RSA Conference 公开
[search 0]
更多

Download the App!

show episodes
 
Information is power. And wherever there’s power, there are people looking to steal it. But that’s also where you’ll find us. We’re RSA Conference. And we’re here to stand against cyberthreats around the world. That means being here for you. Connecting you with the people and insights that will empower you to stay ahead of cyberthreats. We do this through our online outreach and with our events around the globe. And we make a great host, if we do say so ourselves. Some say it’s impossible to ...
 
Loading …
show series
 
Though concerns over election security did not begin with the 2016 Presidential election, new and emerging threats coupled with an expanding attack surface have exacerbated what were already major security concerns for municipalities, states and the federal government. So what is the current risk environment and what has changed in CISA and the FBI…
 
Networking has many advantages and has the potential to open doors of opportunity, but how do you identify the right people to network with? What do you bring to the table and what are you looking for from others? Join us for an engaging exchange with two industry leaders who will share their perspectives on the value of education, experience and r…
 
Agility is not a strategy, and Zero Trust is not a product you can buy. In a Zero Trust approach as identity becomes more important than ever, managing the lifecycle correctly is critical, during provisioning, use as well as destruction. These are some of the reasons why Zero-trust architecture is becoming the defacto segmentation approach in our d…
 
COVID-19 has forced enterprises to adopt new ways of working in order to ensure their data remains protected as they navigate the impacts of the global pandemic and manage a distributed workforce. As more employees work remotely and an organization’s attack surface area increases, it’s never been more important to invest in security. At the same ti…
 
As Camille Stewart wrote, “Cyber diplomacy and international cyber capacity building are better served by having diverse representation that understands the cultural nuances that determine how technology will move through a society.” Similarly, when it comes to managing security risk management programs, diversity matters. Risk management has many …
 
Having a communications person as part of the security organization ensures that the enterprise communicates security not only through awareness programs but also across silos. A security communications lead plays a critical role in developing and executing incident response plans as well as other security policies that impact the business. In orde…
 
Security vendors come to the rescue with AI and automation to save the day. But even smart technology can only go so far, and while it can definitely help lessen the noise, it can never replace the intuition, inventiveness and insight of a human.Technology can’t replace humanity in security defense because endpoint lockdowns don’t work, and repetit…
 
Security is one of the most evolving and impactful landscapes in the regulatory sphere. Proposed initiatives in the areas of Internet of Things (IoT) security and Coordinated Vulnerability Disclosure (CVD) are among the most active and developing areas of security regulation around the world. The vulnerability disclosure landscape has been rapidly …
 
As the world continues to navigate what a “return to work” environment will look like and how that will play out for businesses, many are concerned about contact tracing, their role in becoming a point of contact and the privacy concerns inherent in the collection of all that data. In this podcast, we will be talking with privacy experts who will d…
 
Pieter Danhieux and Fatemah Beydoun both have a long history of working remotely, but as their company moved to a completely remote work environment in response to the COVID-19 global pandemic, it presented its own set of challenges... along with some very compelling benefits. This unprecedented situation has shown many companies that remote work i…
 
Yes, there are enterprise tools security teams are using to mitigate the vulnerabilities of a remote workforce, but with all the connected devices in a given home, they need to help of their employees. In this podcast, we will talk with consumer-facing security pros who can provide steps your remote workforce can take to shore up their home network…
 
As countries across the globe work through various phases of opening and trying to return to a new COVID-19-tinged normal, contact tracing is a core tenant to many plans. The slippery slope of providing data to authorities to understand if shelter at home guidance is being followed to potentially using this data to alert individuals to potential ex…
 
Life can be downright overwhelming at times. With the stress of work and home life, one’s personal well-being can often take a back seat—but it shouldn’t. When you’re not sleeping well or sleeping at all, it has a dramatic effect on your job performance and your overall mood. Join us in this open and frank discussion why cybersecurity professionals…
 
Right now we are in what Matthew Chiodi, CSO Public Cloud, Palo Alto Networks, calls the Opportunity. There is a temptation when events like this happen to be narrowly focused on just keeping the lights on. The Opportunity Zone presents three unique opportunities: Time to reflect, Time to transform and Time to experiment. In this podcast Chiodi wil…
 
When managing an incident, communication is critical. In this podcast Kim Albarella Senior Director, Global Security Organization Security Advocacy at ADP will share tips for efficient and effective communications. We’ll also discuss what lessons ADP has learned through the pandemic and how businesses can apply those lessons to their future crisis …
 
Supply chains are disrupted across all industries, which makes for back-ordered webcams and many other products being unavailable. But what happens when mission-critical services completely go down? What are the cybersecurity challenges that organizations have been faced with because of the impact of the global pandemic, and how can security teams …
 
Threats evolve and change, but many of the threats in the attacker’s playbook are hardly new. They have been around for a while. What has changed in recent weeks is the threat landscape, but why and how? In this podcast we will look at how a global crisis can change the threat landscape and how industries can work together to effectively navigate t…
 
