Highwire’s Official Black Hat 2017 Recap

After some time to reflect, here’s our recap of Black Hat 2017 in Las Vegas.

For two decades, the annual conference has been creating opportunities for like-minded security researchers, influencers and hackers to mix and mingle. Talented practitioners across the globe flock to Black Hat, jumping at the chance to show off their latest findings, research and hacking techniques. For this community, it’s all about street cred, and Black Hat prides itself as being the premier stage for the best and the brightest. This year proved no differently, and members from Highwire PR’s security practice had a front row seat on all the action. Here are the takeaways:

Black Hat is Evolving

In the world of cybersecurity, insight is key and, at times, absolutely critical. Navigating this dark and interconnected web is complicated, and for vendors working to develop the latest and greatest in threat protection, Black Hat certainly fits the bill. Highwire saw an increase in client presence beyond the typical, passive 20×20 booth set-up. Instead, our clients were actively looking to advance their knowledge, specialize their technique and better understand what their customers are facing. Black Hat has evolved into the catalyst for that learning. And the awareness is growing. Although hacker attendees still reign during this week, we’ve seen more and more clients’ C-Suite inquiring in curious and positive ways about the conference as a strategic investment.

WannaCry is Still Making Us…well, Wanna Cry

Rubbing elbows with more than 15,000 security professionals gave the Highwire team perspective into some of the year’s more notable cybersecurity breaches. We heard first-hand what attendees thought of the infamous “WannaCry” ransomware attack. Almost 50-percent of people we spoke to felt as though this particular headliner was the “most over-hyped security breach” over the past year. Interestingly enough however, a near identical percentage (46.8) felt as though WannaCry was the most serious breach over the past year.

These numbers left us wondering: How can a cyberattack so severe be considered overhyped at the same time? Perhaps this points to tensions between media and security researchers. While the damage may have been a serious one (WannaCry impacted over 230,000 computers across 150 countries), researchers could be concerned about about how the attack was portrayed from a technical perspective by the media. Those of us closely following that particular cycle will remember how important it was to sort through over-hyped speculations vs. actual facts.

Let’s Get Together

On the media front, we kept our spokespeople busy, whether it was an exchange with NBC’s Alyssa Newcomb on election hacking or a video Q&A on application security with CSO’s Fahmida Rashid. In total, our agency secured more than 80 media briefings for our clients, fostering new and existing relationships and giving them a platform to share their story. While Highwire we build relationships via phone and email for our clients, there really is not substitute for actual, 1:1 facetime with a journalist.

All in all, Black Hat was an important investment for us and our clients, and we’re already kicking things into gear for the next big show…which is RSA 2018 in 244 days. But hey, who’s counting?

Decoding Black Hat and DEF CON: A Visual Guide

Hackers descend on Las Vegas this month for Black Hat (July 22-27 at Mandalay Bay) and DEF CON (July 27-30 at Caesars Palace). Both events are opportunities to discuss the latest and greatest in IT security – whether it’s a new vulnerability discovered by threat researchers, or demoing a real-world hack, the Black Hat conference is gaining widespread popularity for today’s hacker.

The conference presents an opportunity for IT security pros looking for ways to protect their networks and gear, software and solutions vendors offering approaches to address security challenges, organizations recruiting talent, and reporters covering the scene, to all come together in one place.

The intensity of the discussions, the intent to recruit, and the concentration of security pros and researchers sharing best practices spotlights widespread networking activities. Often the trickiest part of the week is finding a quiet place to talk. Needless to say, there is a lot going on — thankfully, Highwire PR’s IT security practice offers a visual guide to the week, pointing out especially attractive networking venues, conference-organized activities and other promising social events.

 

Blackhat infographic map July 18 revised

 

It’s no surprise that security venues such as Black Hat, DEF CON, Security BSides and the RSA Conference (which took place earlier this year) continue to attract record numbers of attendees. Organizations and consumers are eager to learn about how to protect themselves and their peers given the seemingly endless inundation of IT attacks and data breaches.

