Menu

Blogs

Showing Blog Posts: 11–20 of 49 tagged CISO

  • Breaking the Glass Firewall: Women in IT Security Panel

    by Tony Kontzer on April 20, 2015

    Despite notable progress in the acceptance and treatment of female IT security employees, the industry continues to struggle in establishing itself as a career track for women. During a panel discussion at the RSA Conference Monday, a few of the world's best-known female security executives made it clear that the challenges of yesteryear are dropping away, but that the industry still must do a…

  • Pick Out Your Peer-2-Peer Sessions for RSA Conference

    by Fahmida Y. Rashid on April 17, 2015

    If you are interested in sitting in a room digging into a specific security topic with other people, the Peer-2-Peer sessions are for you. The goal is to get peers—people in other organizations with similar job functions and roles—in one place so that everyone can share what they are doing and have learned. Wondering which conversation will be the most relevant to your job role and concerns? We…

  • Dive into Deep Conversations at Peer-2-Peer Sessions at RSAC 2015

    by Fahmida Y. Rashid on April 16, 2015

    At RSA Conference, you can meet in a group to explore a specific security topic in-depth as part of a Peer-2-Peer session. Wondering which conversation will be the most relevant to your job role and concerns? We asked each session facilitator to provide a short summary to help you decide. This post highlights five P2P sessions (Scroll down for answers). Links to other session summaries are at the…

  • Security Innovation is Live and Well, With Plenty of Room for More

    by Fahmida Y. Rashid on March 24, 2015

    Is innovation in information security dead? It's easy to think so when each day there is a new headline about yet another massive organization's data breach, or a new report points out that enterprises aren't taking care of the security basics. All while cyber-attackers are gleefully scooping up our private data and looting our bank accounts. These breaches aren't happening because organizations…

  • If You’re Not With Us, You’re Against Us

    by Eric Cowperthwaite on March 17, 2015

    It’s time that we all came to an important and necessary conclusion: There is no silver bullet in security. There is no one product, solution, vendor or technology that is going to make you 100 percent secure. And if you’re relying on one product, you deserve a blog post all your own. Now that we’ve all agreed on this point, let’s start talking about how we can all be working together to solve a…

  • Smashing the Binary

    by Wendy Nather on March 16, 2015

    One big problem in security is the tendency to think in binary terms. Either you’re breached or you’re not; either you’re secure or you’re not. But this black-and-white worldview can be the cause of both technology and people problems. Is it possible to be a “little bit pwned”? Most would say no, although if you’re used to dealing with a wide spectrum of incidents within an organization, you know…

  • Working With Government: Legal Authority and Law

    by Todd Inskeep on February 18, 2015

    This is the third post in a multi-part series. You can read the first and second parts here. A second major aspect of the current National Cyber Security call for action considers the legal authority to investigate and prosecute cyber-crimes. We also need to agree what would be the appropriate role for law enforcement authorities. There are differing views on whether the Computer Fraud and Abuse Act…

  • The Seeds of Security

    by Wendy Nather on February 12, 2015

    My colleague Garrett Bekker once described the security industry as a pomegranate. It is brilliantly accurate: from the outside it looks like one piece, but when you open up the fruit, you see hundreds of little seeds, and it all makes a big mess (and leaves stains on everything you touch). Is the industry really this bad? Yes, it is. Consider that in our 451 Research master list, we have over…

  • PRAGMATIC Security Metrics - Applying Metametrics to Information Security

    by Ben Rothke on January 27, 2015

    Like all books on metrics, early in PRAGMATIC Security Metrics: Applying Metametrics to Information Security authors Krag Brotby and Gary Hinson state that “you can't manage what you can't measure”. The authors claim that other books on information security metrics discuss number theory and statistics in academic terms. This title promises to be light on mathematics and heavy on utility and is…

  • CISOs Need a Board Coach

    by Rook Security on January 23, 2015

    Boards are concerned about cybersecurity, specifically about how it impacts their reputation and securities (stock). The CISO is capable of assisting the organization in selecting, deploying, and managing the capabilities to address risks identified by the board. What sounds like a perfect match is often not, as many CISOs don't have the business acumen required to be an active participant in…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 06 Jul 2015 18:22:25 -0400.
© 2015 EMC Corporation. All rights reserved.