Across all sectors, security teams are dealing with an increased number of incidents. In our latest podcast, Tim Bandos, Vice President, Cybersecurity at Digital Guardian and Jennifer Ayers, VP, OverWatch and Security Response at CrowdStrike discuss what you can do right now to improve incident response, specifically when working remotely.…
 
Industry leaders across the globe joined together at RSA Conference 2020 to talk security. During one of those talks, Mobile MFA Madness: Mobile Device Hygiene and MFA Integrity, the presenters demonstrated how easy it is to compromise mobile authenticator apps. Then the world went mobile—with employees either working remotely on corporate devices …
 
Sit in on a fascinating discussion with David Ruiz and Diana Freed, two security professionals who are passionate about the threats posed by surveillance tools, particularly spyware and stalkerware. They’ll describe the work they’ve been doing independently and collaboratively to help protect victims and their personal data from unwanted surveillan…
 
While physical security has traditionally reigned supreme within the industrial and manufacturing sector, disruptive attacks such as NotPetya demonstrate the need to adapt IT security best practices to an OT environment. In this podcast, Britta Glade talks to Johnson & Johnson’s Roy Gundy and Rockwell Automation’s Dawn Cappelli about how CISOs and …
 
As cybersecurity continues to encompass more areas of our lives, the value of different perspectives becomes increasingly clear. In this podcast, Britta Glade and Hugh Thompson talk to KnowBe4’s Perry Carpenter and cybersecurity consultant Prudence Smith about the benefits of a diverse workforce—not only for individual companies, but for the indust…
 
Though incident response (IR) is a key component of any cybersecurity protocol, it’s also surrounded by misconceptions that give rise to a number of questions. Are a security event and incident the same? Will machines soon outperform humans in the arena of IR? Are threat actors truly that much more advanced? To help separate fact from fiction, Brit…
 
The City of Baltimore’s recent ransomware incident not only caught government servers by surprise. It also jolted the industry as a stark reminder that cyberattacks can still occur where and when they’re least expected. Not the most comforting prospect—but are there constructive takeaways to be gleaned in the aftermath?Helping us uncover these silv…
 
GDPR is not even a year old but in that short time, it’s dramatically changed how companies handle and are held accountable for the data they use. But beyond companies, the main purpose of GDPR was to protect and empower consumers. So, how well is it working? With the help of Bree Fowler, Technology Writer at Consumer Reports and John Elliott, Data…
 
As cybersecurity seeps deeper into so many areas of our lives, it’s more important than ever for technology creators and policy makers to work together for the benefit of society as a whole. That’s the backdrop for our new track at RSAC 2019, Bridging the Gap: Cybersecurity + Public Interest Tech, brought to you in partnership with Bruce Schneier a…
 
Get a head start on Boot Camp with our CISO-focused February podcast episode. In it, RSAC CISO Boot Camp speakers, Dawn Cappelli, VP Global Security and CISO of Rockwell Automation, and Tim Callahan, SVP of Global Security and Chief Security Officer of Aflac Inc., will share their vision for RSAC CISO Boot Camp and preview topics that’ll be covered…
 
As it turns out, the weakest link in any cybersecurity solution is…us. More than ever, hackers are using a variety of social engineering scams designed to fool people into giving up personal information voluntarily. So how do you protect us from ourselves? Join hosts Britta Glade and Hugh Thompson and their guests Ira Winkler of Secure Mentem and L…
 
Every year, RSA Conference receives hundreds of submissions from potential speakers. It’s the job of the RSAC Program Committee to examine every submission. Taken as a whole, these submissions form a fascinating view into the trends that will affect the industry in 2019 and beyond. In this podcast, you’ll hear from six Program Committee members as …
 
In the 15 years since cybersecurity first received an October shout-out, technology has grown in leaps and bounds. But one thing that’s remained constant? The vital role that humans play in not only creating these advancements, but in driving their success and—often unknowingly—contributing to their limitations. In this episode, we talk with two aw…
 
Britta Glade and Dr. Hugh Thompson delve into the latest cybersecurity technology developments with Microsoft’s Diana Kelley and Denim Group’s John Dickson.Topics to be covered include:•What is data gravity and how can it help analysts in the SOC/CDOC?•How can security strategies be adapted for DevOps application developments?•What are the advantag…
 
Tasked with creating a cybersecurity policy framework, the National Institute of Standards and Technology (NIST) had its work cut out for it—and then some. After all, it’s one thing to agree that organizations and the nation’s critical infrastructure need to be protected. And another to find common ground on how best to proceed. In this episode, we…
 
Cybersecurity has come a long way. But unfortunately, with every bit of progress the industry makes, threats and risks are never far behind. Especially now, in the midst of a turbulent political atmosphere, cyberattacks put everything from personal data to personal liberties at stake, leaving our government to address the biggest uncertainty of all…
 
Loading …

快速参考指南

Google login Twitter login Classic login