Several Highwire PR members will be on site in Las Vegas during the week of Black Hat and DEF CON — supporting our clients and mingling with the press, all while keeping an ear to the ground on breaking news. Interested in our take on this year’s 2017 Black Hat and DEF CON – let us know!

Three Tips for Effective Industry Analyst Relations

While communications strategies have changed dramatically over the years, industry analysts remain an important part of a technology company’s marketing mix. Analysts provide a third-party view of a company’s innovation and approach to their respective market. Since they are close to technology buyers, they understand how vendor marketing messages will resonate with buyers. Highwire PR offers advice on the very latest technology analyst relations best practices, based on our work for clients and a conversation with Beth Hespe, Corporate Communications Manager at Ixia, a seasoned pro with her hands in both AR and PR.

Consider the Full Analyst World

When the topic of analyst relations comes up in conversations, the first names mentioned are always Gartner and Forrester. Both of these firms can be considered industry behemoths as they undoubtedly have the greatest mindshare across nearly every vertical. Businesses end-user organizations leverage these firms for their unmatched industry visibility and deep-rooted strategic market understanding. Gartner analysts alone take up to 250,000 client inquiries every year.

A contract buys you direct feedback on customer pain points and product needs and have an analyst as your advocate to recommend your product to potential buyers. As it relates to overall market understanding, Gartner’s annual Magic Quadrant Report and Forrester’s annual Wave Report are touted as industry gold standards. Finding your way into the correct quadrant of one of these reports can do wonders for your business.

At the same time, while Gartner and IDC both can provide a significant amount of value to organizations, they should only be part of a company’s analyst relations mix. Before solidifying marketing budgets, startups and established companies alike should consider additional firms, many with specific industry expertise, that can help guide their marketing efforts.

IDC is unique in providing market sizing data. 451 Group and Enterprise Strategy Group are known for investigating the intersection of different emerging technology areas. Within security, market-specific firms such as Securosis have their pulse on the specific needs of IT security buyers. Seemingly obvious but often forgotten, the benefits of smaller firms are more direct access to the analysts for inquiry calls, and — what we consider to be the biggest value add — media influencer and PR support. Analysts are often willing to provide a quote for a press release or speak to the media about the benefits of your new product release. It’s not uncommon to see them quoted in trade press.

Don’t Forget the Basics

Beth Hespe at Ixia notes a few important best practices for ongoing analyst relations programs:

  • Planning & Coordination – Build in the time to target and secure your analysts, brief them and work with them. And make sure they’re available – nothing is worse than having your analyst on vacation during your launch and unavailable for interviews.
  • Leverage Your Efficiencies – Leverage efficiencies by scheduling campaigns in conjunction with a high profile industry event when target media, analysts and potential customers are in one place and at one time.
  • Consider Providing Customer Access – Consider customers and whether they’re available. Getting your customers together with your analysts and then as press references can provide extra validation that your campaign needs.

Marry AR, PR and Marketing

Hespe also notes how an analyst relations program can impact PR and marketing, and she challenges herself to find ways to integrate the efforts, leveraging analysts for more than just their traditionally thought of services. She uses them for quotes, supporting documents like white papers and blogs, events such as webinars and roundtables, large-scale surveys, and social support such as Twitter Q&A’s or videos. While some of these can be a substantial investment, you can leverage one analyst or firm to bundle your packages and ultimately save money.

At most organizations, those managing analyst relations and public relations often find themselves working under the same larger marketing umbrella; however, there are instances when these two teams operate in silos, with little contact. As the media landscape evolves, journalists’ and analysts’ roles increasingly meld together and the need for PR and AR to work in tandem becomes imperative. Especially as analysts roles morph into what can be considered “journ-analysts”(a type of influencer) who share their own opinions over Twitter or contribute articles to media outlets on a regular basis.

