Please take a few minutes to give us your feedback on everything you enjoyed about RSA Charge 2019. We will use your responses to make our next event even better.

Question Title

* 1. Your contact information (optional if you would prefer to provide anonymous feedback - enter "Anon" in the name field)

Question Title

* 3. Please rate your overall experience of RSA Charge 2019. (1 the lowest and 10 the highest)

1 10
Clear
i We adjusted the number you entered based on the slider’s scale.

Question Title

* 4. Did the event meet your expectations?

Question Title

* 5. What attracted you to most to attend RSA Charge 2019? 

Question Title

* 6. Please rate the conference registration & payment process. (1 the lowest and 10 the highest)

1 10
Clear
i We adjusted the number you entered based on the slider’s scale.

Question Title

* 7. Please rate the availability of RSA staff to speak with you during the event.

Question Title

* 8. Please rate the RSA Charge Partner Showcase.

Question Title

* 9. Please rate the RSA Charge Welcome Reception at the Walt Disney Dolphin Resort Pool. (1 the lowest and 10 the highest)

1 10
Clear
i We adjusted the number you entered based on the slider’s scale.

Question Title

* 10. Please rate the RSA Charge "After Hours" party at the Walt Disney Dolphin Resort Beach. (1 the lowest and 10 the highest)

1 10
Clear
i We adjusted the number you entered based on the slider’s scale.

Question Title

* 11. Please rate the RSA Charge "Be Our Guest" Dinner and desserts & fireworks at Epcot. (1 the lowest and 10 the highest)

1 10
Clear
i We adjusted the number you entered based on the slider’s scale.

Question Title

* 12. Please rate the RSA Charge Customer Appreciation Event at Animal Kingdom. (1 the lowest and 10 the highest)

1 10
Clear
i We adjusted the number you entered based on the slider’s scale.

Question Title

* 13. Please rate your experience at the Walt Disney Dolphin and Swan Resort.

Question Title

* 14. Please rate the Keynotes delivered by the following presenters:

  Poor Fair Good Very Good  Excellent N/A
Welcome and The New Why  - Rohit Ghai, President, RSA 
Risk & Reward in the Digital Era - Grant Geyer, SVP Product, RSA;
Inventing the Future of Digital Risk Management - Dr. Zulfikar Ramzan, CTO, RSA
Customer Panel: Digital Transformation and the Changing Nature of Risk - Moderated by Holly Rollo, SVP Digital Transformation & CMO
Guest speaker - Srinath Sampath, Gartner Analyst
Welcome to Digiville: Navigating Risk in the Digital World - Steve Schlarman, Director, Product Marketing and DRM Strategist, RSA
Digitally Transforming the Customer Experience - Doug Howard, Vice President, RSA Global Services, RSA

Question Title

* 15. Please rate the individual Evolving Third Party Risk for the Digital Transformation Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
 Leveraging Cybersecurity Ratings in your Third-Party GRC Program to Get Better Risk Outcomes: A Practical Healtcare Case Study
Managing Third Party Access Made Easy: Bok Financial Case Study
Extreme Makeover: Third Party Risk Edition
 Expert Panel: Got Third-Party Risk?
Don't Ask, Evidence
Building a Mature Third Party Risk Management Program Through Automation, Efficiencies and Monitoring
Manage Third-Party Risk with Visibility, Insight and Action
Realizing the Strategic Value of Good Third-Party Risk Management - A Comprehensive Approach
Protecting Zelle Transactions with RSA Adaptive Authentication
Vendor Risk Management About-Face
Calling All Suppliers: T-Mobile’s Third-Party Evolution

Question Title

* 16. Please rate the individual Beyond the Checkbox: Modernizing Compliance Programs Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
Managing Fraud Risks From Digital Transformation
Driving Risk Management Maturity Through Automation and Integration
Powering Compliance in the Big Apple - A Ultility's Journey (ConEdison) to Change its Compliance Culture
Show and Share with Highmark Health: RSA Archer Policy Content Management
Deploying RSA Archer In a Mature Cybersecurity and Privacy Environment
Turkcell Case Study: Security Governance Compliance
Duke Energy Case Study: Avoid Compliance Testing Fatigue through Strategic Automation
Uniting Audit, Compliance, and Analysis with RSA Archer and RSA NetWitness in a Digital World
Raiffeisen Bank International Case Study: Challenges and Tool for Internal Control System (ICS) Framework
Straight Talk on Implementing RSA Archer for Financial Institution Governance
Beyond Basics: From Simple Compliance Programs to a Risk Based Approach
Lowering the Cost of Compliance Through the Better Use of Data

Question Title

* 17. Please rate the individual Business Resiliency for the Always On Enterprise Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
How to Ensure a Robust RSA Archer Environment that is 'Always On'
Integration of Everbridge and RSA Archer… it’s Totally Possible, We Promise
Fight Like You Train: Arm Your Team for Battle with Effective Tabletop Exercises
Operationalizing Your RSA Archer at Scale
Digital Risk Index: Tackling Digital Risk Together
Risks Lurking in the Shadows of Digital Transformation
RSA Archer Alignment of Continuity and Disaster Recovery
Anatomy of a Data Breach: What You Say (or Don’t Say) Can Hurt You
The Current State of Digital Risk

