• South by South Security: Blockchain, IoT, cyber legislation and more

    by RSAC Editorial Team on March 24, 2017

    Q1 can be an interesting time for many members of our community. Kicking off a new year typically means starting new budgets, new campaigns for various products/services and visiting tradeshows across the globe to meet with prospective customers. We appreciate the time our community spends in our halls, knowing many of them also have events like HiMSS, Mobile World Congress and SXSW on their…

  • Addressing the Cybersecurity Talent Shortage

    by Antonio Garcia on March 23, 2017

    The current cybersecurity talent shortage is well-known to all industries and sectors, despite denials from the federal government. Today, companies must compete to attract and retain cybersecurity professionals who demand higher salaries and more generous benefits packages. While industries like finance and tech can afford to pay, many other sectors often cannot. These sectors often have limited…

  • Internet of Things: Monster Sized Problems

    by Lawrence Dietz on March 22, 2017

    My Peer to Peer “IoT & SCADA: Lessons Learned and Case Studies” was standing room only with a line out the door waiting to get in. We had a mix of attendees with varying degrees of technical depth. We discussed some of the previous SCADA and Internet attacks such as Stuxnet and Mirai and looked at a hypothetical company that experienced two cyber incidents. The cyber incidents were created to offer…

  • Pursuing Excellence in the Digital Security Space

    by James DeLuccia on March 16, 2017

    Pursuing excellence and making a difference in your family, business, and profession requires the layering and extending of insight. It is more than simply going for the hot certification, attending the popular conference, or echoing the pundits like Bruce Schneier. We ALL need you to build upon these ideas, not follow them indiscriminately. It is the prudent intentional quality development of…

  • You Can’t Take It with You! How to Manage Security When Personnel Depart

    by Kenneth Morrison on March 15, 2017

    Personnel departures are common, not just from layoffs and terminations, but also resignations, reorganizations, and spin-offs. How do you deal with these from a security standpoint? How do you extinguish access, protect against data theft, and manage the data left behind? The RSA Conference 2017 Peer2Peer session You Can’t Take It with You! How to Manage Security When Personnel Depart provided…

  • Toss Out The Playbook to Staff the Security Team of the Future

    by Lior Div on March 13, 2017

    Staffing the security teams of the future requires discarding the playbook that’s currently followed when hiring defenders. Too often, companies hire people with similar backgrounds, whether it’s someone with extensive IT experience or a career spent setting up firewalls and defending networks. While possessing these foundations is very useful, diversity, stamina and the courage to speak up when…

  • Research Reveals Cyber Security Profession at Risk

    by Candy Alexander on March 9, 2017

    Do you know what your career path as a cybersecurity professional is? Have you ever really thought about it? Most don’t, as was reported in a recent study jointly published by the Enterprise Strategy Group (ESG) and the ISSA (Information Systems Security Association) in November 2016. The study reported that over 65% of the 437 professionals surveyed stated that they do not have a clear career…

  • American Spies: Modern Surveillance, Why You Should Care, and What to Do About It

    by Ben Rothke on March 6, 2017

    Return on investment (ROI) is a measure used to evaluate the efficiency of an investment. It measures the amount of return on an investment relative to its cost. To calculate ROI, the return of an investment is divided by the cost of the investment, and the result is expressed as a percentage or a ratio. If anyone would attempt to gauge the ROI spent by the National Security Agency (NSA) and…

  • Strategic Approach Needed to Navigate Cyber Security Skills Shortage

    by Christos K. Dimitriadis on March 3, 2017

    The rapidly expanding cyber security threat landscape calls for more robust, more sophisticated security programs. Improving security programs, though, requires the right personnel – a major obstacle given the state of the cyber security workforce. A fundamental disconnect exists between what employers expect and the caliber of cyber security candidates who are available for hire. According to…

  • The Passing of Howard Schmidt

    by Linda Gray Martin on March 2, 2017

    RSA Conference has learned of the passing of Howard Schmidt. A longtime speaker at our events and a leading light in the cybersecurity industry, there are few words that could capture all of his accomplishments and what this loss will mean to us as a community. For more than two decades, Howard’s career was focused on cybersecurity in both the public and the private sectors. In the public sector…

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from on Sat, 25 Mar 2017 21:44:23 -0400.
© 2017 EMC Corporation. All rights reserved.