Menu

Blogs

Showing Blog Posts: 1–9 of 9 tagged Security Strategy

  • Does Your Cybersecurity Strategy Include Jedi Knights and Imperials?

    by Dave Lewis on November 21, 2017

    What makes for a good cyber security strategy? There are all sorts of directions we could take this discussion. For instance, do you handle security issues in a reactive or proactive manner? Do you become unnecessarily preoccupied by the possible threat posed by the sharks in the ocean? Or better still, on how you will deal with all of the potential eventualities that could spring forth from that…

  • The Best Cybersecurity Programs Put Employee Training First

    by Robert Ackerman Jr. on November 14, 2017

    Timely advice about creating a worthwhile corporate cybersecurity strategy sagely starts today by realizing that establishing firewalls and relying on the IT department to monitor attacks isn’t sufficient. Reactive strategies break down over time, making proactive strategies crucial. Further, defensive strategies work only within centralized, controlled and managed-device networks – all now…

  • Don’t Be a Spreadsheet Junkie

    by Humphrey Christian on November 8, 2017

    Let’s face it. Most of us have some sort of dependence on Excel and PowerPoint. They serve as our centerpiece for aggregating data and building corporate presentations. However, when it comes to cyber security, neither one should be involved. They slow down the process, leave too much leeway for data “massaging” and create inconsistencies up, down and across the organization. Yet surprisingly, at…

  • Building the Right Security Budget

    by Todd Inskeep on September 13, 2017

    September, and Fall, signal the harvest for farmers, and for CISOs. The project seeds that were planted earlier in the year are getting implemented and showing results. This is also the time when planning starts for next year. In farming terms: what crops and seeds are needed; where do you fertilize; and which fields need rotating? For CISOs the planning and budget process often starts and stops…

  • Ben's Book of the Month: Review of "Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency"

    by Ben Rothke on July 31, 2017

    This month’s book of the month theme is security strategy & operations. Without a strategy and effective operations; there is no information security. The Major League Baseball All-Star game is somewhat of an oddity. You take all of the best players, and have them play together for one night. For the rest of the season, what often separate a winning team from a losing one, is the ability of not…

  • Operationalizing Cybersecurity

    by Tom Conkle on July 27, 2017

    Operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows. Just like organizations can’t achieve safety; they cannot achieve cybersecurity. Therefore, having a well-defined organizational cybersecurity strategy is essential in keeping organizational security goals in mind. Board members are becoming increasingly aware of the requirements to implement…

  • Effective Cyber Security is All About the Benjamins

    by Humphrey Christian on July 10, 2017

    Who can forget the famous Jerry Maguire quote, “Show me the money!” Fans have referenced it for decades in various contexts for obvious reasons. Money drives decisions, ideas and actions. In enterprises, almost every major decision is driven by money, a.k.a ‘value at risk,’ except when it comes to cyber risk. Attempts thus far to quantify the financial impact of cyber risk have fallen short. The…

  • Digital Smoke Jumpers: Preventing a GDPR Disaster

    by Guy Bejerano on July 5, 2017

    Smoke Jumpers are an elite element of the U.S. Forest Service. They are the men and women trained to jump out of airplanes and into the heart of a forest fire. As a fire rages across rugged terrain inaccessible to conventional equipment, Smoke Jumpers act to stall the fire’s advance. Often they will use techniques that literally “fight fire with fire.” Controlled burns are executed in an inferno’s…

  • Cyber Laws and Regulations Make Sense but Must Be Strengthened

    by Robert Ackerman Jr. on June 23, 2017

    Almost everybody knows by now that many of our activities have become dependent upon computer systems, data networks and various electronic devices – and that the movement toward hyper connectivity confronts a relentless siege from constantly evolving cyber threats and vulnerabilities. Most companies have their hands full, and far too many are being breached despite their sharply heightened focus…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2017 Editorial Calendar or 2018 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 22 Nov 2017 20:56:21 -0500.
© 2017 EMC Corporation. All rights reserved.