Menu

Blogs

Showing Blog Posts: 1–10 of 1592

  • The CISO Speaks: Scott Niebuhr of The Aerospace Corp. on Cyber Security Staffing Challenge

    by Tony Kontzer on June 27, 2019

    As if hiring cyber security staff wasn't challenging enough, now this: According to a Robert Half International survey, two-thirds of IT decision-makers plan to hire full time employees in the second half of 2019, and their top priority? Bringing in fresh cyber security skills. Given that this is an issue that weighs on pretty much every cyber security executive we speak with, it seemed an ideal…

  • A Privacy-Driven Security Culture

    by Jason Lau on June 26, 2019

    It’s hard to go a day without seeing news of a data breach affecting thousands (to even millions of people). What additional skill sets can cybersecurity pros arm themselves with to tackle the new challenges that lie ahead? What frameworks can be used to help promote a security- and privacy-driven culture in an organization? ISC2, the certification body in charge of the popular CISSP…

  • Achieving Warp Speed: Making Sure Your Security Infrastructure is Up to Snuff Will Supercharge Your Incident Responses

    by Tony Kontzer on June 25, 2019

    When James Kirk found his beloved starship Enterprise unresponsive at a moment in which he and his crew faced seemingly hopeless odds, he would press the communication button on his captain's chair and bark something at his chief engineer like, "Scotty, we need warp speed in 3 seconds or we're all dead!" In many ways, Captain Kirk was speaking for future cyber security leaders everywhere. …

  • Infrastructure Cybersecurity is Wanting

    by Robert Ackerman Jr. on June 21, 2019

    Just over six months ago, President Trump signed into law the Cybersecurity and Infrastructure Security Agency Act (CISA), created to better protect the nation’s critical infrastructure from physical and cyber threats – a mission requiring coordination and collaboration among a broad spectrum of government and private companies. It’s still early, but not too soon to pose the question of whether…

  • Book review: The Official (ISC)² Guide to the CISSP CBK Reference

    by Ben Rothke on June 18, 2019

    This is not my first review of a Certified Information Systems Security Professional (CISSP) test preparation guide, and it certainly won’t be the last. With the growing demand for information security professionals, and the often hiring requirement for certification, the CISSP is considered the gold-standard of certification in the information security space. As test takers desperately need…

  • RSAC Unplugged 2019: Bangkok & Thailand Cybersecurity Week

    by Britta Glade on June 17, 2019

    At RSA Conference, we are committed to connecting the cybersecurity community with the people and information it needs to help make organizations and individuals more secure. We know there is power in sharing and learning from one another, growing networks and working together to make the world a safer place. That’s why we’re delighted to partner with ETDA (Electronic Transactions Development…

  • The Future of Companies and Cybersecurity Spending

    by Heidi Thiel on June 14, 2019

    These days, major data breaches are becoming a common occurrence. From the Marriott scandal last year to the Yahoo! and Target breaches of 2013, it’s becoming more and more evident that even the largest companies are vulnerable to hackers. This makes it even more important that corporations focus on a thorough and well-funded cybersecurity plan, something that used to be thought of as a formality…

  • Threats Are Omnipresent But You Have Options

    by Patrick McGlone on June 11, 2019

    The think tank Center for Strategic and International Studies puts the cost of global cybercrime at the equivalent of nearly S$819 billion per year. It estimates that up to a third of that cost is borne by East Asia and the Pacific, the highest of any region analyzed. Singapore, meanwhile, boasts a GDP within the top fifty nations, worldwide. This economic success makes it a target for cybercrime…

  • RSAC’s New Leadership: A Conversation with Linda Gray Martin

    by RSAC Editorial Team on June 11, 2019

    Some big changes are afoot at RSAC, specifically with our leadership: Sandra Toms, who helped spearhead RSAC for two decades, has moved on, with her co-pilot along much of that journey, Linda Gray Martin, stepping in to take the reins. Linda has been a senior leader of RSAC for over 13 years and has been instrumental in the growth and continued success of our Conferences across the world. As RSAC…

  • EternalBlue Comes Home to Roost, In Baltimore: Will We Learn From Our Mistakes?

    by Tony Kontzer on June 10, 2019

    If there's one thing we don't need at this juncture, it's our own government's cyber weapons being used against us. Yet, it seems that may be what happened in early May when city workers in Baltimore, MD, were greeted by locked screens and messages demanding a ransom to free up hijacked files. According to a New York Times report, the attackers froze computers and shut down email, and perhaps most…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 & 2019 Editorial Calendars for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 27 Jun 2019 08:14:13 -0400.