Menu

Blogs

Showing Blog Posts: 1–10 of 45 tagged Peer2Peer

  • Cybersecurity Framework 1.1 Adoption Experiences and Opportunities

    by Timothy Shea on June 12, 2018

    The NIST Cybersecurity Framework was released in February 2014. At the 2015 RSA Conference I hosted a peer-to-peer (P2P) session on the framework: Cybersecurity Framework - Adoption Experiences and Opportunities. While the room was full, including participation from NIST - conveyors of the Framework – there were very few people who had implemented the Framework, but many who planned to. Also in…

  • Infiltration - Successes and Pitfalls of Penetrating Hostile Online Groups

    by Lance Cottrell on May 11, 2018

    Few security professionals choose to take control back from their opponents by bringing the fight to their doorstep. However, by working to infiltrate their groups, organizations are better equipped to combat fraud, discover new malware, or look for specific threats. In all cases, researchers and analysts need to avoid identification and the associated risk of blocking or reprisals. In the RSAC…

  • Talking to Non-Security Professionals—Metaphors, Language and More

    by RSAC Editorial Team on June 2, 2017

    By Maria Antonieta Flores This discussion focused on the “and More.” Participants deliberated about who to talk to and strategies for building alliances more than techniques for “talking.” We shared tips that can help us to succeed. My biggest takeaways were that there’s more to “talking” with non-security professionals than the words we use or even how we say them. The practices we follow, the…

  • Application Security Metrics: Where to Start?

    by RSAC Contributor on May 8, 2017

    By Caroline Wong Often, the people asking questions about application security (executives, regulators, auditors, customers) are not application security experts. They may ask the “wrong” questions unintentionally, because they’re trying to use success criteria that they are familiar with from other fields. It’s the responsibility of an application security professional to recommend the “right”…

  • Managing the Machine: More Like Building the Machine

    by RSAC Contributor on April 28, 2017

    By Paul Yates I had the incredible opportunity to facilitate a Peer-to-Peer session at RSAC 2017. My session was called “Managing the Machine: Strategies for Effective SecOps Management.” The session focused on common managerial techniques that can be applied by Security Operations managers to overcome the several challenges we face. I began the session by doing a few straw polls of the room to…

  • Post Conference Highlights from the RSAC 2017 P2P Session on Protecting ICS Networks from Cyberthreats

    by RSAC Contributor on April 26, 2017

    By Olasupo Lawal Session Description: In this session, participants focused on sharing practical insights in protecting ICS networks from cyberthreats. Session Highlights: The P2P session focused on 3 key areas: What are the common practical challenges in implementing cybersecurity practises in ICS environments? What are the practical steps one can take to address these challenges? The focus…

  • Continuous Purple Teaming: “Red Teaming for Success”

    by RSAC Contributor on April 25, 2017

    By Col. John Burger This session focused on the need for continuous testing and followed with a discussion on testing approaches, best practices, and lessons learned from the collective group. The participants provided a great mix of both commercial and government industries. Commercial sectors represented included energy, automotive, retail, financial and automotive. Government entities…

  • Incident Response in the Public Cloud

    by RSAC Contributor on April 21, 2017

    By Alex Maestretti Description: We held a session to discuss the unique challenges of conducting incident response in the public cloud. We had a great mix of attendees at the P2P session on Incident Response in the public cloud, including practitioners from cloud native companies as well as those from mature organizations just starting to move out of the datacenter. We started the conversation with…

  • Wearables: Security of Things

    by RSAC Contributor on April 19, 2017

    By Marc Bown In this session, we discussed wearable security, taking into account considerations and constraints unique to wearables and IoT devices. In this session, we used Fitbit’s architecture and experience to frame a discussion around wearable security challenges and best practices. We explored threats that wearable devices face and considered how the unique constraints of wearable devices…

  • Security Sourcing: Peers Discuss What Functions to Outsource at RSAC 2017

    by RSAC Contributor on April 18, 2017

    By Kevin Fuller The Peer2Peer session "To Source or Not to Source. Is That Really the Question?" was very well-attended by security leaders across many verticals, offering a range of experience with regards to sourcing their security programs. Attendees shared what functions they have outsourced to a trusted third party, how they came to those decisions, and what their experience was in those…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 18 Jul 2018 06:47:46 -0400.