Question Title

* 18. Please rate the individual Managing Operational Risk for Impact Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
Risky Business: From Appetite to RCSA in RSA Archer
Dynamic Risk Assessment: RSA Archer
Successfully Implementing and Managing Issues Management Across an Integrated Enterprise
Case Study: Recharging Your GRC Program
DigitalUtilizing RSA Archer for Risk Control Self-Assessment
Risky Business: Engaging Owners by Driving Accountability through Enterprise Issues Management
The Evolution of the Risk Register: Makeover Edition
Balancing Fraud Risks, Consumer Experience, Revenues and Operational Costs
Rio Tinto’s Journey Towards Integrated Enterprise Wide Management of Risk
Integrated Operational Risk Management: A Coordinated and Holistic Approach to Viewing Risk and Making Informed Decisions, and a Key Pre-Requisite for Adapting to the Digital Transformation Era
ORM, from a Regulatory Requirement to a Value Added Change Factor Governing Non-Financial Risk Management
Cool Story, Bro! How Our Development Process Strives To Improve Efficiencies

Question Title

* 19. Please rate the individual Managing Risk in the Dynamic Workforce Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
Panel Discussion: The Future of Managing Workforce Transformation Risk
Evolve Risk Management with User Risk Analytics
Maximize End User Adoption with Creative Training and Marketing Strategies
Workforce Optimization: A Tale from the Trenches
The Human Firewall: Tips for Securing the Weakest Link in the Chain

Question Title

* 20. Please rate the individual Performance Optimization: RSA Product Learning Lab Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
Get Your Day Job Back – Automate User Account Management
Less is More – Use Less Data Feeds and Get Better Performance Using New RSA Archer Feature
Hello, World! API Advanced Lab
Advanced Workflow: You Asked, We Delivered...In the Lab!
Make Your Digital Dream a Reality: Leveraging Identity Tools to Drive Innovation While Managing Risk
Threat Aware Authentication: Using the RSA NetWitness Platform to step-up RSA SecurID Authentication
Automation to the Rescue: NASA Case Study
Regulatory Content Analysis: A Hands-On Introduction
Advanced Workflow: You Asked, We Delivered...In the Lab!
Securing Office 365 the Easy Way With RSA SecurID Access
Hands On Threat Hunting Competition: Help Save Mickey!

Question Title

* 21. Please rate the individual RSA University Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
Leveraging the RSA Product Suite: How RSA  NetWitness, RSA Archer, RSA SecurID, and RSA Fraud & Risk Intelligence Can be Used Together
RSA Archer Advanced Workflow Features: Getting the Most Out of New Advanced Workflow Functionality
RSA Archer - LDAP/SSO Demonstration and RSA University Open Forum
Services Panel – RSA NetWitness Focus
The End-User Experience: How to Guide End-Users Through an Evolving RSA Archer Interface
Services Panel: Identity Focus
Services Panel: RSA Archer Advanced Workflow Focus
Services Panel: RSA Archer Access Control Focus
Services Panel: RSA Archer Data Feed Manager Focus
Services Panel: RSA Archer Infrastructure Focus
How-to: Industry and NIST Collaboration: Cybersecurity Maturity, Risk Reduction, and Architecture

Question Title

* 22. Please rate the individual Technical Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
You Asked, We Delivered. More Advanced Workflow Enhancements
Up Around the Bend: Unlocking the Power of Calculated Cross-References
Omni Channel Fraud Protection
Ameriprise Case Study: Rising to the Challenge of Database Account Loading
Through the Looking Glass with Data Gateway: Seamless Integration of External Data
Getting to Grips with RSA Archer JavaScript Transporter
Job done! Automated Testing in RSA Archer
Small But Mighty: Administering RSA Archer Without a Massive Team
Modernized Reporting with RSA Archer 6.6
The Easy Button: Managing Users and Roles Through RSA Archer APIs
Finding the Unknown - Threat Hunting @Work by RSA IR
RSA Archer Ask the Admin Panel

Question Title

* 23. Please rate the individual Transformation Cyber Threat Detection & Response Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
DevSecOps and RSA Archer: Customers First
Don’t Acquire a Breach: Assessing Digital Risk & Cybersecurity Before, During & After an M&A Transaction
Behind the Breach
Automate Security Analytics with RSA NetWitness
Growing RSA Archer: How St. Luke's Health System Customized and Cultivated to Maximize our RSA Archer Yield
Operationalizing Incident Response
Threat Hunting in a Massive Network: Make it Hard to Hide
Protecting the Enterprise: Enabling Cyber Integration and Compliance Control Frameworks through RSA Archer
Log Anything: Keeping you Ahead of the Expanding Attack Surface
3 Types of UEBA models for any Security Use Case
Enrich your Authentication Decisions with Threat-Aware Authentication

Question Title

* 24. Please rate the individual View from the Clouds: Securing IaaS/SaaS Transformation Track breakout sessions (If you did not attend, please select N/A.)

  Poor Fair Good Very Good  Excellent N/A
Castles in the Cloud: the Good, the Bad, and the Ugly of Cloud Security
Emerging Fraud Threats
RSA Cloud Authentication and Key Bank – A Success story
Preparing for Your RSA Archer “Journey to the Cloud”
Leverage DevOps Methodologies to Become More Resilient and Mitigate Risk Using the Global Cloud

Question Title

* 25. Please list any keynote/breakout sessions presenters or topics you would like to suggest for future events.

Question Title

* 26. What did you like best at RSA Charge 2019? 

Question Title

* 27. What did you like least at RSA Charge 2019?

Question Title

* 28. Woud you reccomend a colleague to attend RSA Charge 2020? 

T