1. Maximize the Opportunity
“The show can be overwhelming, so I would say spend some time planning your visit to ensure you are educated on the topics that are of interest to you. Be sure to take advantage of meeting with people who are usually difficult to schedule, use any opportunities to meet outside of the show floor in a relaxed space, network at the parties, and have fun!” –Dave Humphreys, Regional VP of Business Development
2. Remember Why You’re Here
“Learn about how to eliminate the single biggest threat on the internet: the continued use of passwords. While AI, ML, Blockchain, IoT, etc. may all be very exciting, authenticating someone accurately is the foundation of trust on the internet. RSA will feature many vendors (including StrongKey) who are part of the FIDO Alliance and are tackling this problem head-on. After the conference, learn more at privacyrights.org.” –Arshad Noor, CTO
3. Allot Time for the Expo Floor
“RSA is a big show, so develop a plan to allow time to juggle between attending sessions and walking the expo floor. There are about 700 exhibitors showcasing pretty interesting technology, so make sure you allot enough time to see it all. Lastly, if you’re interested in specific products or vendors, make sure that you visit them first.” –Pushkar Marathe, Engineering Team Lead
4. Follow the Hashtags
“Following conference hashtags on social media is a great way to stay up-to-date during a big event. The best ones to follow are: #RSAC, #RSAC2020, and #RSAconference2020. It’s helpful to get an overview of a session you weren’t able to make and kind of allows you to be in more than one place at a time. How is that for a conference hack?“ –Jessica Anderson, Business Development Representative
5. Find the Balance
“It is easy to get distracted by all of the marketing and giveaways, but look for the thought leaders who are there to talk tech. If you want the best swag, go to the big booths, but if you want the best conversations, go to the small booths.” –Jake Kiser, COO
This article was originally published on StrongKey and is republished here with permission.