Menu

Blogs

  • Hugh Thompson Show Closes Out RSAC 2015

    by Fahmida Y. Rashid on April 24, 2015

    Leading image

    Dr. Hugh Thompson, the program committee chairman of RSA Conference, closed out the RSA Conference week with the amusing and informational “Hugh Thompson and Guests.” How many of us will ever be able to look at a horse and carriage again without remembering his retelling of his family's runaway carriage ride? All the laughter and jokes aside, Thompson addressed an area of conversation which typically does not come up in information security circles. Thompson and his guests explored the human…

  • Panel Weighs in on Future of Authentication

    by RSAC Contributor on April 24, 2015

    If you look around during RSA Conference, you will notice there are a number of parallel events going on around Moscone Center. IOActive put together a few talks on Tuesday and Wednesday as part of their IOasis event. In the same vein, Nok Nok Labs hosted a panel discussion on the future of authentication on Thursday. This post comes courtesy of Girish Wadhwani, of Nok Nok Labs. The panel was…

  • Protecting Children From Online Predators

    by Tony Kontzer on April 24, 2015

    Something totally unexpected happened to me at the RSA Conference in San Francisco Thursday: For the first time in my decades-long career, I cried at a technology event. And something tells me I wasn't the only one. RSAC attendees listened to Alicia Kozakiewicz tell, in amazing detail, of her nightmarish abduction by an Internet predator during the "In to the Woods" keynote panel. On New Year's Day, …

  • The Future of Security Lies in Teaching Our Kids to Hack

    by Tony Kontzer on April 24, 2015

    You may have noticed that one of the themes of this year's RSA Conference is kids. They've been an overlooked part of technology industry events for too long, and this year RSAC is doing something about it. Two keynotes focused on making the Internet safer for kids. And a big chunk of the second floor concourse at Moscone West was made over into an interactive Cyber Village exhibit designed to…

  • Pentagon CIO Discusses His Security Plans

    by Tony Kontzer on April 23, 2015

    No one in the room was surprised when Terry Halvorsen, CIO of the U.S. Department of Defense, said during a RSA Conference forum session on Wednesday, "We're not easy to work with." With 1.4 million active-duty military personal to support, a roster of 500,000 contractors, and a requirement to answer to Congress, the DoD is, to put it mildly, a unique enterprise. "I’m Fortune Zero," Halvorsen…

  • Wise Words From CISOs at RSAC 2015

    by Tony Kontzer on April 23, 2015

    In the first few days of this year's RSA Conference, I made it a point to hear as many information security executives speak as possible. Thankfully, there have been a number of opportunities to do so. I've always felt that the most interesting stories and perspectives come from customers. They tend to speak plain English because they have to appeal to a non-technical audience. Vendors are much…

  • RSAC 2015 Experts on Responding to a Cyber Crisis

    by Tony Kontzer on April 23, 2015

    Security professionals are at war, a panel of corporate security executives said at the RSA Conference in San Francisco Thursday. Granted, the man leading the discussion was Mike McConnell, who, as former U.S. director of national intelligence, can be excused for using war analogies. The discussion was littered with battle references that made it clear military-style thinking is prevalent when…

  • RSAC 2015 Daily Recap: Thursday

    by Fahmida Y. Rashid on April 23, 2015

    RSA Conference goes the full week, with the closing keynote on Friday, but for many people, today is the de facto last day. While there are plenty of sessions on tap for Friday morning, the expo hall closed this afternoon. Many of the attendees, as well as members of the press, head home Thursday. If things went well, they would have a lot of ideas brimming in their heads about things they…

  • Private Sector Cooperation in Cyber Threat Intelligence

    by Rita S. Heims on April 22, 2015

    Devices provide imperfect information security protection, even if they are considered acceptable for purposes of satisfying a legal obligation to follow industry security standards. An advanced warning system that predicts the likelihood of cyber attack may ultimately be more effective and less costly if well designed and executed. Private organizations have tremendous technical capacity to…

  • Learning About New Attack Techniques at RSAC 2015

    by Tony Kontzer on April 22, 2015

    A funny thing happened on my way to a session at the RSA Conference Tuesday. Long before I got there, and as I was checking messages on my phone, I nearly walked right into the back of a line. But for what? There were hundreds of people standing in line in the concourse, and hundreds of others rifling through their conference guides trying to figure out what all of the hubbub was. I smelled a…

  • RSAC 2015 Daily Recap: Wednesday

    by Fahmida Y. Rashid on April 22, 2015

    Day 3. Wednesday. Hump day! We are midway through RSA Conference, and there is still so much left to do. I spoke with an attendee who boasted he's been hitting over 10,000 steps on his FitBit everyday. I wonder what the average number of steps are among our attendees. Hope everyone has been eating healthy and drinking. We are exercising both our minds and bodies this week. Every day, sessions are…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 27 Apr 2015 06:31:39 -0400.
© 2015 EMC Corporation. All rights reserved.