Menu

Blogs

  • Addressing the Cybersecurity Talent Shortage

    by Antonio Garcia on March 23, 2017

    Leading image

    The current cybersecurity talent shortage is well-known to all industries and sectors, despite denials from the federal government. Today, companies must compete to attract and retain cybersecurity professionals who demand higher salaries and more generous benefits packages. While industries like finance and tech can afford to pay, many other sectors often cannot. These sectors often have limited resources, and for every investment in cybersecurity, like retaining an adequate level of expertise…

  • Internet of Things: Monster Sized Problems

    by Lawrence Dietz on March 22, 2017

    My Peer to Peer “IoT & SCADA: Lessons Learned and Case Studies” was standing room only with a line out the door waiting to get in. We had a mix of attendees with varying degrees of technical depth. We discussed some of the previous SCADA and Internet attacks such as Stuxnet and Mirai and looked at a hypothetical company that experienced two cyber incidents. The cyber incidents were created to offer…

  • Pursuing Excellence in the Digital Security Space

    by James DeLuccia on March 16, 2017

    Pursuing excellence and making a difference in your family, business, and profession requires the layering and extending of insight. It is more than simply going for the hot certification, attending the popular conference, or echoing the pundits like Bruce Schneier. We ALL need you to build upon these ideas, not follow them indiscriminately. It is the prudent intentional quality development of…

  • You Can’t Take It with You! How to Manage Security When Personnel Depart

    by Kenneth Morrison on March 15, 2017

    Personnel departures are common, not just from layoffs and terminations, but also resignations, reorganizations, and spin-offs. How do you deal with these from a security standpoint? How do you extinguish access, protect against data theft, and manage the data left behind? The RSA Conference 2017 Peer2Peer session You Can’t Take It with You! How to Manage Security When Personnel Depart provided…

  • Toss Out The Playbook to Staff the Security Team of the Future

    by Lior Div on March 13, 2017

    Staffing the security teams of the future requires discarding the playbook that’s currently followed when hiring defenders. Too often, companies hire people with similar backgrounds, whether it’s someone with extensive IT experience or a career spent setting up firewalls and defending networks. While possessing these foundations is very useful, diversity, stamina and the courage to speak up when…

  • Research Reveals Cyber Security Profession at Risk

    by Candy Alexander on March 9, 2017

    Do you know what your career path as a cybersecurity professional is? Have you ever really thought about it? Most don’t, as was reported in a recent study jointly published by the Enterprise Strategy Group (ESG) and the ISSA (Information Systems Security Association) in November 2016. The study reported that over 65% of the 437 professionals surveyed stated that they do not have a clear career…

  • American Spies: Modern Surveillance, Why You Should Care, and What to Do About It

    by Ben Rothke on March 6, 2017

    Return on investment (ROI) is a measure used to evaluate the efficiency of an investment. It measures the amount of return on an investment relative to its cost. To calculate ROI, the return of an investment is divided by the cost of the investment, and the result is expressed as a percentage or a ratio. If anyone would attempt to gauge the ROI spent by the National Security Agency (NSA) and…

  • Strategic Approach Needed to Navigate Cyber Security Skills Shortage

    by Christos K. Dimitriadis on March 3, 2017

    The rapidly expanding cyber security threat landscape calls for more robust, more sophisticated security programs. Improving security programs, though, requires the right personnel – a major obstacle given the state of the cyber security workforce. A fundamental disconnect exists between what employers expect and the caliber of cyber security candidates who are available for hire. According to…

  • The Passing of Howard Schmidt

    by Linda Gray Martin on March 2, 2017

    RSA Conference has learned of the passing of Howard Schmidt. A longtime speaker at our events and a leading light in the cybersecurity industry, there are few words that could capture all of his accomplishments and what this loss will mean to us as a community. For more than two decades, Howard’s career was focused on cybersecurity in both the public and the private sectors. In the public sector…

  • Ben's Book of the Month: Review of "Hospital and Healthcare Security"

    by Ben Rothke on February 28, 2017

    When I first requested a copy of Hospital and Healthcare Security (Butterworth-Heinemann 012-4200486), I assumed it was brief high-level reference on the topic. Upon getting this monster of a book, I read as Tom Smith wrote in the forward, “this is the bible of healthcare security”. At just over 700 pages, the book is indeed a comprehensive reference for everything related to hospital and…

  • Clarity is a Virtue

    by Jack Danahy on February 27, 2017

    Another packed RSA Conference has passed, and a crowd of companies spent their days explaining their value to prospects and customers. Small innovators competed for attention with the multi-story booths and thickly carpeted oases of some of the largest technology companies in the world. The competition was certainly noisy. Not just loud, as multiple presenters and speakers strove to be heard over…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 23 Mar 2017 08:21:37 -0400.
© 2017 EMC Corporation. All rights reserved.