Back in the mid-1990’s, I sent a couple of technical papers to the RSA Data Security Conference, and they were both rejected. More recently, I’ve given a few speeches at the same conference, albeit at successively larger versions of the event, and my speeches have been downright weird. I’m not sure why, but something about that conference brings out the unusual in me. Maybe I’ve been trying too hard. Or maybe it’s jet lag. I honestly don't know.
In 2012, for example, I worked with my good friend Jon Jandoli to create the cool illusion that during my talk, someone was hacking my PowerPoint charts live. I thought the concept was incredibly amazing, and I spent so much time working the images with Jon, that I totally forgot to create a technical talk. Attendees seemed confused. Here’s the link: http://techchannel.att.com/embed/index.cfm?mediaID=10988&w=560&h=315. I re-watched it this morning and loved it all over again.
For this year’s conference, I’ve been invited to speak in the Strategy Track on Tuesday, February 14th at 3:45PM. My talk is called "Toward Distributed and Virtualized Enterprise Security." It covers the technical troubles with perimeter and offers my proposed plan for distributing and virtualizing the enterprise. You might have seen an earlier version of this talk over the past decade, because I’ve been doing something unconventional: I keep trying to improve the same talk. It makes for some repetition, but I think it is quite good now, and I think you should see it.
One thing I could not resist is that I include some controversial comments on email servers and the US State Department. I know a thing or two about both topics, and had some direct experience working information security issues in that agency on Foggy Bottom several years ago. And while I offer my comments in the spirit of helping to advance the state of the art in security architectures, the reality is that a percentage of you will probably want to strangle me after my talk. I hope you resist the urge.
See you in San Francisco next week.