Blogs

Showing Blog Posts: 1–10 of 20 tagged Business

  • Blurring the Lines: How CISOs Become True Business Leaders

    by John Linkous on June 25, 2014

    It was interesting to note that this year's RSA Conference 2014 focused on the CISO leader, and how CISOs and other security professionals can expand their roles throughout the organization. The first full day of the conference included a half-day session discussing the many aspects of business that affect CISOs, from audits to understanding employee behavior and dealing with Boards of Directors. …

  • Security Decisions: Changing the Way We Buy Security in the Enterprise

    by John Linkous on June 20, 2014

    When you hear the words "security product procurement," what's the first thing that pops into your head? Many enterprise customers who make security decisions for evaluating and purchasing technology often first think of the competitive landscape: How does one vendor's product compare to another? While this approach has been used since the dawn of commercial security products, there's a better…

  • The Cybersecurity Skills Gap: A Real or Manufactured Crisis?

    by Gib Sorebo on May 5, 2014

    Over the last few years, we’ve been bombarded with messages proclaiming a cybersecurity skills gap and associated statistics of positions going unfilled. For example, Cisco’s Annual Security Report estimated there were more than a million unfilled positions for security professionals world-wide. The Defense Department has said it plans to triple the number of “cyberwarriors” it employs by 2016 to…

  • Privacy in the Age of Ubiquitous Computer Vision

    by Joshua Marpet on April 17, 2014

    With Google Glass, cell phone cameras, hidden cameras, and ever cheaper surveillance cameras, can there truly be user privacy? With Google Glass and facial recognition apps, tagging people can happen at full walking speed, without a pause or possibility of the action being recognized. Is there any parallel in other realms? At one point, a car with an expired registration would only get exposed…

  • CISOs, Business Security, and the Business of Security

    by Christopher Burgess on April 3, 2014

    So you want to be a CISO, really? Business security, or the business of security, has evolved and is evolving, according to Todd Fitzgerald of Grant Thornton International, who shared his thoughts in his RSA Conference 2014 session, "So Why on Earth Would You WANT to Be a CISO?" Fitzgerald captured the challenge facing all who are thinking of moving into the CISO career track when he shared a…

  • The Industrial Defender Acquisition: A Merging of National Security with Critical Infrastructure?

    by Gib Sorebo on March 17, 2014

    This last week, Industrial Defender announced that it had been acquired by Lockheed Martin for an unspecified amount. Brian Ahern and his team are to be congratulated on this apparently successful exit that they had been working towards for the last 12 years. Industrial Defender has long been the largest of the cybersecurity firms specializing in industrial control systems. It is a very fractured…

  • Four Trends Driving Cyber Security - Part 2

    by Todd Inskeep on November 19, 2013

    In our last blog post, we discussed the need for information security professionals to find their business voice. At the same time, security and risk management are driving the growing need for information security professionals. This leads to the second major trend facing the industry, which is the demand for skilled personnel. One CISO I know quotes unemployment in Information Security at less…

  • The Evolution of What We Value and How Much

    by Gib Sorebo on August 19, 2013

    In the current controversies involving what our intelligence community is collecting about its citizens, the issue has frequently been framed as a balance of protecting the personal safety of people versus protecting one’s privacy. While delving deeper may reveal a false dichotomy, we nonetheless must acknowledge that such tradeoffs do exist. At the very least, we’ve come to expect and accept…

  • Present Yourself - Using SlideShare to Grow Your Business

    by Ben Rothke on June 26, 2013

    SlideShare is a Web 2.0 based slide hosting service where users can upload presentation-based files. Launched in October 2006, it’s considered to be similar to YouTube, but for slideshows. It was originally meant to be used for businesses to share slides among employees more easily, but it has since expanded to also become a host of a large number of slides which are uploaded merely to entertain. …

  • The Phoenix Project

    by Ben Rothke on February 28, 2013

    While at the RSA Conference this week, the nice people at Tripwire gave me a copy of their CTO’s book The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win. The theme of the book is that Bill is an IT manager at Parts Unlimited. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 02 Aug 2014 02:33:48 -0400.
© 2014 EMC Corporation. All rights reserved.