Menu

Blogs

  • Hold On For Your Life: GDPR Has Landed and is Making its Impact Felt Quickly

    by Tony Kontzer on June 21, 2018

    Leading image

    Anyone who attended this year's RSA Conference in San Francisco can attest to the prominent portion of mindshare that security and privacy practitioners were devoting at that time to the European Union's General Data Protection Regulation (GDPR), which went into effect last month. GDPR, which at its essence gives consumers the final say on how their data is handled, has been a long time coming. It's a far-reaching consumer-protection measure that's been years in the making and which goes well…

  • Boot Camp: No Pain, No Gain

    by Sandra Toms on June 20, 2018

    So what does the RSA Conference team do post the US event (besides work on our RSAC Unplugged and RSAC APJ events)? We prepare for boot camp! Boot camp is aptly named. It is our RSA Conference design kick off meeting – an intense three-days of actively planning, breaking and rebuilding programs, ideas and concepts to develop the next RSA Conference experience. By the end of the three days, we…

  • HIPAA, GDPR and the Dreaded “Second Hop” Security Problem

    by Salvatore J. Stolfo on June 18, 2018

    Malicious attacks targeting a healthcare company’s confidential data are nothing new. The industry has lived under the stringent HIPAA requirements for years and many have made great strides deploying systems to manage and protect their data. What is disturbing, however, is the number of breaches that still occur. A recent example: LifeBridge is just now disclosing a breach that happened in…

  • Diversity with a Side of Caffeine

    by Sandra Toms on June 14, 2018

    Early Wednesday morning of RSAC US week, we asked a group of co-collaborators to work with us to help improve the diversity of RSA Conference. A broad spectrum of people were represented – some long-term RSAC attendees and some new to information security – all of various ages, genders, geographies, verticals, positions and ethnicities. In exchange for the 90-minute session, we promised the…

  • Cybersecurity Framework 1.1 Adoption Experiences and Opportunities

    by Timothy Shea on June 12, 2018

    The NIST Cybersecurity Framework was released in February 2014. At the 2015 RSA Conference I hosted a peer-to-peer (P2P) session on the framework: Cybersecurity Framework - Adoption Experiences and Opportunities. While the room was full, including participation from NIST - conveyors of the Framework – there were very few people who had implemented the Framework, but many who planned to. Also in…

  • Yep, I Suggested Monica

    by Sandra Toms on June 7, 2018

    Have you ever had that awkward pause moment when you make a suggestion, and people look at you like you have a third eye? It feels like second nature to me! I don’t consider myself an “events person,” but I’m responsible for one of the world’s largest cybersecurity events. So, imagine the awkward pause moment I had when I suggested we have Monica Lewinsky keynote at RSA Conference. Most people…

  • Between the Lines: Takeaways from RSA Conference 2018 and How They Apply to the Future of Enterprise Security

    by Anne Baker on June 4, 2018

    This year’s RSA Conference was buzzing. Everywhere you turned, thought-provoking discussions on the security industry’s biggest challenges were taking place. Although the seriousness of this past year’s proliferation of cyberattacks hung in the air, there was no doubt that the mood was upbeat and there was a lot of positive momentum. After taking a breath to process the content and conversations…

  • Ben's Book of the Month: Review of “Zero Trust Networks: Building Secure Systems in Untrusted Networks”

    by Ben Rothke on May 31, 2018

    The notion of a zero trust networks (ZTN) was created in 2010 by John Kindervag, then of Forrester. Kindervag felt that as enterprises moved slowly towards a data-centric world with shifting threats and perimeters, a new concept of what constituted a secure network had to be created. It was ahead of its time and to a degree still is. In a world of zero trust, all network traffic is considered…

  • Report: Many Companies Taking Status Quo Approach to Cyber Security at Their Own Peril

    by Tony Kontzer on May 29, 2018

    At the recent RSA Conference in San Francisco, attendees heard a lot of recognition that the cyber security landscape is in flux. A new generation of technologies that generate unprecedented amounts of data has changed the playing field, as has the rise of artificial intelligence. This has resulted not just in more things to secure and more insight to work with, it also has led to an adversary…

  • Hackers and Threats Abound For GDPR, Emperor Snoke

    by RSAC Editorial Team on May 24, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is the final post of a five-part monthly series we kicked off in January 2018 to take a look at how technology, topics and trends from the cybersecurity world compare to characters and themes from the blockbuster Star Wars films. We hope you enjoy our blog series in which the Resistance, filled with hope and determination, …

  • Proactivity and Speed Have Become Essential Components of Cybersecurity

    by Sean Cunningham on May 22, 2018

    Fundamentally, there are two major reasons why enterprises get breached despite ever-increasing cybersecurity budgets. They are typically related to insufficient proactive intelligent threat analysis and addressing advanced malware as it enters an enterprise computer system or network too slowly. Companies can take up to four months to address critical vulnerabilities and, on average, more than…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 21 Jun 2018 17:23:34 -0400.