Menu

Blogs

  • How Security Executives Can Feel Comfortable in The Boardroom and Server Room

    by Lior Div on May 25, 2017

    Leading image

    With security ranking as a top concern at every company, you’re likely to find CISOs and CSOs who are equally comfortable in the boardroom and the server room. Security leaders now play a role that goes beyond traditional security duties and encompasses contributing to critical elements of the business. To excel in these expanded positions, security leaders need more than IT acumen and a strong understanding of security. The new essential skills encompass being able to clearly articulate the…

  • The WannaCry Takeaway: Federal Governments Let Us Down

    by Tony Kontzer on May 23, 2017

    If you WannaCry now, just wait. You may WannaCry a lot more down the line unless federal governments do a much better job of protecting their critical IT systems. The WannaCry ransomware outbreak that first hit the U.K.'s National Health Service and subsequently spread around the world, infecting a Spanish telecom company, a Russian cell phone carrier, French automaker Renault and countless other…

  • The Unicorn Extinction Series: An Introspective Analysis of Women in Cybersecurity, Part 2

    by MacKenzie Brown on May 22, 2017

    In part one of this series, we examined the diversity problem in Cybersecurity and learned about the Unicorn Law. While both seem almost silly to bring up in todays professional world, it is hard to miss things that are perfectly observable to women and men alike. Analyzing a Woman’s Point of View Innovating solutions to improve this scarcity of female representation, requires breaking “the first…

  • Cyber Pearl Harbor, Global Pandemic or Alien Invasion?

    by Todd Inskeep on May 18, 2017

    For over twenty years, experts have warned of a “Cyber Pearl Harbor.” Like the Dec.7, 1941 attack, this cyber-attack would both create tremendous damage and galvanize organizations, particularly in the US, to improve computer and information security. For nearly as long, other experts have spoken against this scenario, positing alternative scenarios and analogies. All-in-all, there’s been a…

  • From Tech Expert to Boardroom Staple: The CISO Role is Evolving

    by Feris Rifai on May 18, 2017

    History is repeating itself. It may surprise you to learn that before Sarbanes Oxley passed in 2002, having a director that was a financial expert in the American corporate boardroom was not the norm. In fact, CFOs who were originally thought of as financial gatekeepers are more than ever before held accountable for the integrity, accuracy and traceability of the financial information presented…

  • Reactions to the US Cybersecurity Executive Order

    by RSAC Editorial Team on May 16, 2017

    After months of waiting, the security industry received an update from the US government on its promised focus on cybersecurity. Late last week President Trump signed the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Although other recent policies have been met with a variety of opinions across both sides of the aisle, this…

  • The Mounting Case to Secure Access and Stop Career-Ending Breaches

    by James Stickland on May 16, 2017

    10 years ago, CIOs did not have a place of prominence at the C-Suite table. Today, that has changed in a major way as executives at every level across the enterprise are rethinking effective risk management solutions. In fact, there is such a need for leadership in this evolving role that the chief technology position has spawned many variations of itself, including CTO, CDO, CSO, CISO, etc. …

  • WannaCry Ransomware: What We Know So Far

    by RSAC Editorial Team on May 16, 2017

    Late in the day on Friday, May 12, a massive ransomware attack hit 200K organizations in 150 countries. The ransomware that has been named “WannaCry,” took advantage of Windows systems that had not yet been updated with Microsoft’s March security patch. Per the ransomware playbook, this attack locked people out of their computers, encrypted files and demanded those impacted pay up to $300 in…

  • Rethinking the Approach to Cybersecurity

    by Bryce Boland on May 15, 2017

    Asian organizations have made significant progress on improving their cybersecurity over the past year. That’s the good news. Now the other side of that: FireEye research shows that Asia Pacific organizations face heightened threat levels. Due to geopolitical tensions and increasingly sophisticated criminal groups, the area’s threat activity isn’t likely to drop any time soon. Making matters…

  • Cybersecurity Spending: How Much is Enough?

    by Theresa Payton on May 11, 2017

    Any C-Suite Executive has asked the following question: Do I spend another dollar on cybersecurity instead of putting that money towards improving my customer’s experience? C-Suite Executives routinely turn this question over to my team for answers. A common theme that we report back is: cybersecurity as we know it is fundamentally broken. Technologies that were cutting-edge two decades ago are…

  • Application Security Metrics: Where to Start?

    by RSAC Contributor on May 8, 2017

    By Caroline Wong Often, the people asking questions about application security (executives, regulators, auditors, customers) are not application security experts. They may ask the “wrong” questions unintentionally, because they’re trying to use success criteria that they are familiar with from other fields. It’s the responsibility of an application security professional to recommend the “right”…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 25 May 2017 06:45:40 -0400.
© 2017 EMC Corporation. All rights reserved.