Skip Navigation
Get a Demo
 

Let's meet at RSAC 2023

Reserve a meeting with your friends at Red Canary and learn how we stop threats so you can focus on your mission.

APRIL 24-27, 2023 | SAN FRANCISCO

 
 
 

Take home Red Canary gear

Stop by and say hello and we’ll give you a limited-edition Red Canary shirt—among other surprises. Not registered yet? Use code 52EREDCANXP when you sign up to get a complimentary expo pass.

Register & plan your visit
 

Red Canary Events at RSA

Join us throughout the week to learn how Red Canary helps organizations prevent, detect and respond to cybersecurity threats.

[Schedule coming soon]

Red Canary Events at RSA

Join us throughout the week to learn how Red Canary helps organizations prevent, detect and respond to cybersecurity threats.

[Schedule coming soon]

Real World Stories of the Incident Response and Threat Intelligence (Katie Nickels)

Wednesday, Apr. 26, 2023 9:40 AM – 10:30 AM PT | Moscone South – South Stage Keynote

Incident responders and threat intelligence analysts will pit their skills directly against threat actors for control of networks. In this session, three leading figures in the incident response and threat intelligence industry share their experiences from responding to incidents in the last 12 months.

The Five most Dangerous New Attack Techniques (Katie Nickels)

Wednesday, April 26 | 3:55 PM – 4:40 PM PT | Moscone West Street Level

Each year at RSA Conference, SANS provides the authoritative briefing on the most dangerous new attack techniques in use today, what’s coming next, and what organizations can do to prepare. This session gives organizations a chance to prioritize upcoming attack vectors and to get ahead of them.

Adversary Emulation: How ! Stopped Being Polite and Got REal Results (Adam Mashinchi, Brian Donohue)

Thursday, Apr. 27, 2023 10:50 AM – 11:40 AM PT | Location To Be Announced

Adversary emulation is a go-to testing approach. By acting like real adversaries, red teams can provide effective testing for threats detection. But there’s a problem—this isn’t happening in practice. Using data from real intrusions, this talk will show how differently testers and real adversaries behave, with examples of different techniques, procedures, and tools used by testers and adversaries.

 
 
Back to Top