RSA Conference: Our Most Popular Posts from August 2016

Posted on by Jennifer Lawinski

We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. 

What were your favorite RSA Conference blog posts and videos in the month of August this year? 

Top Blog Posts

1. Dissed by NIST: Wendy Nather takes a look at the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management. What does she think?

2. SMS Two-Factor Authentication Is No Longer EnoughWith the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging.

3. Mobile Security Vulnerabilities Are Creating Big ProblemsWhy has the mobile security space been so underserved? Sean Cunningham from Trident Capital Cybersecurity examines the issue.

Top Videos

1. On-Demand Virtual Session: How to Explain Cybersecurity to the Board Using a Simple Metaphor: FIRE: Using lessons from firefighting and the great fires of London and Chicago, this virtual session gave attendees metaphors and stories they can use to communicate core cybersecurity concepts to the C-Suite and to the board. 

2. Security in the World-Sized WebInformation technology permeates all aspects of our lives. The combination of mobile, cloud computing, the IoT, persistent computing and autonomy are resulting in a World-Sized Web with great benefits but is vulnerable to a host of new threats. This talk will look at attempts to secure these systems and at technologies, laws, regulations, economic incentives and social norms we need to secure them in the future. 

3. Are You Ready for a Breach? Cybercrime is a growth industry where the returns are great and the risks are low. As such, cybercrime has become the 'new normal' where EY have observed that the 'protect and control' mentality is no longer sufficient. In order to adequately address cyber-breaches, it is necessary for organizations to develop a strong, centralized response framework as part of the enterprise risk management strategy.

Jennifer Lawinski

Director of Social Media & Community, Arculus

mobile security

Blogs posted to the website are intended for educational purposes only and do not replace independent professional judgment.  Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA® Conference, RSA Security LLC or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.

Share With Your Community