Menu

Blogs

Showing Blog Posts: 1–10 of 47 tagged Business

  • RSAC Reflects Changes in Industry Attitudes, Focus

    by Tony Kontzer on April 22, 2015

    This is my fourth RSA Conference, which doesn't exactly make me a cagey old veteran, but it's just enough history to have a sense of how the gathering has changed in recent years. (All of you who've been coming since the 1990s should probably stop reading before you start snickering derisively like those two old dudes on the balcony from The Muppet Show.) The changes first RSAC in 2010 are…

  • Give Boards Metrics They Can Actually Understand

    by Tony Kontzer on April 22, 2015

    The slide at the RSA Conference in San Francisco was blunt: "83.45% of metric presentations at 96.82% of security conferences suck." Troy Braban definitely wasn't talking about himself. More than 500 conference attendees packed into a session room to hear Braban, CISO of Australia Post, tell them what kinds of security metrics boards actually care about, and he did not disappoint them. The problem…

  • RSA's Amit Yoran: Security is Stumbling Around in the Dark

    by Tony Kontzer on April 21, 2015

    Amit Yoran clearly knows a good metaphor when he sees one. Or in this case, doesn’t see one. Yoran, who was named RSA Security's president last fall, took the stage at the RSA Conference in San Francisco Tuesday to deliver his first opening keynote. In the dark. And he let the audience of thousands sit there, in the pitch black, for an excruciatingly long moment before offering the first glimpses…

  • How to Go From Techie to CISO

    by Tony Kontzer on April 21, 2015

    It hit me like a load of bricks Monday at the RSA Conference in San Francisco: CISOs are following in the footsteps of their CIO brethren. CIOs translated technology's rise in strategic importance to raise their profile within the enterprise. Similarly, CISOs are now taking advantage of the increased scrutiny on the organization's security to raise their profile in the business and gain entry…

  • RSA Conference Preview: Meet Your Guide

    by Tony Kontzer on April 20, 2015

    Hello, RSA Conference attendees. We probably haven't met before; my name is Tony, and I'll be one of your guides throughout this week. I am one of the contributors to the RSAC editorial team, and this year, we are going to take a different approach on how we cover the conference on the blog. This is a change for me, as in the past, I attended as a member of the technology media. As a journalist, …

  • Breaking the Glass Firewall: Women in IT Security Panel

    by Tony Kontzer on April 20, 2015

    Despite notable progress in the acceptance and treatment of female IT security employees, the industry continues to struggle in establishing itself as a career track for women. During a panel discussion at the RSA Conference Monday, a few of the world's best-known female security executives made it clear that the challenges of yesteryear are dropping away, but that the industry still must do a…

  • Don’t Miss Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 15, 2015

    By all means, you should try to attend at least one Peer-2-Peer session while at RSA Conference this year. These sessions let you dig into a specific security topic you care about with your industry peers. It is a great opportunity to learn what other people are doing and walk away with new ideas. Wondering which conversation will be the most relevant to your job role and concerns? We asked each…

  • Securosis Guide: 2015 Endpoint Security Trends

    by Securosis Team on April 7, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. What you'll see at the RSAC in terms of endpoint security is really more of the same. Advanced attacks blah, mobile devices blah blah, AV-vendor hatred blah blah blah. Just a lot of blah... But we are still recovering…

  • Securosis Guide: Welcome to the Coverage Area Deep Dives

    by Securosis Team on April 6, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. While everyone likes to talk about the "security market" or the "security industry," in practice security is more a collection of markets, tools, and practices all competing for our time, attention, and dollars. Here…

  • Loose Lips Sink Ships, Part 2

    by Dale "Woody" Wooden on March 26, 2015

    If you read my last post, you already know our four travelers from Company X. They all used social media to discuss the trip to London they went on for the company. A hacking organization called Taking your Intellectual Property for fun (TIP4F) has been watching the information these employees shared on social media. They now plan on sending people to London to exploit Company X’s employees for…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 25 Apr 2015 02:33:53 -0400.
© 2015 EMC Corporation. All rights reserved.