Attending RSA®C 2020 as a Security Scholar

What is a Security Scholar?

With Cecilia Murtagh Marinier, RSA Conference Program Director, Innovation and Scholars
With Cecilia Murtagh Marinier, RSA® Conference Program Director, Innovation and Scholars

Building Bikes for Charity

Completing one of many ice breaker challenges to build bikes for charity
Completing one of many ice breaker challenges to build bikes for charity

Attending the Opening Keynote as VIP

RSA®C 2020 Opening Keynote with George Takei in YouTube

“Every mind in this room works in its own unique way. Like fingerprints, no two brains are the same. Each thought is informed by your genetic disposition, and your environment, life experiences, race, gender, age, beliefs, brain chemistry. This exquisite diversity enables us to handle problems that might perplex us if we faced them alone.”

Reality Check: The Story of Cybersecurity.

Talk by the Numbers:

“We need to rethink our culture and shift from a culture of elitism to a culture of inclusion. Expanding our talent pool, filling the talent gap, however you look at it, requires finding defenders outside the tech community. Let’s stop being STEM snobs.”

Lunch with Industry Partners

RSA®C Security Scholar’s Lunch with Industry Partners
RSA®C Security Scholar’s Lunch with Industry Partners

Dinner with Industry Leaders

  • Arthur W. Coviello, Jr., Executive Chairman (retired), RSA, The Security Division of Dell Technologies (EMC)
  • Adam Ely, Vice President and Deputy Chief Information Security Officer, Walmart
  • Alyssa Miller, Application Security Advocate, Snyk, Ltd.
With top industry leaders Adam Ely (second left to right) and Alyssa Miller (fourth right to left)
With top industry leaders Adam Ely (second left to right) and Alyssa Miller (fourth right to left)
RSAC Security Scholar’s Dinner with Top Industry Leaders
RSA®C Security Scholar’s Dinner with Top Industry Leaders

Keynotes, Sessions, Labs

The Sandbox

I was able to exploit hardware devices (D-Link router and Wemo Smart Light) at the IoT Hacking 101 village station in The Sandbox

Main Takeaways from the Conference

  • Everything comes down to Humans
  • Embrace your uniqueness
  • Let’s stop being STEM snobs; talent is everywhere
  • Collaboration
  • Educating the users
  • Making it easier for others to practice Cybersecurity
  • Vulnerabilities are tied to risk
    (Risk = ease of exploitation + impact to system)
  • Most attacks are financially motivated

--

--

--

Lifelong learner, technology & soccer lover. Oh, and I run.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Application That Made The Internet Is Now It’s Greatest Flaw

Busting 5 Myths About SOC 2 Compliance (Part 5 of 6)

Kava StakeDrop Tutorial: How KAVA Holders Can Participate in Persistence’s StakeDrop

Tales of a Florida Boy: Alleged Twitter hacker’s arrest and not guilty plea

Protection Of Data: The Oasis Paradigm

How To Secure Your Web Application

Alibaba Cloud Offers a Security Emergency Response Plan for Global Bank Websites Targeted by…

Airdrop Alert: Airdrop of 100,000,000 QYU tokens Total Reward: $42,000,000 worth of QYU

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Paola Garcia

Paola Garcia

Lifelong learner, technology & soccer lover. Oh, and I run.

More from Medium

What Do I Do Now?

What is Burpsuit and its uses?

Security Awareness Training

The Dirty Pipe Vulnerability On Linux

Linux Dirty Pipe Vulnerability CVE-2022–0847