's businesses are now on the frontlines of every flareup. The CISA Director and her predecessor discuss what keeps them up at night and what's needed to stay resilient in today's wide world of cyber.

Location

Moscone South - Keynotes - 203

Speakers

A portrait of Director Jen Easterly

Jen Easterly

CISA logo

Chris Krebs

Tuesday
May 7
-
TECH TALK: SBOM

Location

CISA Exhibit Space 1235

Speakers

Tuesday
May 7
-
TECH TALK: SBOMs in the Wild: Real World Examples

Location

CISA Exhibit Space 1235

Speakers

CISA logo

Marc Frankel