A truly successful marketing and communications program will bring forth strategic elements from both traditional PR and AR initiatives. If you’re not sure where to start, your PR firm often has insight and past experience to guide you.

Join Us for Our Third Annual RSA Happy Hour and Christian Science Monitor’s Passcode Security Podcast

Mix and Mingle with Peers or Watch Live Panel Interviews with Security Luminaries

Cybersecurity has broken out of its shell and has hit center stage. Everyone is now aware of how important a matter it has become. Not only was it a major point of contention in recent political events, but it’s also become a threat to the internet’s viability. A successful attack can have wide-reaching and lasting real-world implications.

In this light, one of the biggest congregations of the top players in security will take place next week at this year’s RSA Conference. Industry luminaries will come together in San Francisco and discuss some of the hottest topics in the industry. We can expect this year to have some memorable moments.

For our own part, Highwire is hosting its third annual RSA Conference happy hour but this time with a twist. This year we are combining forces with Christian Science Monitor’s security vertical Passcode, as Sean Sposito, assistant director of content strategy, discusses hot-button items with some of our security clients. Particularly, there will be three sessions spanning the evening:

unnamed (3)

Panel Topic: Securing the Digital Enterprise

Date/Time: Wednesday, February 15 at 5:15 p.m. PST

Location: Natoma Cabana; 90 Natoma Street, San Francisco, CA (two blocks from the Moscone Center)

Panel Participant: Sumedh Thakar, chief product officer at Qualys

Livestream: https://www.youtube.com/watch?v=2IuPX5fBqjE

 

Panel Topic: Why are we Still Not Secure

Date/Time:  Wednesday, February 15 at 6:00 p.m. PST

Location: Natoma Cabana; 90 Natoma Street, San Francisco, CA (two blocks from the Moscone Center)

Panel Participants:

  • Jesse McKenna, director of product management at vArmour
  • Bil Harmer, senior director, officer of the CISO at Zscaler
  • Justin Fier, Director for Cyber Intelligence and Analysis at Darktrace

Livestream: https://www.youtube.com/watch?v=2IuPX5fBqjE

 

Panel Topic: The Professionalization of Ransomware

Date/Time:  Wednesday, February 15 at 6:35 p.m. PST

Location: Natoma Cabana; 90 Natoma Street, San Francisco, CA (two blocks from the Moscone Center)

Panel Participants:

  • Ziv Mador, VP of security research at Trustwave
  • Chris Wysopal, CTO and co-founder of Veracode
  • Jeremiah Grossman, Chief of Security Strategy at SentinelOne

Livestream: https://www.youtube.com/watch?v=2IuPX5fBqjE

 

 

Map Your RSA Conference Week

IT security is an industry based on electronics. Bits and bytes. Wires and routers.  Software code and containers. However, for one week each year, the thought leaders within this business existing “in the ether” congregate and concentrate within a few square miles in San Francisco.

The event that brings them together, RSA Conference, will be held just a few weeks from now. RSA is big. By its own estimates, the conference attracted 40,000 attendees in 2016. That’s the number of CISOs, CIOs, IT security pros, reporters, vendors, interested bystanders, and—yes—PR pros who registered for a badge to enter the Moscone Center during the event.

With that many IT security-minded people in a small area, a series of other events stake out ground near Moscone during the week, enticing those with their own programming. Some have become traditions—everyone knows about the Securosis Recovery Breakfast on Thursday morning, for example.

Your friends at Highwire PR have put together a map of the various events taking place during the week of RSA. Some are instructional, some are celebratory, and some are meant to be cocktail-laden. Per our map below, RSA is not one event, but rather at least 13. Feel free to let us know if we’ve missed one of your favorite events in the comments below. 

HWPR_RSA_EventLocations_infographic_R5

Also, make sure to stop by Highwire PR’s event too. It’s a reception on Wednesday, February 15, from 5 – 8:00 p.m. at Natoma Cabana, 90 Natoma Street. Our event is participatory; CSM Passcode, a key industry publication, will be on hand to host a podcast recording with several IT security leaders.

