Why attend?
RSA Conference is taking place April 28 – May 1 at the Moscone Center in San Francisco. As a driving force behind the world’s cybersecurity agenda, you’ll want to be a part of this forum for innovation and partnership.
Connect with us at booth #6163 in the North Expo. Our team of experts will walk you through our comprehensive approach to assisting organizations of all sizes worldwide in securing business infrastructure from the core to edge.
Register for a free expo pass with code 54SVERIZONXP, or $150 off a full conference pass with code 52FCDVERIZON.
Explore our solutions at North Expo Booth #6163
Moscone Center
747 Howard Street
San Francisco, CA 94103
Know the social engineering tactics
Social engineering attacks are on the rise, and generative AI can make them even harder to identify. Verizon Business can help you address security gaps with our five-part defense plan that includes:
- Mobility security policy
- Awareness training
- Security protection controls
- Detection and incident response
- Ongoing testing and reporting
Fortify your network infrastructure
Network as a Service (NaaS) from Verizon Business can strengthen your network infrastructure by securing a mix of virtual and on-site assets making it more adaptive—and protected with:
- Zero Trust Dynamic Access
- Virtual Network Services
- Secure Access Service Edge (SASE Management)
- Trusted Connection
Understand and quantify your risks
Verizon Business understands the complexity of today’s security threats and can help protect your network and applications, assess risk, enforce policies and help keep your data safe whether your employees are working in the office or remotely with:
- Cyber Risk Programs
- Cyber Risk Quantification
- Rapid Response Retainer
- Managed Detection and Response
Help protect and secure your voice traffic
Our Voice Security solutions protect your inbound and outbound call traffic against robocalls, malicious calls, fraud and spoofing to help restore brand trust so your calls get answered with:
- SecureLogix Call Security solution
- SecureLogix Authentication solution
- SecureLogix Reputation Defense
- VoIP Inbound Anti-Fraud and Authentication
- Branded Calling
- Voice Security Assessment
Attend our speaking sessions.
Thought leadership sessions
Actionable Insights from the 2025 Verizon Data Breach Investigations Report
Wednesday, April 30, 2:25 PM
The DBIR aims to provide security professionals with an in-depth analysis of data-driven, real-world instances of cybercrime and how cyberattacks play out across organizations of different sizes as well as from different verticals and disparate geographic locations. Join Christopher Novak and Alex Pinto as they discuss how the landscape has evolved, the rapid pace of change of the GenAI threat, and considerations about 3rd party and supply chain security.
Hello It’s Me, I’m the User: DBIR Insights on the Use of Stolen Credentials
Thursday, May 1, 1:30 PM
Out of the breach corpus found in the DBIR, stolen credentials account for more than 30% of the breaches. However, there is much more that underlies this number, such as where are these credentials coming from, how attackers use them and, most importantly, how can organizations protect themselves. Join DBIR author Phil Langlois as he examines the ecosystem of stolen credentials.
In-booth theater sessions
Stop by North Expo Booth #6163 to catch our informative sessions on challenges CISOs are facing today:
- Trust No One: Building Resilient Security with ZTNA
- 2025 Data Breach Investigations Report Key Findings
- Securing the IoT Frontier
- Beyond the Breach: Strategic Cyber Investment in the Age of AI
- Reduce Risk for Senior Leaders with Executive Identity Protection
- Boost Cybersecurity Readiness with Purple Team Exercises
- Phishing: Don’t Take the Bait! Verizon Best Practices for Cybersecurity Awareness
Enhance security for your attack surface
Improve your security operations with a comprehensive and proven portfolio of managed and professional security services and solutions. Verizon Business helps make it easier by working with you to identify your vulnerabilities and design a cybersecurity strategy that can help address them. Our cybersecurity expertise extends to seamlessly integrating security programs across your enterprise, from your network’s core to devices at the edge.