Weekly News Roundup June 21-25, 2021

Posted on by Kacy Zurkus

We were excited to host our quarterly RSAC 365 Virtual Seminar on Governance, Risk & Compliance this week—a topic that our moderator, John Elliott, called the not-so-sexy part of cybersecurity, but a hot topic made all the more important in the aftermath of the ransomware attacks on Colonial Pipelines and JBS Meats. It’s come to be that few CEOs can engage with industry cohorts without hearing about an organization suffering an attack. The Economist recognized this threat to the world’s digital economy in a piece this week, noting, “Such attacks are evidence of an epoch of intensifying cyber-insecurity that will impinge on everyone, from tech firms to schools and armies.”

Indeed, we are seeing shifts in the way organizations are thinking about and investing in cybersecurity. We are also seeing increased calls for cooperation among public institutions and the private sector, with the NSA reportedly working out deals, “with numerous defense and technology companies to make regular visits to the center.” 

Still, a compelling commentary in War on the Rocks suggests, “there are significant gaps in how the military educates the officer corps as a community about the nature and practice of cyber strategy and operations.”

These calls for change indicate that the cybersecurity industry and organizations the world over are looking to transform their overall security postures, and we are here to help. You can explore a variety of content available through our RSAC 365 Cybersecurity Learning program or search for content by topic in our Library.

Let’s take a look at what else made industry headlines this week.

Jun. 25: Security researchers discovered multiple vulnerabilities within Dell Client BIOS impacting at least 30 million Dell computers.

Jun. 24: “A top cyber official at the Defense Department called digital authoritarianism a threat to national security and said the U.S. must invest in partnerships and development of indigenous technology alternatives,” NextGov reported.

Jun. 24: “Increased availability and adoption of 5G technology means a more connected world, which in turn means more users with a greater variety of devices. While this means that IT security teams will have more to manage, many of the leading security vendors have been planning for 5G for years,” Security Boulevard reported.

Jun. 24: “How did you create your organizational cybersecurity road map? Is it aimed to comply with mandatory regulations or was it tailored to our IT architecture?” is reportedly one of the top five questions boards should be asking CISOs.

Jun. 23: For those dabbling in the cybersecurity market, “opportunities are ripe for massive business value creation in cybersecurity… Specifically, Upfront is actively looking for companies building in: Data security and data abstraction; Zero-trust, broadly applied; and Supply chains,” wrote Kara Nortman, Partner at Upfront Ventures.

Jun. 23: A new survey of IT leaders conducted by JumpCloud revealed that too much budget is being spent on supporting remote work.

Jun. 23: Bank Info Security reported, “The European Commission has proposed creating a Joint Cyber Unit to help EU member states respond to and prevent cyberattacks, especially those involving ransomware.”

Jun. 23: “The Space Information Sharing and Analysis Center (ISAC) welcomed its newest member, Microsoft, June 23 with an announcement highlighting the tech giant’s cybersecurity expertise,” according to Space News.

Jun. 22: “The 2021 StateScoop 50 Awards recognize the top people and projects in state government IT. In interviews with StateScoop, winners of this year’s prizes look back at their work over the past year, most of which was dominated by the COVID-19 pandemic,” StateScoop reported.

Jun. 21: The Water Sector Coordinating Council (WSCC) and the Water Information Sharing and Analysis Center (WaterISAC) conducted a survey of 606 water and wastewater companies and found a number of areas where the federal government can support the utility sector.

Kacy Zurkus

Senior Content Manager, RSA Conference

Security Strategy & Architecture Risk Management & Governance

security architecture risk management critical infrastructure cyber espionage zero trust

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.

Share With Your Community

Related Blogs