Menu

Blogs

Showing Blog Posts: 1–10 of 22 tagged Information Sharing

  • Catching Up With Carbon Black’s Ben Johnson

    by Jennifer Lawinski on June 27, 2016

    Ben Johnson is co-founder and Chief Security Strategist at Carbon Black, a partner of M.Tech. In his role he spends the majority of his time meeting with prospects, customers and partners to discuss cybersecurity strategy both with Carbon Black products and also across the stack. We caught up with him to talk about working for the NSA, the security industry and where he sees it evolving before…

  • How Not to Network a Nation: The Uneasy History of the Soviet Internet

    by Ben Rothke on June 15, 2016

    There are often questions or ideas that when you first hear them, you ask yourself: why didn’t I think of that? In How Not to Network a Nation: The Uneasy History of the Soviet Internet (MIT Press 978-0262034180), author Benjamin Peters (Professor, Department of Communication at the University of Tulsa) asks the simple question: why didn’t the Soviet Union create something akin to the Internet…

  • StoryCorps @ RSAC: Eureka Moments

    by Jennifer Lawinski on June 13, 2016

    Welcome to the StoryCorps @ RSAC podcast series! Every month we'll be featuring a different conversation between cybersecurity professionals about their lives, the industry and the future of cybersecurity. This month's conversation features friends and colleagues Wade Baker and Jay Jacobs. Baker, now Vice President, Strategy and Risk Analytics at ThreatConnect, is the creator of the Verizon Data…

  • Peers Talk Application, Network, and Infrastructure Vulnerability Management at RSAC 2016

    by RSAC Contributor on April 14, 2016

    By Dan Cornell, CTO, Denim Group I had the opportunity to lead a Peer2Peer session at RSAC 2016 that asked attendees to talk about how they do vulnerability management for different types of vulnerabilities. In particular, what I wanted to discuss were the similarities and differences in how organizations deal with network and infrastructure vulnerabilities versus application-level vulnerabilities. …

  • The Cybersecurity Act of 2015 Is a Necessary Stake in the Ground

    by Robert Ackerman Jr. on March 18, 2016

    The Cybersecurity Act of 2015 is approaching its three-month birthday, but you can be excused if you’re oblivious to that. After all, many people probably don’t know it even exists. Very quietly, the law—the first major piece of Congressional cybersecurity legislation, one designed to address the explosive growth of successful cyberattacks—was signed into law in mid-December 2015 by President…

  • Peer2Peer Sessions You Should Check Out at RSAC 2016

    by Jennifer Lawinski on February 12, 2016

    Are you thinking about attending any Peer2Peer sessions at RSA Conference this year? Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. This year we've once again asked the discussion facilitators to help explain what you can expect from their sessions so that you…

  • If You Don't Know Where You Are, How Do You Know Where You Are Going?

    by Tony Bradley on August 21, 2015

    Business intelligence and big data analytics are valuable tools for organizations. Collecting and analyzing the right metrics related to current and past performance helps businesses develop effective plans for the future. This is especially true when it comes to securing your network and protecting your data. Think of it like making a trip to the grocery store. You can just walk in and shop. You…

  • Gossip to Grownup: How Intelligence Sharing Developed

    by Wendy Nather on August 5, 2015

    From an evolutionary standpoint, there was probably not much difference for cavemen between saying, "Watch out for that saber-toothed cat," "Don't eat those berries," and "Don't get Gerf mad; she swings a mean tree branch." It was all about sharing information about threats. And we're still working out how to do that today, based on the new types of threats to our businesses, our social standing, …

  • Automobile Industry Joins ISAC Party

    by Fahmida Y. Rashid on July 15, 2015

    The automobile industry’s new intelligence sharing and analysis center (ISAC) will let automakers exchange threat information to better secure vehicles. The announcement comes amidst growing concerns over vehicular safety. Self-driving cars aren’t the only targets, as all the automation systems and controls in passenger cars are increasingly networked. More than 60 percent of all new vehicles by…

  • Congress is Moving Forward With Information Sharing, Will it Work?

    by Tony Kontzer on April 27, 2015

    Boosted by the U.S. House of Representatives considering — and ultimately passing — two separate cyber threat information-sharing bills last week, information sharing was top of mind for many attendees at RSA Conference last week. Having waited patiently for years as Washington debated the particulars of a complex issue, RSAC speakers had a lot of feelings about what information sharing means to…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Mon, 26 Sep 2016 18:25:36 -0400.
© 2016 EMC Corporation. All rights reserved.