Menu

Blogs

  • Ditching Textbooks and Teaching Cybersecurity via News Headlines: Modern Times Call for Modern Measures

    by Tony Kontzer on August 14, 2017

    Leading image

    In a constantly changing field like cybersecurity, nothing stays the same for long. And as Jim Lewis, a senior VP at the Center for Strategic and International Studies, has learned first hand, this makes teaching about cybersecurity a challenge. Lewis this spring started teaching a section of a social engineering course to cybersecurity majors at the U.S. Naval Academy. Once it became apparent that the textbooks available to support the course were all several years old, Lewis opted to ditch…

  • A Conversation With NYU’s Professor Nasir Memon

    by RSAC Editorial Team on August 10, 2017

    As part of RSA Conference’s dedication to importance of security education our own Cecilia Marinier spoke with Nasir Memon, Professor of Engineering and Associate Dean for Online Learning at New York University Tandon School of Engineering. Memon has been an active member of the academic world promoting the importance of information security education since the late 1990s. Throughout this…

  • RSAC 2017 Abu Dhabi: Trends in Call for Speakers Submissions

    by Britta Glade on August 8, 2017

    RSA Conference 2017 Abu Dhabi will take place November 7 and 8 at the Emirates Palace with a great line up of speakers exploring topics that we know will be of interest to our attendees. How do we know we’ve hit the mark? It’s an extensive and iterative process with regional experts reviewing all of our speaking submissions, debating the merits of the different options with each other, weighing…

  • How to Get a Job in Cybersecurity

    by Jeannie Warner on August 7, 2017

    Every time someone comes to me for career advice, or asks where I think they should look for their next big opportunity, I say – “Consider a career in cybersecurity.” It is a huge field with a broad spectrum of job opportunities. When I enter the term “Security Analyst” into a LinkedIn job search, for instance, I find more than 11,000 jobs worldwide. A “Security Auditing” search nets another…

  • Navigating the Network: How Mentors Can Help Newbies Break into Cybersecurity

    by Sandy Carielli on August 3, 2017

    There’s an interesting paradox in the security industry. On the one hand, we are constantly being told that there is a dearth of talent in cybersecurity. Statistics like “one million open reqs” and “zero percent unemployment” get thrown around, creating the perception that security is the field to enter if you want a stable, long term career. As a result, more and more people are considering…

  • Recapping RSAC 2017 APJ

    by RSAC Editorial Team on August 1, 2017

    Just like that, another fantastic RSA Conference APJ comes to a close. What a week! RSAC APJ kicked off with two new Seminars, DevOps Connect: DevSecOps Edition and the Ransomware Seminar. The seminar rooms were packed with attendees learning the latest and greatest in the respective fields. Keynotes began on Wednesday afternoon featuring industry experts from Symantec, Qualys, RSA, and more. Track…

  • Ben's Book of the Month: Review of "Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency"

    by Ben Rothke on July 31, 2017

    This month’s book of the month theme is security strategy & operations. Without a strategy and effective operations; there is no information security. The Major League Baseball All-Star game is somewhat of an oddity. You take all of the best players, and have them play together for one night. For the rest of the season, what often separate a winning team from a losing one, is the ability of not…

  • Operationalizing Cybersecurity

    by Tom Conkle on July 27, 2017

    Operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows. Just like organizations can’t achieve safety; they cannot achieve cybersecurity. Therefore, having a well-defined organizational cybersecurity strategy is essential in keeping organizational security goals in mind. Board members are becoming increasingly aware of the requirements to implement…

  • What is Shaping Asia’s State of Security?

    by Britta Glade on July 25, 2017

    Walk down the streets of Jakarta or Jaipur, and you will be sure to see people browsing the latest news or streaming their favorite shows on their portable devices. This is no surprise since Asia Pacific is home to the world’s largest population of Internet users, bolstered by a strong mobile movement and a thriving millennial population. With the surge of connected devices in recent years comes…

  • Cyber Butts in Cyber Seats

    by Philip Reitinger on July 24, 2017

    One of the best-known episodes in the sitcom “Everybody Loves Raymond” concerns timeliness. Times for departure were specified as AIS, or A** In Seat, meaning that at the appointed time, you had to be seated in the car, or it left without you. You didn’t end up where you wanted, and you didn’t have a say in further decisions. The Trump Administration has made some good cyber security decisions so…

  • Fight The Growing Cybersecurity Challenge in Health Care

    by Amanda Gutshall on July 20, 2017

    All industries need a sound cybersecurity strategy and incident response plan, but that is especially the case for health care given that instances of data breaches are on the rise. In its 2017 Internet Security Threat Report, Symantec noted that health care was listed second in the services industry in cyberbreaches, up 22% in 2016 over 2015. Email attacks – in the form of phishing and ransomware…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 17 Aug 2017 01:47:55 -0400.
© 2017 EMC Corporation. All rights reserved.