Blogs

  • Expo Only Registration - A Wealth of Content

    by Jeanne Friedman on February 19, 2014

    Think your Explorer Expo Pass is only for cruising the Expo Hall? Think again. There is enough content at RSA Conference available to you to keep you occupied the entire week. Here is a basic overview of your content opportunities. Monday There are a variety of seminars offered by Associations that are free to all Expo pass holders. Demand is high for these sessions but just make sure you arrive…

  • The New Deal of Internet-Device Security

    by Mark Stanislav on February 18, 2014

    I once had a teacher who told me it had been years since he had enjoyed watching a movie. When I inquired as to why that was, he explained that because he had helped produce movies he couldn’t help but dissect every detail when watching one. Information security professionals have a similar plight when it comes to technology – we can’t help but peel back the layers and find the flaws in the…

  • Challenge Accepted – Giving Back to the Community

    by Alex Bender on February 18, 2014

    If you have been following my recent blog posts you know how closely tied I am to this year’s theme of Share. Learn. Secure. I believe this is more than just a slogan. It can evolve into a code of conduct we as a community should keep in mind. Given our profession, we can easily get lost in the “secure” term to only associate with the technology we touch, people we work with and processes we…

  • The “New” Cybersecurity Framework: Did They Get the Marketing Right This Time?

    by Gib Sorebo on February 17, 2014

    This last week, the Obama Administration announced the release of its Framework for Improving Critical Infrastructure Cybersecurity and instantly sought to distinguish this framework from the plethora of other government and industry-sponsored frameworks that seem to be more interested in who the guidance was intended to serve rather than the substance of the guidance. For example, the Department…

  • I Am RSA Conference: Shared Intelligence

    by Alex Bender on February 13, 2014

    In this day and age, where virtually nothing is offline, government agencies have quickly learned to endorse more stringent security guidelines for both public and private sectors. And there is no better place to debate the best practices of privacy than at RSA Conference 2014. The government-focused sessions at this year’s conference include discussions on legislation, military/law enforcement…

  • Who is Leading the Discussion on Information-Sharing and How can it be Transformed?

    by Kathleen Moriarty on February 12, 2014

    I’d like to end this series with thoughts on options for transforming information sharing to drive scalable solutions that have the potential for a broad impact using the few skilled resources that exist. In the current wave of information-sharing efforts, discussions are typically led by those with the resources to manage or participate in sharing initiatives or sponsors of those efforts. This…

  • Another (Almost) Target Lesson: Securing Control System Networks to Protect the Enterprise Side Works Too

    by Gib Sorebo on February 10, 2014

    In this column and elsewhere, we’ve seen plenty of exhortations to make sure that control system networks are sufficiently isolated from corporate networks so as to prevent infiltrations from finding their way to the more sensitive and “more important” parts of the organization. For those delivering electricity, pumping oil, or whipping up batches of hazardous chemicals, it is critical that…

  • RSA Conference 2014: Moscone North, South and West

    by Linda Gray on February 7, 2014

    You may have seen in the RSA Conference newsletter this week, that this year, the Conference is taking place in all 3 Moscone Center buildings – North, South and West. For those of you who have been to the Conference before, you’ll notice some changes to where sessions, activities and events are taking place. So read-on for a high-level, quick-reference guide about what’s taking place where. …

  • Customer Privacy: The Surprising Driver of Today's Massive Vendor Security Movement

    by John Linkous on February 6, 2014

    Within recent weeks, a plethora of vendors have announced massive security changes to their products and platforms. From Google's migration of all web certificates to 2048-bit encryption keys to Twitter's implementation of session-specific encryption keys via forward secrecy, vendors are rapidly implementing security controls across their infrastructure, often at substantial cost. The driver…

  • Information Sharing Post-Snowden, What Changes?

    by Kathleen Moriarty on February 5, 2014

    For this second piece in the series, I’d like to highlight the use of threat modeling to determine the best options to exchange intelligence on the wire. There is no single answer as to how we address the challenges we now face as security professionals with the stream of revelations post-Snowden. We need to determine what is the balance for protecting a nation versus the need for tighter…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 19 Apr 2014 14:12:32 -0400.
© 2014 EMC Corporation. All rights reserved.