During the week, it will be hard to miss members of our IT security team across the show floor, as we staff meetings and drive PR efforts for our clients. See you there! 

Client Experts on the Future of Security

IoT, AI, Offense and (Cyber)Insurance

We are in the midst of a thrilling time in which many of our technological aspirations, from autonomous cars to highly advanced computing devices that fit comfortably in our pockets, are a practical reality. But along with the enhanced capabilities offered to businesses and individuals, comes increased risk.

For instance, IoT technology has helped create devices reminiscent of HAL 9000—but, much like the film character, it can be subject to major flaws. Fortunately, direct physical harm hasn’t been caused yet, but 2017 will surely be the year that cybersecurity stops being a news novelty to becomes a well-understood norm by all. The year to come is the year “cybersecurity” becomes just “security,” for even those outside the industry.

Taking from our all-star security client lineup, here’s what our experts are expecting in the year to come.

 

Affecting Trust

The savviest attackers are moving away from just data theft to targeting data integrity. Longer standing, reputational damage is becoming more common, especially in cases where the involvement of a nation-state is suspected. We’ve already seen these kinds of attacks in M&A scenarios with the Yahoo breaches and during the presidential election.

This kind of attack will continue to gain traction, especially within industries that rely on public confidence like medical facilities and financial institutions. Governments may also fall victim to attacks to spur on distrust in national institutions and processes (e.g. alleged Russian involvement in the presidential election).

Cyber Insurance Matures

Amid the slew of unmanageable threats, organizations will likely continue to increasingly take advantage of cybersecurity insurance. As the underwriting market responds, we can expect the due diligence requirements for underwriting to bolster greater spending on security controls. As such, we can expect security product purchasing decisions to be driven by cyber-insurance companies.

Expect cyber-insurance organizations to develop short lists of vendors and products that must be deployed to be compliant for insurance. CSO/CISOs will be asked by CFOs for these products and purchases may be directed top down if they’re lacking. We can also expect more vendors to offer guarantees and/or their own insurance offerings.

 

Finally Sifting Through Troves of Data

Machine learning and AI have recently come to the forefront across industries for good reason. Human’s cannot parse and make sense of all the data being generated today. Human’s simply can’t scale, work as long or be as detailed oriented like a well crafted and intelligent program, so expect further investments in neural networks and smart technology.

A caveat is that machine learning and AI will also be used for nefarious purposes. Hackers often mimic the same models as their targets for unlawful tools and distribution, often protected by the anonymity of the dark web. Just like machine learning algorithms sift through threat alerts, criminals will start using it to parse the troves of data they steal. Moreover, smart strains for malware (e.g polymorphic and metamorphic) have already entered the scene, capable of intelligently evading detection and even changing is composition to do so.

What do you think we have in store for the year to come?

If you’d like to here more from our experts, join us at Highwire’s third annual RSA Happy Hour—this time in conjunction with the Christian Science Monitor’s security vertical, Passcode, which will conducting live podcast interviews with some our experts.

 

Highwire Talks Security with Black Hat Communications Director

Blackhat 2016 event logo

 

One of the biggest global security events in the world, Black Hat has been providing attendees with the latest in research for over 18 years. Participants can enjoy learning from information security luminaries about various developments and trends in the industry. As you think about how to present new or interesting perspective this year, take a look at our survey findings from last year’s Black Hat, particularly the part about overused buzzwords, as you may want to eliminate some of the most commonly used jargon from your content.

With the event fast approaching on July 30, Highwire took the opportunity to speak with Meredith Corley, director of PR & communications for UBM—the company that puts on Black Hat every year—to gain some insider knowledge that will prove useful for PR professionals and security companies.

Q: What is the number one strategy you can offer companies as they prepare to pitch media at Black Hat?

