Menu

Blogs

  • Retaining Infosec Professionals: Dealing with stress, reducing burn out and improving the work environment

    by Caroline Wong on August 15, 2018

    I remember going out for a night on the town with my friends, about a decade ago. It was a Friday evening after a long week at work. For years, I had been commuting from San Francisco to San Jose every day. It wasn’t uncommon for me to leave my home at 6 am in the morning, and return at 8 pm in the evening. I worked on an incredible team and had a great boss. We did very interesting work and…

  • Ben's Book of the Month: Review of "Cyber Wars: Hacks that Shocked the Business World"

    by Ben Rothke on August 14, 2018

    The only problem I have with Cyber Wars: Hacks that Shocked the Business World (Kogan Page 978-0749482008) by Charles Arthur is that these breaches really didn’t shock the information security community or the business world. These stories are simply narratives of firms that didn’t take information security seriously and suffered the consequences. In this interesting book, he details some of the…

  • Navigating the Threat from Within: Insider Threats in the Finance Industry

    by Isaac Kohen on August 9, 2018

    Protecting sensitive data is a top priority for financial organizations. With the expanding threat landscape, organizations must look to new technologies and strategies to protect sensitive data. Data isn’t safe and in the financial industry, sensitive data - like account information - can be exploited at any moment by an individual with malicious intention. Old Traditions Won’t Cut It For Insider…

  • Establishing Trust and a Foundation: A Star Wars Solo Story

    by RSAC Editorial Team on August 7, 2018

    *Warning this post or embedded links may contain spoilers* We enjoyed putting together our five-part blog series coming out of Star Wars Episode VIII earlier this year so much that we decided to add one more to the series after the release of Solo earlier this summer in between mega Star Wars Episodes VIII and IX. This film spotlights the emergence of Han Solo (who we are first introduced to in…

  • So Many Topics at RSA Conference but What Does It All Mean?

    by RSAC Editorial Team on August 2, 2018

    Now that we are a few months out of RSA Conference 2018 and the summer months are upon us, we want to revisit the report that Wade Baker of Cyentia Institute and a member of the RSA Conference Advisory Board was able to compile earlier this year that examines more than 15,000 speaking submissions over the last decade at RSA Conference. Many of you have likely seen the report, or perhaps glanced at…

  • Ben's Book of the Month: Review of "The Truth Machine: The Blockchain and the Future of Everything"

    by Ben Rothke on July 31, 2018

    The hype cycle is a branded graphical presentation developed and used by Gartner to represent the maturity, adoption and social application of specific technologies. The five phases of the hype cycle are: Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity The 2017 Hype Cycle for Emerging Technologies has blockchain in the Peak…

  • Sports and Health/Fitness Retailers Find Themselves in the Cyber Security Firing Line

    by Tony Kontzer on July 26, 2018

    As cyber security breaches have become an unavoidable part of doing business in the 21st century, hackers have at times appeared to be working through various categories of companies one at a time. Back in 2013 and 2014, it was big box retailers like Target and Home Depot who started getting the worst of it. In 2015, a report from Websense (since renamed Forcepoint) indicated that financial services…

  • Role Playing an Incident, Except it’s Fun

    by Josh Bressers on July 24, 2018

    At RSA Conference 2018 USA I had the pleasure of holding the same session twice. Normally this would mean doing the same basic thing the second time, but my session was rather unique: I held a role-playing event that was very heavy on randomness. I’ve participated in and hosted security role playing events in the past and most of them were a bit on the dull side. My idea for this year was to spice…

  • Q&A Series with RSAC APJ Ambassador Jonathan Trull

    by RSAC Editorial Team on July 20, 2018

    In Part 4 of this series, we get to know RSAC APJ Ambassador Jonathan Trull. Jonathan is the Chief Cybersecurity Strategist at Microsoft and a frequent speaker at RSA Conferences. We reached out to him for his predictions on the hot topics at RSAC 2018 APJ and what he thinks sets this conference apart from others. As a longtime conference veteran, what do you consider your number one reason for…

  • C-Suite Cybersecurity Awareness May Be the Key to Taking a Bite Out of Breaches

    by Tony Kontzer on July 19, 2018

    No matter how many breaches we read about, how many cautions we hear, or how many reminders we get about the importance of round-the-clock diligence, cybersecurity continues to slip through the cracks as a business priority too often. Too often, this chink in the armor comes down to a simple and disturbing disconnect: too many C-suite executives seem to not be getting the message that this…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 20 Aug 2018 06:31:03 -0400.