{"id":9759,"date":"2019-02-20T12:17:00","date_gmt":"2019-02-20T19:17:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/rsa-conference-2019-best-sessions-for-secops\/"},"modified":"2023-03-14T13:01:46","modified_gmt":"2023-03-14T19:01:46","slug":"2019%eb%85%84-rsa-%ec%bb%a8%ed%8d%bc%eb%9f%b0%ec%8a%a4-%eb%b3%b4%ec%95%88-%ec%9a%b4%ec%98%81-%eb%b6%84%ec%95%bc-%ec%b5%9c%ea%b3%a0%ec%9d%98-%ec%84%b8%ec%85%98","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/","title":{"rendered":"RSA \ucee8\ud37c\ub7f0\uc2a4 2019: SecOps\ub97c \uc704\ud55c \ucd5c\uace0\uc758 \uc138\uc158"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Rows of empty auditorium chairs fading into darkness, creating an eerie and unsettling atmosphere of isolation and silence.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1-300x200.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1-768x512.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2019-02-20T12:17:00-07:00\">2\uc6d4 20, 2019<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">RSA Conference 2019: Best sessions for SecOps<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Nick_Tausek\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Nick_Tausek.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tNick Tausek\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('RSA%20Conference%202019%3A%20Best%20sessions%20for%20SecOps').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Frsa-conference-2019-best-sessions-for-secops%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=RSA%20Conference%202019%3A%20Best%20sessions%20for%20SecOps&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Frsa-conference-2019-best-sessions-for-secops%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Frsa-conference-2019-best-sessions-for-secops%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Frsa-conference-2019-best-sessions-for-secops%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>&nbsp;<\/h2>\n<p>The upcoming RSA Conference 2019 offers an enormous variety of subjects and speakers to choose from, ranging from the legal implications of GDPR to how nation-state actors are using cyptocurrency to advance their goals. But in all of this variety, which sessions are best for improving your security posture and security operations (SecOps) strategy?<\/p>\n<p>We&#8217;ve read through the sessions list and selected eight sessions (with our own commentary) that promise to offer valuable insight into cloud security, automation and attack surface reduction\u2014three very pertinent topics in today&#8217;s security operations landscape.<\/p>\n<ol>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/17265-The-Trust-Landscape\" target=\"_blank\" rel=\"noopener\">The Trust Landscape<\/a> <br>Tuesday, March 5 | 8:10 &#8211; 8:35 a.m.<\/strong><br>With both human and informational trust violations being a crucial component of the attack strategy of major adversaries and petty cybercriminals alike, the responsibility to refine, improve and safeguard informational trust relationships falls to the security community\u2014both to defend against these trust violations and to influence policy, development and architecture\u2014to minimize risk.<\/li>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/15886-A-Cloud-Security-Architecture-Workshop\" target=\"_blank\" rel=\"noopener\">A Cloud Security Architecture Workshop<\/a> <br>Tuesday, March 5 | 1:00 &#8211; 1:50 p.m.<\/strong><br>The cloud-heavy security landscape is which we work is vastly different from the security landscape even ten years ago. In a world of cloud-based services\u2014vendors, hosting, backups and malware\u2014understanding the fundamentals and practicalities of cloud-based secure infrastructure design is useful for the people architecting the systems and also for analysts and incident responders to further understand established attack patterns, hypothesize potential attacks, and defend proactively.<\/li>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/16908-Using-Automation-to-Help-Achieve-Security-in-a-Multicloud-Environment\" target=\"_blank\" rel=\"noopener\">Using Automation to Help Achieve Security in a Multicloud Environment<\/a> <br>Tuesday, March 5 | 2:20 &#8211; 3:10 p.m.<\/strong><br>Cloud-based infrastructure has allowed for a high degree of interconnectivity and functionality. It has also added complexity, as well as introducing challenges related to disparate cloud platforms, disparate APIs\/remote services and disparate approaches to security based on the differing visions of different vendors. Automation is a valuable tool to manage both the complexity of cloud-based environments and to scale as the number of relevant logs and information being gathered about these environments invariably increases.<\/li>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/15067-Doing-Security-Orchestration,-Automation-and-Response-before-It-Was-Born\" target=\"_blank\" rel=\"noopener\">Doing Security Orchestration, Automation and Response before it was Born<\/a> <br>Wednesday, March 6 | 8:00 &#8211; 8:50 a.m.