A: Remember that these members of the media and analyst community are the crème de la crème of the InfoSec reporting world—so do your research! And I don’t just mean on their specific beat, that’s a given. My research advice is the following:

1) Pitch the Goods: With so much dynamic content on stage, running alongside big research report releases and innovative product launches from the show floor (all vying for their attention & time slots), now is not the time to do a generic email blast. Before you work to set up that briefing or meetup, ask yourself: How does this news break the mold, challenge the status quo or take our industry in a new direction? With a product launch, how specifically will your new product or service solve an existing problem or void? Any cool demos to share? Alternatively how will your perspective help dig into an existing industry hot button issue or theme with a fresh (or challenging) perspective? Are you offering up special access to key thought leaders or research? Is there a new finding that will change the course of the current dialogue?

If you can’t answer these with an elevator pitch before pressing ‘send’ on that email, hold off. Media get a ton of email leading up to the show, so make it count.

2) Expand Your International Contacts: Does your company have international roots or hope to take their products and services global? Don’t forget to research the many international members of the media that join us onsite every year. We have massive news agencies, trade journals and analysts join us from as far as Australia,  many parts of Asia, Europe, S. America and everywhere in between. Now is your chance to build those valuable relationships with key international stakeholders for your brand all in one place. Don’t miss out.

Q: How do you select which companies get their own mini press conferences in the Black Hat press room?

A: We work closely with the Black Hat Review Board and journalist community to get a sense of what is really going to be “hot” onsite—big themes, impactful vulnerability disclosures, big name speakers or government officials, and controversial topics discussed by distinguished resources.

Press conferences are highly selective and are typically reserved for Black Hat speakers that will be presenting during the show. Sometimes we will group them by theme (e.g. “mobile vulnerabilities”) while other times it will be a solo session (e.g. keynote presentation or completely unique topic that stands apart from the rest).

If your company or client is speaking at Black Hat this year and you think the topic fits the bill, drop us a note: BlackHatPR@ubm.com.

Q: What do you think the top trends will be at this year’s show based on what you’re seeing across the top sessions and/or media requests?

A: Aside from the headline-making and completely unique vulnerabilities and research (a lá car hacks, new ways to take over ATMs, and medical device weaknesses and defense), I would say that one of the top trends this year is what we collectively call “Platform Security.” We also saw more submissions than ever around vulnerabilities (and defenses) in top operating systems and virtual machines.

Unsurprisingly, Internet of Things (IoT) is also a big theme again this year as everything we know becomes increasingly “smart.”

Also, talks this year really run the gamut—and they should, since we received more submissions this year than any year prior. The Review Board really had their work cut out for them to pick the best of the best. There are quite a few great enterprise system-related briefings, some really smart research across all things mobile, and even a whole track of talks in the “human factors” category, which covers everything from phishing to the actual success rates of malicious actors dropping USBs in parking lots to name a few.

Q: Anything new or different taking place at the show this year that we should know about?

A: Glad you asked—Yes!

New to Black Hat? If you, your team members or your client(s) are newbies to Black Hat, we’ve got you covered. ALL pass types are invited to join us for Black Hat Day Zero —a first-timer’s guide to making the most of Black Hat. Here, new attendees can come a day early (Tuesday, Aug. 2) to learn what to expect on site, how to make the most of their time and even how to keep their devices safe on the show network. (Don’t forget your tinfoil hat…) There will be a welcome reception for some good mingling after the sessions.

Closing the Gap: Despite more attention to the issue, the needle just hasn’t moved all that much on the dramatic underrepresentation of women and minorities in the security industry, even as the talent gap deepens. I would encourage you and your colleagues to check out this fantastic panel, “Removing Roadblocks to Diversity,” on Thursday, Aug. 4, with a pretty stellar lineup. It includes moderator Kelly Jackson Higgins, executive editor of Dark Reading, with Jamesha Fisher, security operations engineer at GitHub; Elena Kvochko, head of global cyber security strategy and implementation at Barclays; Angie Leifson, security operations center (SOC) analyst at Insight Enterprises; and Chenxi Wang, chief strategy officer of Twistlock.

