• Lessons from Managing Your Open Source

    by RSAC Contributor on March 28, 2017

    Leading image

    By Joshua Bressers During the RSA Conference, I hosted a Peer 2 Peer on how to manage your open source. The purpose of the session was to have a discussion about how the participants were securely managing the open source their organizations were using. It’s no secret these days that nearly every organization is using open source to solve their challenges. Everything from containers running infrastructure to developers leveraging existing code in applications to add complex features quickly. …

  • Cybersecurity Jobs Go Begging

    by Robert Ackerman Jr. on March 27, 2017

    In an era in which we chronically hear about a profusion of new low-paying jobs, there is a challenging and diversified specialty – the cybersecurity professional– that pays well and offers good advancement potential. And yet, we can’t come close to filling the demand for these types of workers. Security pros protect critical information, which means they have an immediate impact on the…

  • Ransomware Gets More Personal Through Mobile

    by Bill Taylor-Mountford on March 24, 2017

    When ransomware took centerstage a few years ago, we failed to anticipate its magnitude and severity. 2016 was the year when ransomware dominated headlines as it exploded to become one of the biggest security wakeup calls for CXOs. That year the FBI estimated that ransomeware could be a $1 billion source of illicit income for cyber criminals, and, a survey by Osterman Research showed that 39…

  • South by South Security: Blockchain, IoT, cyber legislation and more

    by RSAC Editorial Team on March 24, 2017

    Q1 can be an interesting time for many members of our community. Kicking off a new year typically means starting new budgets, new campaigns for various products/services and visiting tradeshows across the globe to meet with prospective customers. We appreciate the time our community spends in our halls, knowing many of them also have events like HiMSS, Mobile World Congress and SXSW on their…

  • Addressing the Cybersecurity Talent Shortage

    by Antonio Garcia on March 23, 2017

    The current cybersecurity talent shortage is well-known to all industries and sectors, despite denials from the federal government. Today, companies must compete to attract and retain cybersecurity professionals who demand higher salaries and more generous benefits packages. While industries like finance and tech can afford to pay, many other sectors often cannot. These sectors often have limited…

  • Internet of Things: Monster Sized Problems

    by Lawrence Dietz on March 22, 2017

    My Peer to Peer “IoT & SCADA: Lessons Learned and Case Studies” was standing room only with a line out the door waiting to get in. We had a mix of attendees with varying degrees of technical depth. We discussed some of the previous SCADA and Internet attacks such as Stuxnet and Mirai and looked at a hypothetical company that experienced two cyber incidents. The cyber incidents were created to offer…

  • Pursuing Excellence in the Digital Security Space

    by James DeLuccia on March 16, 2017

    Pursuing excellence and making a difference in your family, business, and profession requires the layering and extending of insight. It is more than simply going for the hot certification, attending the popular conference, or echoing the pundits like Bruce Schneier. We ALL need you to build upon these ideas, not follow them indiscriminately. It is the prudent intentional quality development of…

  • You Can’t Take It with You! How to Manage Security When Personnel Depart

    by Kenneth Morrison on March 15, 2017

    Personnel departures are common, not just from layoffs and terminations, but also resignations, reorganizations, and spin-offs. How do you deal with these from a security standpoint? How do you extinguish access, protect against data theft, and manage the data left behind? The RSA Conference 2017 Peer2Peer session You Can’t Take It with You! How to Manage Security When Personnel Depart provided…

  • Toss Out The Playbook to Staff the Security Team of the Future

    by Lior Div on March 13, 2017

    Staffing the security teams of the future requires discarding the playbook that’s currently followed when hiring defenders. Too often, companies hire people with similar backgrounds, whether it’s someone with extensive IT experience or a career spent setting up firewalls and defending networks. While possessing these foundations is very useful, diversity, stamina and the courage to speak up when…

  • Research Reveals Cyber Security Profession at Risk

    by Candy Alexander on March 9, 2017

    Do you know what your career path as a cybersecurity professional is? Have you ever really thought about it? Most don’t, as was reported in a recent study jointly published by the Enterprise Strategy Group (ESG) and the ISSA (Information Systems Security Association) in November 2016. The study reported that over 65% of the 437 professionals surveyed stated that they do not have a clear career…

  • American Spies: Modern Surveillance, Why You Should Care, and What to Do About It

    by Ben Rothke on March 6, 2017

    Return on investment (ROI) is a measure used to evaluate the efficiency of an investment. It measures the amount of return on an investment relative to its cost. To calculate ROI, the return of an investment is divided by the cost of the investment, and the result is expressed as a percentage or a ratio. If anyone would attempt to gauge the ROI spent by the National Security Agency (NSA) and…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from on Tue, 28 Mar 2017 13:56:39 -0400.
© 2017 EMC Corporation. All rights reserved.