<\/strong><br>Aflac realized early on that automation was an effective strategy to combat the evolving threat landscape and the speed of modern attacks. It should prove to be an interesting case study in homebrew SOAR while providing perspective from a large company that has been using automation longer than most.<\/li>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/17295-A-View-from-the-Front-Lines-of-Cybersecurity\" target=\"_blank\" rel=\"noopener\">A View from the Front Lines of Cybersecurity<\/a> <br>Wednesday, March 6 | 4:00 &#8211; 4:25 p.m.<\/strong><br>Being caught up on the latest threats is good. Being aware of the threat trends likely to play a role in future attacks is better. The threat landscape is far from static, and preparing for the attacks of the future by adopting good, awareness-based policy and strategy is key to keeping up with the modern attacker.<\/li>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/17299-Three-Things-the-Security-Industry-Isn%E2%80%99t-Talking-About-but-Should-Be\" target=\"_blank\" rel=\"noopener\">Three Things the Security Industry isn&#8217;t Talking about (but should be)<\/a> <br>Thursday, March 7 | 4:00 &#8211; 4:25 p.m.<\/strong><br>In too many environments, there is an abundance of tools, solutions, effort, time and money devoted to detecting and responding to threats. Almost none of those resources are devoted to actively minimizing the attack surface for understandable reasons: It can be difficult with so many systems running so many types of software connected to the Internet, it requires intimate knowledge of the organization&#8217;s information security architecture and posture, and making systems or services harder to access in any way often steps on someone&#8217;s toes. Despite these challenges, the attack surface should be an integral component of every organization&#8217;s security posture.<\/li>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/15317-Introduction-to-Defending-the-Enterprise-Using-Automated-SecOps\" target=\"_blank\" rel=\"noopener\">Introduction to Defending the Enterprise Using Automated SecOps<\/a> <br>Friday, March 8, 9:50 &#8211; 10:40 a.m.<\/strong><br>This session should be a valuable resource for any organization who is considering SOAR as a solution or for any organization that wants to get more from its existing SOAR solution. It is important to understand what is practical to automate and what is not in order to determine if SOAR is right for your organization\u2014or spark new ways you can use your existing SOAR solution.<\/li>\n<li><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/17263-Engineering-Trust-and-Security-in-the-Cloud-Era,-Based-on-Early-Lessons\" target=\"_blank\" rel=\"noopener\">Engineering Trust and Security in the Cloud Era, Based on Early Lessons<\/a> <br>Friday, March 8 | 11:10 a.m. &#8211; 12:00 p.m.<\/strong><br>Just like <a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/17265-The-Trust-Landscape\" target=\"_blank\" rel=\"noopener\">&#8220;The Trust Landscape,&#8221;<\/a> this session promises to offer insight into the modern digital trust relationships that are an integral part of the current cloud landscape. The panel format may also provide differing perspectives on the likely futures of these trust relationships.<\/li>\n<\/ol>\n\n\n\n<div class=\"bs-div bs-div-f36ec4471f59deaf6a8fef040acd5a0b5b03f4c3 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-f36ec4471f59deaf6a8fef040acd5a0b5b03f4c3 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \">\n<div class=\"bs-div bs-div-6579231807f77384e51d7afce73810a09bb43077 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"has-white-color has-text-color wp-block-heading\" id=\"h-hey-alexa-schedule-my-swimlane-demo\">Hey Alexa, schedule my Swimlane demo.<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Remember to visit us while you&#8217;re at RSA 2019! From March 4-8, 2019 in booth #567 at the Moscone Center in San Francisco, we will demo the newest version of Swimlane\u2019s SOAR platform, including new and improved features specifically designed to meet the needs for any organization and its unique use cases. <\/p>\n\n\n\n<p class=\"has-white-color has-text-color\"><strong>Schedule your live demo now, and receive a $10 Amazon gift card!<\/strong><br><\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-6769006d59f6dba6d3a0a14fda8ce2cb0086320c\"><style>.bs-pro-button-p-btn-6769006d59f6dba6d3a0a14fda8ce2cb0086320c .