Menu

Blogs

  • Cyber Pearl Harbor, Global Pandemic or Alien Invasion?

    by Todd Inskeep on May 18, 2017

    For over twenty years, experts have warned of a “Cyber Pearl Harbor.” Like the Dec.7, 1941 attack, this cyber-attack would both create tremendous damage and galvanize organizations, particularly in the US, to improve computer and information security. For nearly as long, other experts have spoken against this scenario, positing alternative scenarios and analogies. All-in-all, there’s been a…

  • From Tech Expert to Boardroom Staple: The CISO Role is Evolving

    by Feris Rifai on May 18, 2017

    History is repeating itself. It may surprise you to learn that before Sarbanes Oxley passed in 2002, having a director that was a financial expert in the American corporate boardroom was not the norm. In fact, CFOs who were originally thought of as financial gatekeepers are more than ever before held accountable for the integrity, accuracy and traceability of the financial information presented…

  • WannaCry Ransomware: What We Know So Far

    by RSAC Editorial Team on May 16, 2017

    Late in the day on Friday, May 12, a massive ransomware attack hit 200K organizations in 150 countries. The ransomware that has been named “WannaCry,” took advantage of Windows systems that had not yet been updated with Microsoft’s March security patch. Per the ransomware playbook, this attack locked people out of their computers, encrypted files and demanded those impacted pay up to $300 in…

  • Reactions to the US Cybersecurity Executive Order

    by RSAC Editorial Team on May 16, 2017

    After months of waiting, the security industry received an update from the US government on its promised focus on cybersecurity. Late last week President Trump signed the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Although other recent policies have been met with a variety of opinions across both sides of the aisle, this…

  • The Mounting Case to Secure Access and Stop Career-Ending Breaches

    by James Stickland on May 16, 2017

    10 years ago, CIOs did not have a place of prominence at the C-Suite table. Today, that has changed in a major way as executives at every level across the enterprise are rethinking effective risk management solutions. In fact, there is such a need for leadership in this evolving role that the chief technology position has spawned many variations of itself, including CTO, CDO, CSO, CISO, etc. …

  • Rethinking the Approach to Cybersecurity

    by Bryce Boland on May 15, 2017

    Asian organizations have made significant progress on improving their cybersecurity over the past year. That’s the good news. Now the other side of that: FireEye research shows that Asia Pacific organizations face heightened threat levels. Due to geopolitical tensions and increasingly sophisticated criminal groups, the area’s threat activity isn’t likely to drop any time soon. Making matters…

  • Cybersecurity Spending: How Much is Enough?

    by Theresa Payton on May 11, 2017

    Any C-Suite Executive has asked the following question: Do I spend another dollar on cybersecurity instead of putting that money towards improving my customer’s experience? C-Suite Executives routinely turn this question over to my team for answers. A common theme that we report back is: cybersecurity as we know it is fundamentally broken. Technologies that were cutting-edge two decades ago are…

  • Ransomware at The Tipping Point

    by Masayoshi Someya on May 8, 2017

    In the past, we saw malware outbreaks such as LoveBug, SQL Slammer, and DOWNAD, but haven’t seen such an epidemic for almost a decade now. Malware outbreaks were supposed to be a thing of the past. However, 2016 became an unprecedented year in the modern era of cyber security, with the game changer in the name of ransomware. Ransomware is a very different type of cyber threat in the modern era, …

  • Application Security Metrics: Where to Start?

    by RSAC Contributor on May 8, 2017

    By Caroline Wong Often, the people asking questions about application security (executives, regulators, auditors, customers) are not application security experts. They may ask the “wrong” questions unintentionally, because they’re trying to use success criteria that they are familiar with from other fields. It’s the responsibility of an application security professional to recommend the “right”…

  • Hong Kong Looks to Take a Global Privacy Leadership Role

    by Sam Pfeifle on May 4, 2017

    This fall, at the end of September, the International Conference of Privacy and Data Protection Commissioners will kick off in Hong Kong, bringing the world’s regulators together for the 39th time. It’s no coincidence that Hong Kong will play host. In Privacy Commissioner for Personal Data Stephen Wong, Hong Kong has a motivated and active privacy enforcer looking to be a leader on the global…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 22 May 2017 13:30:15 -0400.
© 2017 EMC Corporation. All rights reserved.