Richmond, VA

June 2nd - 3rd, 2016

RVA5ec Layout


Wondering where things are for RVAsec in the VCU University Student Commons? Look no further!

  • Registration is outside the Commonwealth Ballroom
  • Talks are in Commonwealth Ballroom & Richmond Salons
  • Vendors & food are in the Virginia Rooms
  • Capture the Flag (CTF) is in the James River Terrace
  • Badges from HackRVA are in the James River Terrace


Click the map below for a larger version.


VCU Commons Floor Map

Virginia Commonwealth University Campus
University Student Commons, 2nd floor
907 Floyd Avenue, Richmond, VA 23284

Main Street Parking Deck
801 West Main Street, Richmond, VA 23284

Click here for more info

RVA5ec Sold Out – Waiting List and Ticket Transfers

We have had a lot of emails coming in from people hoping to get tickets to RVA5ec.  While we are pleased that we are sold out, unfortunately we are at capacity at this point.

If you are still interested in attending please email us and we will add you to the waitlist.   Please note that you will most likely not be able to get a bag/shirt and will not get a hackable badge.

Also, if for some reason you are not able to attend RVA5ec last minute, please note that there are quite a few people that are already on the wait list.  You can email us to let us know (while we can’t provide refunds this late) as we might be able help someone else attend.  Also, it is possible to transfer your ticket.

Ticket Transfers
Log in to your Eventbrite account and go to My Tickets (you may need to create an account using the email address you registered).

You can then view your Current Orders (select RVAsec), and “Edit details” for the ticket. Changing the “Contact Information” will update the name of the person registered to check in at the conference. You can also change the questions asked at registration, which will help us plan for parking, catering and other items.

No refunds for the conference will be issued after May 10th.


Keynote Feature: Wendy Nather

@RCISCwendyWendy Nather

Retail Cyber Intelligence Sharing Center (R-CISC)
Wendy Nather is Research Director at the Retail Cyber Intelligence Sharing Center (R-CISC), where she is responsible for advancing the state of resources and knowledge to help organizations defend their infrastructure from attackers. She was previously Research Director of the Information Security Practice at independent analyst firm 451 Research, covering the security industry in areas such as application security, threat intelligence, security services, and other emerging technologies.

Wendy has served as a CISO in both the private and public sectors. She led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), as well as for the Texas Education Agency. She speaks regularly in locations around the world on topics ranging from threat intelligence to identity and access management, risk analysis, incident response, data security, and societal and privacy issues. Wendy is co-author of The Cloud Security Rules, and was listed as one of SC Magazine’s Women in IT Security “Power Players” in 2014. She is an advisory board member for the RSA Conference, and serves on the board of directors for Securing Change, an organization that helps provide free security services to nonprofit groups. She is based in Austin, Texas.

We Need to Talk…

How do you move threat intelligence sharing from Gossip to Grownup? It takes more than technology: it takes social engineering on a massive scale. Wendy Nather will talk about the process of standing up a new ISAC, the barriers to intel exchange, the Wacky Races of platform and feed providers, and the role government has to play (spoiler: it’s not what you think). The future of threat intelligence is going to be fewer steak dinners and pew-pew maps; it’s going to look more like the Neighborhood Watch on social media. Grab a cup of coffee and let’s meet at the firewall.

Register for RVAsec NOW!

RVA5ec After Party–Register Now!


after-party---Anomali_Logo_BlackBlue-RGB-transThe RVAsec after party hosted by Anomali and GuidePoint Security will be at District 5 on Thursday, June 2nd, following the conference. It’s just a few blocks from VCU, so head over after the conference for some cocktails and food!
after-party - GPSLogoNoTagLine-trans

Note that wrist-bands will be required for access to the room & bar, which can be retrieved at the door or at RVA5ec through one of the Anomali or GuidePoint representatives. You must pre-register or register on site.

District 5

1911 W Main St.
Richmond, VA 23220

Click here to register!

Speaker Feature: Andrea Matwyshyn


Dr. Andrea M. Matwyshyn is a legal academic studying technology innovation and its policy implications, particularly corporate information security regulation and consumer privacy. She is currently a (tenured full) professor of law/professor of computer science (by courtesy) at Northeastern University, a faculty affiliate of the Center for Internet and Society at Stanford Law School, and a visiting research collaborator at the Center for Information Technology Policy at Princeton University, where she was the Microsoft Visiting Professor during 2014-15. In 2014, Professor Matwyshyn served as the Senior Policy Advisor and Academic in Residence at the U.S. Federal Trade Commission. She has testified in Congress on issues of technology innovation and information security regulation and is a US-UK Fulbright Commission Cyber Security Scholar award recipient in 2016-2017.


This talk challenges the underlying assumptions of the “cyber” or “cybersecurity” legal and policy conversation. It argues that the two dominant paradigms – information sharing and deterrence – reflect last century’s policy approaches that channel our security energies in misguided directions: in their current form, they will neither thwart technology-mediated attacks on our national security nor meaningfully bolster consumer protection. Drawing insights from the work of seminal philosopher of science Michael Polanyi, this talk first identifies four analytical flaws that plague the legal and policy analysis of information security. It then offers a new policy paradigm – reciprocal security inducement. Reciprocal security inducement reframes the legal and policy security conversation around two key elements: information vigilance infrastructure and defense primacy. The talk concludes with a list of concrete legal and policy suggestions reflecting the reciprocal security inducement paradigm.* *This talk contains bacon.

Come see me at RVAsec 2016! Register now.


Silver Sponsor Feature: Risk Based Security


Risk Based Security

Through the use of interactive dashboards and data analytics, Risk Based Security provides unparalleled risk identification and security management tools that leverage our data breach and vulnerability intelligence. Our blend of dedicated research, technical expertise, data breach analytics, vulnerability intelligence, combined with real world management experience enables us to provide our clients with meaningful and cost effective security solutions.

Risk Based Security is honored to serve the vulnerability and cyber risk intelligence needs of organizations both large and small, across a broad array of industries. Our clients include insurance companies and brokers, manufacturers, banks and credit unions, drug companies, health care providers, life sciences and other technology service providers.

Come see us at RVAsec 2016! Register Now.