Menu

Blogs

Showing Blog Posts: 1–10 of 15 by Todd Inskeep

Todd Inskeep

Todd Inskeep

RSA Conference Advisory Board Member

  • It’s Three Conferences in One at RSAC

    by Todd Inskeep on April 4, 2018

    RSA Conference (RSAC) is right around the corner and it’s not too late to join the fun. With the session topics, keynote lineup and speakers posted, it’s a reminder that the Conference plays a unique role in the cyber and information security calendar. To understand that unique role, I’d like to share some thoughts from my 30 years in the industry and my attendance at almost all of the…

  • On the Internet, nobody knows you’re a dog...but they may know your password

    by Todd Inskeep on October 9, 2017

    Famously, according to the New Yorker cartoon: ‘On the Internet, nobody knows you’re a dog.’ However, today in the wake of numerous breaches, it may seem like everyone may know everything about you. The reality, naturally, is somewhere in between. As we enter another National Cybersecurity Awareness month, key information – your identity, your passwords, and your access have become more important…

  • Building the Right Security Budget

    by Todd Inskeep on September 13, 2017

    September, and Fall, signal the harvest for farmers, and for CISOs. The project seeds that were planted earlier in the year are getting implemented and showing results. This is also the time when planning starts for next year. In farming terms: what crops and seeds are needed; where do you fertilize; and which fields need rotating? For CISOs the planning and budget process often starts and stops…

  • Risk Containment Strategies to Avoid the Next Petya

    by Todd Inskeep on June 30, 2017

    By: Todd Inskeep and Chris Taylor Ransomware has been in the headlines with Petya, like WannaCry before it, spreading rapidly around the globe. If you are not familiar with this week’s news, organizations around the globe suffered another ransomware attack on Tuesday including pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, as well as airports and banks. Addressing…

  • Cyber Pearl Harbor, Global Pandemic or Alien Invasion?

    by Todd Inskeep on May 18, 2017

    For over twenty years, experts have warned of a “Cyber Pearl Harbor.” Like the Dec.7, 1941 attack, this cyber-attack would both create tremendous damage and galvanize organizations, particularly in the US, to improve computer and information security. For nearly as long, other experts have spoken against this scenario, positing alternative scenarios and analogies. All-in-all, there’s been a…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • Top Things Even Security Experts Forget

    by Todd Inskeep on September 28, 2016

    National Cyber Security Awareness Month in October marks a good time for all organizations to think about how they can build and reinforce a workplace culture of security and privacy. This security culture has to be created, fed and reinforced through an investment in activities and engaging training materials throughout the year—not only during the annual security training meetings. As…

  • Working With Government: Security Standards

    by Todd Inskeep on March 5, 2015

    This is the fifth post in a multi-part series following the President’s State of the Union speech back in January. The series examines how the information security community needs to engage with the government to shape laws which will affect the industry. You can see the first, second, third, and fourth posts. Let's take a look at prescriptive requirements. There has been little discussion of…

  • Working With Government: Privacy

    by Todd Inskeep on February 20, 2015

    This is the fourth post in a multi-part series about how the information security community needs to engage with the government to shape laws which will affect the industry. You can see the first, second, and third posts here. The President’s State of the Union addressed the need for increased cybersecurity investment, new laws, and even the issue of privacy for ourselves and our children. Since…

  • Working With Government: Legal Authority and Law

    by Todd Inskeep on February 18, 2015

    This is the third post in a multi-part series. You can read the first and second parts here. A second major aspect of the current National Cyber Security call for action considers the legal authority to investigate and prosecute cyber-crimes. We also need to agree what would be the appropriate role for law enforcement authorities. There are differing views on whether the Computer Fraud and Abuse Act…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs/by/58/inskeep on Tue, 14 Aug 2018 13:46:47 -0400.