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Schedule Your Demo Now<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69df39e5c9a7b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/black-hat-2019-best-sessions-for-secops\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\uc6d4 25, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Black Hat 2019: Best sessions for SecOps<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69df39e5cad9d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/what-to-expect-at-rsa-conference-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>2\uc6d4 28, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What to expect at RSA Conference 2019<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69df39e5cbbad bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/protest-rsa-conference-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3\uc6d4 5, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane makes a splash at RSA Conference 2019<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":22,"featured_media":9760,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[68,70],"class_list":["post-9759","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-news-and-events","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>RSA Conference 2019: Best sessions for SecOps Teams<\/title>\n<meta name=\"description\" content=\"We&#039;ve read through the RSA 2019 sessions list and selected eight sessions (with our own commentary) that promise to offer valuable insight for SecOps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/2019\ub144-rsa-\ucee8\ud37c\ub7f0\uc2a4-\ubcf4\uc548-\uc6b4\uc601-\ubd84\uc57c-\ucd5c\uace0\uc758-\uc138\uc158\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSA Conference 2019: Best sessions for SecOps\" \/>\n<meta property=\"og:description\" content=\"We&#039;ve read through the RSA 2019 sessions list and selected eight sessions (with our own commentary) that promise to offer valuable insight for SecOps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/2019\ub144-rsa-\ucee8\ud37c\ub7f0\uc2a4-\ubcf4\uc548-\uc6b4\uc601-\ubd84\uc57c-\ucd5c\uace0\uc758-\uc138\uc158\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T19:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/\",\"name\":\"RSA Conference 2019: Best sessions for SecOps Teams\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png\",\"datePublished\":\"2019-02-20T19:17:00+00:00\",\"dateModified\":\"2023-03-14T19:01:46+00:00\",\"description\":\"We've read through the RSA 2019 sessions list and selected eight sessions (with our own commentary) that promise to offer valuable insight for SecOps.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png\",\"width\":800,\"height\":533,\"caption\":\"Rows of empty auditorium chairs fading into darkness, creating an eerie and unsettling atmosphere of isolation and silence.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RSA Conference 2019: Best sessions for SecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"RSA \ucee8\ud37c\ub7f0\uc2a4 2019: \ubcf4\uc548 \uc6b4\uc601\ud300\uc744 \uc704\ud55c \ucd5c\uace0\uc758 \uc138\uc158","description":"RSA 2019 \uc138\uc158 \ubaa9\ub85d\uc744 \uac80\ud1a0\ud55c \uacb0\uacfc, SecOps\uc5d0 \uc720\uc6a9\ud55c \ud1b5\ucc30\ub825\uc744 \uc81c\uacf5\ud560 \uac83\uc73c\ub85c \uae30\ub300\ub418\ub294 8\uac1c\uc758 \uc138\uc158\uc744 (\uc800\ud76c\uc758 \uc758\uacac\uc744 \ub367\ubd99\uc5ec) \uc120\uc815\ud588\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/2019\ub144-rsa-\ucee8\ud37c\ub7f0\uc2a4-\ubcf4\uc548-\uc6b4\uc601-\ubd84\uc57c-\ucd5c\uace0\uc758-\uc138\uc158\/","og_locale":"ko_KR","og_type":"article","og_title":"RSA Conference 2019: Best sessions for SecOps","og_description":"We've read through the RSA 2019 sessions list and selected eight sessions (with our own commentary) that promise to offer valuable insight for SecOps.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/2019\ub144-rsa-\ucee8\ud37c\ub7f0\uc2a4-\ubcf4\uc548-\uc6b4\uc601-\ubd84\uc57c-\ucd5c\uace0\uc758-\uc138\uc158\/","og_site_name":"AI Security Automation","article_modified_time":"2023-03-14T19:01:46+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/","url":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/","name":"RSA \ucee8\ud37c\ub7f0\uc2a4 2019: \ubcf4\uc548 \uc6b4\uc601\ud300\uc744 \uc704\ud55c \ucd5c\uace0\uc758 \uc138\uc158","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png","datePublished":"2019-02-20T19:17:00+00:00","dateModified":"2023-03-14T19:01:46+00:00","description":"RSA 2019 \uc138\uc158 \ubaa9\ub85d\uc744 \uac80\ud1a0\ud55c \uacb0\uacfc, SecOps\uc5d0 \uc720\uc6a9\ud55c \ud1b5\ucc30\ub825\uc744 \uc81c\uacf5\ud560 \uac83\uc73c\ub85c \uae30\ub300\ub418\ub294 8\uac1c\uc758 \uc138\uc158\uc744 (\uc800\ud76c\uc758 \uc758\uacac\uc744 \ub367\ubd99\uc5ec) \uc120\uc815\ud588\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Best-RSA-2019-sessions-for-SecOps-1.png","width":800,"height":533,"caption":"Rows of empty auditorium chairs fading into darkness, creating an eerie and unsettling atmosphere of isolation and silence."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/rsa-conference-2019-best-sessions-for-secops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"RSA Conference 2019: Best sessions for SecOps"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/22"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9759\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9760"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9759"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9759"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9759"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9759"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9759"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}