Showing Blog Posts: 1–10 of 47 tagged Peer2Peer

  • Internet Data Privacy Regulation: Not If, but How and by Whom

    by Andrea Little Limbago on May 8, 2019

    Internet Data Privacy Regulation: Not If, but How and by Whom When it comes to security and privacy legislation, what happens abroad does not stay abroad. While the United States remains muddled in a complex patchwork of state and industry-focused regulations, other countries are moving full-speed ahead to shape the future of digital security and privacy, with authoritarian frameworks gaining…

  • Peer2Peer Sessions: Maximizing Value, Submission Tips and More

    by RSAC Editorial Team on October 2, 2018

    Each year, one of the most exciting parts of RSA Conference we hear about from attendees are the Peer2Peer sessions. It’s a chance for peers to interact with one another and have a discussion. There is no presentation, no formal set up, no panel or Q&A format. It’s a chance to collaborate and listen to one another to help solve real issues in the cybersecurity industry. In this blog, we will look…

  • Cybersecurity Framework 1.1 Adoption Experiences and Opportunities

    by Timothy Shea on June 12, 2018

    The NIST Cybersecurity Framework was released in February 2014. At the 2015 RSA Conference I hosted a peer-to-peer (P2P) session on the framework: Cybersecurity Framework - Adoption Experiences and Opportunities. While the room was full, including participation from NIST - conveyors of the Framework – there were very few people who had implemented the Framework, but many who planned to. Also in…

  • Infiltration - Successes and Pitfalls of Penetrating Hostile Online Groups

    by Lance Cottrell on May 11, 2018

    Few security professionals choose to take control back from their opponents by bringing the fight to their doorstep. However, by working to infiltrate their groups, organizations are better equipped to combat fraud, discover new malware, or look for specific threats. In all cases, researchers and analysts need to avoid identification and the associated risk of blocking or reprisals. In the RSAC…

  • Talking to Non-Security Professionals—Metaphors, Language and More

    by RSAC Editorial Team on June 2, 2017

    By Maria Antonieta Flores This discussion focused on the “and More.” Participants deliberated about who to talk to and strategies for building alliances more than techniques for “talking.” We shared tips that can help us to succeed. My biggest takeaways were that there’s more to “talking” with non-security professionals than the words we use or even how we say them. The practices we follow, the…

  • Application Security Metrics: Where to Start?

    by RSAC Contributor on May 8, 2017

    By Caroline Wong Often, the people asking questions about application security (executives, regulators, auditors, customers) are not application security experts. They may ask the “wrong” questions unintentionally, because they’re trying to use success criteria that they are familiar with from other fields. It’s the responsibility of an application security professional to recommend the “right”…

  • Managing the Machine: More Like Building the Machine

    by RSAC Contributor on April 28, 2017

    By Paul Yates I had the incredible opportunity to facilitate a Peer-to-Peer session at RSAC 2017. My session was called “Managing the Machine: Strategies for Effective SecOps Management.” The session focused on common managerial techniques that can be applied by Security Operations managers to overcome the several challenges we face. I began the session by doing a few straw polls of the room to…

  • Post Conference Highlights from the RSAC 2017 P2P Session on Protecting ICS Networks from Cyberthreats

    by RSAC Contributor on April 26, 2017

    By Olasupo Lawal Session Description: In this session, participants focused on sharing practical insights in protecting ICS networks from cyberthreats. Session Highlights: The P2P session focused on 3 key areas: What are the common practical challenges in implementing cybersecurity practises in ICS environments? What are the practical steps one can take to address these challenges? The focus…

  • Continuous Purple Teaming: “Red Teaming for Success”

    by RSAC Contributor on April 25, 2017

    By Col. John Burger This session focused on the need for continuous testing and followed with a discussion on testing approaches, best practices, and lessons learned from the collective group. The participants provided a great mix of both commercial and government industries. Commercial sectors represented included energy, automotive, retail, financial and automotive. Government entities…

  • Incident Response in the Public Cloud

    by RSAC Contributor on April 21, 2017

    By Alex Maestretti Description: We held a session to discuss the unique challenges of conducting incident response in the public cloud. We had a great mix of attendees at the P2P session on Incident Response in the public cloud, including practitioners from cloud native companies as well as those from mature organizations just starting to move out of the datacenter. We started the conversation with…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2019 Editorial Calendar for more info. 

This document was retrieved from on Mon, 15 Jul 2019 15:12:31 -0400.