**Tip: this is first-come, first-served—so get there a little early to reserve a seat.

Other neat new and exciting things on site include a hands-on Kali Linux Lab for ALL pass types on Thursday, Aug. 4. And I’d highly recommend checking out the Black Hat Arsenal if you’re looking for real-time demos—this year marks the largest tool lineup yet with 80 to be presented on site.

Meredith Corley is the director, PR and communications, at UBM Americas. Find her on Twitter @MeredithCorley or LinkedIn.

Highwire Hackers at RSA 2016: Insights from the Floor

Highwire recently surveyed RSA 2016 attendees to get the scoop on the biggest issues facing cyber security today. Check out our findings and infographic highlighting key trends below. 

Earlier this month, cybersecurity experts, journalists and Highwire’s dynamic roster of security clients gathered in San Francisco for the year’s largest cybersecurity conference, RSA 2016. The conference floor was buzzing with talk of the latest security products, breaches and partnerships, conversations around machine learning, connected cars, artificial intelligence, and much more – but the hottest topic of debate? The Apple vs. FBI encryption debate and whether security companies should – or shouldn’t – work with the government.

Highwire’s security team was on-site, surveying over 100 attendees. Here’s what we learned:

Early-Stage Startups: If You Can’t Beat ‘Em, Join ‘Em

Both the public and private security markets remain in flux as stocks continue to dive and private companies begin considering other options as they postpone IPOs. As Reuters recently reported, 2016 has been off to a slow start for tech IPOs and startups are facing a bit of a funding drought, forcing many to cut back on spending or start thinking about exit strategies.

Cybersecurity pros expect this trend to continue – 34 percent of respondents claimed today’s market is making it harder for companies to go public. However, 42 percent of RSA attendees expect the slow market to lead to increased M&A activity. With IPO out of the picture (for now), late-stage startups may be forced to recognize other options, and it may be more difficult for early-stage startups to get seed and Series A financing.

Emerging Threat Vector: Reckless Employees

The skills shortage in the cybersecurity industry was also a trending topic at RSA this year. The lack of qualified professionals has created an entirely different type of security vulnerability: understaffed and overtaxed security teams. As a result, some IT teams may be deprioritizing security training, leaving employees unaware of certain security protocols, thus putting the larger organization at risk.

According to the survey, 25 percent of respondents named careless employees as the biggest threat to their organizations’ security. While often not malicious, careless employees who don’t follow security policies – either because they haven’t been trained properly, or because they choose to circumvent them – can be an unexpected, but costly, threat to an organization’s overall security posture.

Security Pros Just Want Everybody to Get Along

The Apple vs. FBI encryption debate was the hottest topic at RSA this year (37 percent of respondents listed it as the most top-of-mind topic) and many conference sessions featured perspectives from both parties. While Apple and the FBI battle it out in court, a majority (67 percent) of respondents on the show floor reported wanting public and private companies to work collaboratively with the U.S. government.

Buzz Off, Next-Generation Security Product

If there’s one thing Silicon Valley has in abundance, it’s buzzwords. We discussed this quite a bit with the security reporters in attendance – not every product can be “disruptive” or a “game-changer.” Looks like it’s time for security communications teams to hit the thesaurus, as over half (57 percent) of respondents listed “next-generation” as their most-hated buzzword.

See our full results below, and we’ll see you next at Black Hat 2016!

HWPR_RSA_infographic_R4-01 (1)

Special thanks to Chicago Account Associate Brenna Hogan for her help as co-author. Brenna has experience working with a diverse roster of clients in mobile app security and managed security services. Prior to joining Highwire, Brenna graduated from Loyola University Chicago with a bachelor’s degree in Communication Studies. 

RSA Preview: In 2016, Security Policy is Front & Center

Next week, much of the security industry will again converge in Highwire PR’s hometown of San Francisco for the 2016 RSA Conference. With our security practice constantly adding new clients and welcoming new faces, RSA is an exciting time for all of us.

