Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. And they were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studios.
The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. The bad news: Visibility and governance take a huge hit. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance.
RSA CMO Holly Rollo and her adult daughter Emily find themselves in a unique position: They work at competing cybersecurity vendors. The Rollos open up on their backgrounds, careers and how the cybersecurity sector can grow through greater diversity.
Russia, China, North Korea, Iran - the major nation-state actors are well known to cybersecurity leaders. But how do their motivations and tactics differ? Sanjay Virmani of San Francisco's FBI office shares insight on the nation-state threat.
Elvis Chan is one of the FBI's foremost experts on election cybersecurity. And as the US marches toward the November presidential election, he is laser-focused on protecting the vote from foreign influence.
It's relatively easy to list an enterprise's cybersecurity priorities for 2020. But who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of Forescout.
The latest edition of the ISMG Security Report discusses the developing definition of "Insider Risk." Plus, Former DHS Secretary Michael Chertoff on U.S. 5G rollout plans; Cloud Security Alliance on containers and microservices.
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix.
Ten years since he coined the term "zero trust," John Kindervag, field CTO of Palo Alto Networks, sees CISOs increasingly being faced with the challenge of having to implement the "never trust, always verify" model across increasingly complex IT environments, including cloud and IoT.
Marc Rogers has been a hacker since the 1980s - notable as organizer of DEF CON - and he is pleased to see his unique set of skills now embraced by the industry and being used to make cybersecurity smarter and easier to use.