Menu

Blogs

Showing Blog Posts: 1–10 of 125 tagged Data Breach

  • RSAC 2015 Experts on Responding to a Cyber Crisis

    by Tony Kontzer on April 23, 2015

    Security professionals are at war, a panel of corporate security executives said at the RSA Conference in San Francisco Thursday. Granted, the man leading the discussion was Mike McConnell, who, as former U.S. director of national intelligence, can be excused for using war analogies. The discussion was littered with battle references that made it clear military-style thinking is prevalent when…

  • Picking Out Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 14, 2015

    It’s easy to overlook Peer-2-Peer sessions when making your plans, which is a pity. Think about it—you will be digging into a topic you really care about in a room with like-minded peers and a facilitator. We asked each session facilitator to provide a short summary to help you decide which ones to attend this year. This post highlights seven P2P sessions (Scroll down for answers). Links to other…

  • Which Peer-2-Peer Session Will You Attend at RSAC 2015?

    by Fahmida Y. Rashid on April 13, 2015

    What is a Peer-2-Peer session? Peer2Peer sessions enable groups that share a common interest to come together and explore a specific security topic. You will be digging into a topic you really care about in a room with like-minded peers and a facilitator. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short…

  • Dig Deep into Security Topics With RSAC 2015 Learning Labs

    by Britta Glade on April 1, 2015

    At RSA Conference, we are hyper-focused on our attendees’ experience. What works for them? What doesn’t work for them? What do they want more of—or less? We scrutinize the feedback from our attendees and challenge ourselves to make every RSA Conference experience energizing, empowering, and enjoyable. From an education content standpoint, I listened and learned a lot from our delegates this year…

  • Prepare Yourself with Incident Response Tabletop Sessions

    by Matthew Pascucci on March 10, 2015

    It's inevitable: Sooner or later, you will experience a security breach. Whether the news makes the front pages of a national media publication or kept within the walls of your company doesn't matter—you'll still feel the repercussions. So how can you prepare? Conduct an incident response (IR) tabletop exercise with all the groups responsible for their part of the incident response plan. Many…

  • The Hacker as an Administrator

    by Marc Maiffret on February 10, 2015

    In many data breaches, your IT team or someone else with the right privileges has been co-opted. By the time an attacker is lifting data from your servers, they are no longer hacking but simply using stolen user credentials and passwords. And in many of those instances, the way they are moving through your environment is not via any custom tools, but by taking advantage of administrative features…

  • Designing and Building a Security Operations Center

    by Ben Rothke on January 28, 2015

    Many organizations are overwhelmed by the onslaught of security data from disparate systems, platforms and applications. They have numerous point solutions (anti-virus, firewalls, IDS/IPS, ERP, access control, IdM, single sign-on, etc.) that can create millions of daily log messages. In addition to directed attacks becoming more frequent and sophisticated, there are regulatory compliance issues…

  • Inquiring Minds Want to Know: How Do You Implement Business Security?

    by Christopher Burgess on January 16, 2015

    Business security is not a new concept. Storeowners have alarms, video, and guards to keep the ne'er-do-wells of the world at bay. Corporations that handle money have to worry about embezzlers (does the fact that it is “white-collar crime” mean it is more sanitary as a crime?). And all who handle data must address the business of securing their data. Never Assume The number of data breaches and…

  • What the Sony Hack Means for Critical Infrastructure

    by Gib Sorebo on January 8, 2015

    Given the number of major breaches making the news, not only do they begin to blur together, but it also becomes easy to underappreciate the significance of each one. The Sony hack may have gotten lost in the crowd if it weren’t for the way Sony responded, by cancelling or postponing the release of “The Interview.” Moreover, the source of the attack was not some garden variety criminal hacker or…

  • The best information security book of 2014 and some other excellent ones

    by Ben Rothke on December 29, 2014

    There were a lot of good information security book that came out in 2014, and many that were not worth reading. The following book stand out as the best, followed by a number of other superb titles, listed in no particular order: Measuring and Managing Information Risk: A FAIR Approach - Authors Dr. Jack Freund and Jack Jones have written a magnificent book that will change the way (for the…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 24 May 2015 17:24:24 -0400.
© 2015 EMC Corporation. All rights reserved.