11159457_10152768333602116_1266236881653969431_nLast year, security entered national consciousness on a new level. This year, it has entered the stratosphere, with debates such as the need for consumer privacy versus national security reaching a fever pitch due to the role encryption has played in high profile cases like the attacks in Paris and San Bernardino. The convergence among the worlds of lawmaking, politics and cybersecurity is reflected in two of the biggest names on this year’s agenda, keynote speakers Attorney General Loretta Lynch and White House Cybersecurity Coordinator Michael Daniel.

With five full days of programming, here’s a sample of key themes, important sessions and other things to anticipate at this year’s conference, courtesy of a few folks in our security practice:

  • Bill Bode, Account Director, San Francisco: The talk I am looking forward to most is the keynote, from United States Attorney General Loretta Lynch. Why? In the wake of Apple’s move to publicly defy the FBI by refusing to allow backdoor entry into a cell phone involved in a major investigation, US cyber policy will be at the forefront of conversation, a topic Lynch will surely address. The Attorney General’s talk should stimulate a thoughtful (and possibly heated) discussion highlighting the differing opinions between what the government and Silicon Valley thinks could be the future of fighting cyber crime- or a dangerous new precedent.
  • Lindsay Bubbico Ciulla, Account Director, New York: I’m looking forward to seeing what comes out of a panel discussion on “Roles of Industry and Government in Cyber-Incident Responses.” Given the election year and the increasing role of security in our everyday lives, I think it’ll be especially interesting to hear from the panel on the role of government and industry during a major security event.
  • 10444656_10152768332977116_647562636317943578_nMegan Grasty, Senior Account Executive, San Francisco: I’m amazed at the continued implications surrounding our connected world. Also at the lack of understanding around the need for security in everything that is connected to the Internetfrom smart toys to planes to cars. I’m looking forward to attending “Our Brave New Connected World: Is it Already Too Late?” to hear experts discuss the security challenges associated with the connected world.

And, of course, we’re excited to see the epic parties and stunts that punctuate the show!

Beyond our Natoma Cabana San Francisco 03party on Tuesday night, we wouldn’t miss vArmour’s Monday night punk rock throw down, ForeScout’s Wednesday night bash featuring one of the world’s Top 5 DJs, Trusona’s VIP launch party at Mourad or Veracode’s annual gathering at Ruby Skye. What are you most excited to see? Share your hot topics and party tips in the comments below. See you there!

You’re Invited: Highwire’s Second Annual RSA Happy Hour

Join the #HighwireHackers for cocktails, tacos and the smartest minds in cybersecurity

In a little less than a week, the world’s largest collection of CISOs, hackers, cyber policy makers and journalists will once again descend upon San Francisco to discuss the state of cybersecurity across the globe for the 2016 RSA Security Conference.

As such, Highwire’s bustling security practice will be bringing back what is quickly becoming one of our favorite annual traditions: the annual Highwire RSA Happy Hour. And you’re invited! To register, you simply need to code a new program that will pass our security-centric Turing Test, here.

Just kidding. To get on our attendee list just email us at HighwireSecurity@HighwirePR.com, or swing by Natoma Cabana on Tuesday, March 1 from 5:30-8:30 p.m. PT. Party details are below, we’ll see you there!

What: Highwire’s Second Annual RSA Happy Hour

Where: Natoma Cabana; 90 Natoma Street, San Francisco, CA (just two blocks from the RSA action at Moscone)

When: Tuesday, March 1 from 5:30- 8:30 p.m. PT

Who: Cyber thought leaders from the world’s most disruptive security companies, security journalists, Highwire Hackers, hipster barkeeps with delicious cocktails, mexican food thought leaders from the world’s most disruptive taco truck.

Why: You’ll hear about the latest trends in cyber and network with some of the biggest influencers in the space. Oh yeah, there’s an open bar.