Menu

Blogs

Showing Blog Posts: 11–20 of 126 tagged Enterprise Defense

  • Homeland Security Chief Talks Cybersecurity Mission at RSAC 2015

    by Tony Kontzer on April 21, 2015

    Jeh Johnson knows all too well how important security is. As the secretary of the U.S. Department of Homeland Security, Johnson not only is responsible for protecting the nation from terrorists, he's also accompanied by a secret service detail everywhere he goes. There was a time when that kind of physical security was enough, but the world has changed. During a keynote at the RSA Conference in…

  • Dive into Deep Conversations at Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 16, 2015

    At RSA Conference, you can meet in a group to explore a specific security topic in-depth as part of a Peer-2-Peer session. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short summary to help you decide. This post highlights five P2P sessions (Scroll down for answers). Links to other session summaries are at the…

  • Picking Out Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 14, 2015

    It’s easy to overlook Peer-2-Peer sessions when making your plans, which is a pity. Think about it—you will be digging into a topic you really care about in a room with like-minded peers and a facilitator. We asked each session facilitator to provide a short summary to help you decide which ones to attend this year. This post highlights seven P2P sessions (Scroll down for answers). Links to other…

  • Securosis Guide: Security Management

    by Securosis Team on April 14, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Last year Big Data was all the rage at the RSAC in terms of security monitoring and management. So the big theme this year will be...(drum roll, please)...Big Data. Yes, it's more of the same, though we will see…

  • Which Peer-2-Peer Session Will You Attend at RSAC 2015?

    by Fahmida Y. Rashid on April 13, 2015

    What is a Peer-2-Peer session? Peer2Peer sessions enable groups that share a common interest to come together and explore a specific security topic. You will be digging into a topic you really care about in a room with like-minded peers and a facilitator. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short…

  • Securosis Guide: 2015 Endpoint Security Trends

    by Securosis Team on April 7, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. What you'll see at the RSAC in terms of endpoint security is really more of the same. Advanced attacks blah, mobile devices blah blah, AV-vendor hatred blah blah blah. Just a lot of blah... But we are still recovering…

  • Securosis Guide: Welcome to the Coverage Area Deep Dives

    by Securosis Team on April 6, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. While everyone likes to talk about the "security market" or the "security industry," in practice security is more a collection of markets, tools, and practices all competing for our time, attention, and dollars. Here…

  • Securosis Guide: DevOpsX Games

    by Securosis Team on April 2, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. DevOps is one of the hottest trends in all of IT—sailing over every barrier in front of it like a boardercross racer catching big air on the last roller before the drop to the finish. (We'd translate that, but don't…

  • Dig Deep into Security Topics With RSAC 2015 Learning Labs

    by Britta Glade on April 1, 2015

    At RSA Conference, we are hyper-focused on our attendees’ experience. What works for them? What doesn’t work for them? What do they want more of—or less? We scrutinize the feedback from our attendees and challenge ourselves to make every RSA Conference experience energizing, empowering, and enjoyable. From an education content standpoint, I listened and learned a lot from our delegates this year…

  • Loose Lips Sink Ships, Part 2

    by Dale "Woody" Wooden on March 26, 2015

    Dale "Woody" Wooden illustrates security concepts through stories. His past posts discussed how attackers mine employees' social media accounts for information. This story picks up where we left off last time. If you read my last post, you already know our four travelers from Company X. They all used social media to discuss the trip to London they went on for the company. A hacking organization…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 29 May 2015 16:19:56 -0400.
© 2015 EMC Corporation. All rights reserved.