Blogs

  • What the Target Breach Teaches Us About Standards, Regulations, and Critical Infrastructure

    by Gib Sorebo on January 30, 2014

    The recently disclosed security breach of Target’s® point of sale terminals and related infrastructure is likely a lesson on the limitations of standards and regulations to adequately protect sensitive information and critical systems despite the political piling on that traditionally visits a high-profile data breach. However, absent some newly discovered evidence of incompetence, the Target…

  • Driving Towards More Effective Sharing Models

    by Kathleen Moriarty on January 29, 2014

    The ask from this blog series is for experts to engage in discussions that drive the adoption of effective operator-driven sharing models that leverage our small number of skilled threat analysts. The purpose of this line of thinking is not to drive adoption of open and international standards over US Government funded efforts, but rather to get people to think critically and push toward better…

  • Data Leakage: The Human End-Around to DLP

    by Christopher Burgess on January 28, 2014

    The old adages "still water finds its own level" and "moving water finds a path of least resistance" both have applicability when we think of data leakage and employees' engagement with data loss prevention (DLP) processes, policies, procedures, and software. With still water, data is at rest; with moving water, your data in transit. There are also two types of employees: Those who are trying to…

  • Brainstorming and Beyond: A User-Centered Design Method

    by Ben Rothke on January 26, 2014

    At first glance, brainstorming seems like ice, in that you really don’t need an instruction manual to make it. But that is clearly not the case, as Chauncey Wilson writes in Brainstorming and Beyond: A User-Centered Design Method. The book shows that brainstorming can be most successful and productive when the facilitator knows the proper techniques for getting the most out of the participant’s…

  • Continuing Your Education at RSA Conference

    by Jeanne Friedman on January 24, 2014

    Getting Credit for Sessions at RSA Conference The following is a transcript of my podcast on CE Credits. There are numerous ways to obtain Continuing Education Credits at RSA Conference 2014. RSA Conference partners with many associations that not only provide credits but also great sessions and events. I will now detail what you need to do for (ISC) 2 , ISACA, IAPP, GIAC, the ABA as well as how…

  • Security Awareness? "Once and Done" Does Not Teach Awareness

    by Christopher Burgess on January 23, 2014

    A new employee shows up on day one and walks through his ID card briefing, compensation and benefits brief, and security brief, meets his new team and manager, and tries to retain all the information rushing out at him via the orientation fire hose. All boxes checked, the employee is good to go, and the security team notes that 100 percent of all new employees continue to receive security…

  • Meeting Your Peers, Colleagues and Friends at RSA Conference

    by Linda Gray on January 22, 2014

    We consistently hear that one of the main reasons people attend RSA Conference is to meet people and make industry contacts. To help facilitate those interactions there’s a number of special events during the Conference and I wanted to take a minute to highlight some of them to you. Monday February 24th Orientation If you’ve never been to RSA Conference before, then come along to our Orientation…

  • 5 Tips for Handling Compromised Customer Data

    by Christopher Burgess on January 21, 2014

    Rarely does a week go by when you don't hear or read of a data breach and the accompanying loss of customer data or client personal identifying information (PII). Having a data breach plan in place that provides an honest, direct, and customer-centric solution will go a long way toward retaining the customers or clients affected. Though no one ever wants these things to happen, data breaches do…

  • Starting RSA Conference 2014 with a Bang: Monday Seminars

    by Jeanne Friedman on January 20, 2014

    Getting to RSA Conference early? RSA Conference has a wide range of sessions available to attend before the grand opening on Tuesday morning. Association Events – open to all badge types CSA Summit 2014: In Global Clouds We Trust? – 9:00 AM – 1:00 PM The Cloud Security Alliance Summit this year will feature global policy makers and industry debating our industry’s seminal issue: can we trust…

  • 4 Ways Social Network Engagement Can Derail a Company

    by Christopher Burgess on January 16, 2014

    Social network engagement is mainstream. Rare is the company who does not have a presence on a social network, with engagement including customer education and support, product launch, personnel recruitment, and competitive intelligence. Yet we continue to see occasions where improper employee use of technology can result in loss of intellectual property, inappropriate use of a social network for…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 25 Oct 2014 18:48:52 -0400.
© 2014 EMC Corporation. All rights reserved.