Menu

Blogs

  • Should I Stay or Should I Go?: Women and Security Panel

    by Tony Kontzer on February 29, 2016

    Anyone who's attended an RSA Conference—or any information security event, for that matter—knows all too well what a male-dominated industry security is. Oh, things have gotten better; there are actually some women at these events today. But a panel of female security veterans clearly believes there is room for improvements that will result, among other things, in security events evolving from…

  • Phantom Takes Top Honors at RSAC 2016 Innovation Sandbox Competition

    by Tony Kontzer on February 29, 2016

    If there was any doubt remaining that these are good times for the information security industry, it was erased during the opening day of the RSA Conference, as hundreds of attendees queued up to hear about the hottest startups during the annual Innovation Sandbox competition. It was a much more tightly-packed room than previous years, for numerous reasons. Some people were there looking for…

  • Can a Government Encryption Backdoor and Privacy Coexist?

    by Chenxi Wang on February 28, 2016

    On March 2 at 9:10 a.m. at the RSA Conference, I’ll be running a panel discussion on “Can government encryption backdoor and privacy coexist, or is it an oxymoron?” with Michelle Dennedy, the Chief Privacy Officer of Cisco, Richard Marshall, former General Counsel for the NSA, and Dr. Matthew Green, the Economist’s go-to source for encryption technologies. My idea is to bring in a privacy expert, …

  • Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want

    by Ben Rothke on February 28, 2016

    Information security is a hot career area. There supply of qualified information security professionals is out of proportion to the growing demand. A recent article in Forbes states (erroneously in my opinion) there will be 1 million cybersecurity job openings in 2016. Whatever the number truly is, nearly every security department in corporate American is struggling to fully their thein security…

  • Tips for Having a Great RSA Conference Experience

    by David Needle on February 27, 2016

    The RSA Conference 2016 starts off Monday and it’s a biggie. Last year over 33,000 attendees swarmed the three Moscone Center conference halls in San Francisco and don’t be surprised if that number is even bigger this year, the 25 th anniversary of the event that started so modestly in 1991 with a gathering of 60 cryptographers. So how do you make the best use of your time at the conference? Linda…

  • Introducing the RSA Conference Job Board

    by Jennifer Lawinski on February 26, 2016

    As the security community gathers together in San Francisco for the RSA Conference next week, they might notice a new feature on the conference website: the RSA Conference Job Board. We heard you, and we've responded to the community's need to find qualified security professionals by creating a new place that companies can post their cybersecurity openings—and that security pros can look for new…

  • RSA Conference 2016: What Will Everyone Be Talking About?

    by Tony Kontzer on February 26, 2016

    Take it from a veteran of the past several RSA Conferences: If there's one thing attendees at next week's gathering in San Francisco can count on, it'll be a slew of reminders of how everything we hear relates to the current news cycle. Whether it's been analyzing the revelations surrounding whistle-blower Edward Snowden, going over the details of the huge Target data breach of 2013, or engaging…

  • Securosis Guide: Cloud Security Deep Dive

    by Securosis Team on February 25, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. To be honest, we are a bit biased on this particular topic. Our day to day work has been shifting to cloud projects for a number of years now, but the jump in terms of pure numbers the past year was pretty astounding. …

  • Which Peer2Peer Sessions Should You Attend at RSAC 2016?

    by Jennifer Lawinski on February 25, 2016

    Are you ready for this year's RSA Conference in San Francisco? Have you decided which Peer2Peer sessions you'd like to attend? Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. This year we've once again asked the discussion facilitators to help explain what you…

  • Securosis Guide: Data Security Deep Dive

    by Securosis Team on February 24, 2016

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Ransomware. Pwning the IoT. Backdoors. Botnets. Skimmers. APT. Malicious apps. The NSA. Lots and lots of noise from the press about these scary threats, but what grabs the headline is not what drives the security…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 03 May 2016 12:19:51 -0400.
© 2016 EMC Corporation. All rights reserved.