We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back.
What were your favorite RSA Conference blog posts and videos in the month of August this year?
Top Blog Posts
1. Dissed by NIST: Wendy Nather takes a look at the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management. What does she think?
2. SMS Two-Factor Authentication Is No Longer Enough: With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging.
3. Mobile Security Vulnerabilities Are Creating Big Problems: Why has the mobile security space been so underserved? Sean Cunningham from Trident Capital Cybersecurity examines the issue.
Top Videos
1. On-Demand Virtual Session: How to Explain Cybersecurity to the Board Using a Simple Metaphor: FIRE: Using lessons from firefighting and the great fires of London and Chicago, this virtual session gave attendees metaphors and stories they can use to communicate core cybersecurity concepts to the C-Suite and to the board.
2. Security in the World-Sized Web: Information technology permeates all aspects of our lives. The combination of mobile, cloud computing, the IoT, persistent computing and autonomy are resulting in a World-Sized Web with great benefits but is vulnerable to a host of new threats. This talk will look at attempts to secure these systems and at technologies, laws, regulations, economic incentives and social norms we need to secure them in the future.
3. Are You Ready for a Breach? Cybercrime is a growth industry where the returns are great and the risks are low. As such, cybercrime has become the 'new normal' where EY have observed that the 'protect and control' mentality is no longer sufficient. In order to adequately address cyber-breaches, it is necessary for organizations to develop a strong, centralized response framework as part of the enterprise risk management strategy.