+ All Categories
Home > Documents > Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2...

Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2...

Date post: 06-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
16
#RSAC Bri$a Glade Dr. Hugh Thompson Mapping RSA Conference Speaker Submissions to Security Market Trends
Transcript
Page 1: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC  

Bri$a  Glade      

Dr.  Hugh  Thompson  

Mapping  RSA  Conference  Speaker  Submissions  to  Security  Market  Trends  

Page 2: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Agenda  

2  

A  peek  behind  the  curtain  of  the  RSA  Conference  submission  process  

A  graphical  view:  the  2016  word  cloud  

Big  trends,  topics  and  ideas  

Key  dates  for  RSA  Conference  

Page 3: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Submission  Topics  2016  

3  

Advanced  Targeted  A$acks   IdenIty  Management   Research  

ApplicaIon  Security  &  DevOps   Insider  Threats   Security  AnalyIcs  &  Incident  Response  

Awareness  &  EducaIon   Internet  of  Things    Security  Services  

Big  Data   Law   Security  Trends  

Cloud  Security   Metrics   Social  Engineering  

Cybercrime   Mobile  Security   Social  Networking  

Cyber  Warfare   Network  Security   Strategy  &  Architecture  

Data  Security   Physical  Security  &  CriIcal  Infrastructure  

Supply  Chain  Security  

 Endpoints   Policy  &  Government   Threat  Intelligence  

Governance,  Risk  &  Compliance  

Privacy   VirtualizaIon  

Hackers  &  Threats   Professional  Development   War  Stories  &  Case  Studies  

Page 4: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Tracks  Created  from  Submissions  

4  

AnalyIcs  &  Incident  Response  

Human  Element     Privacy    

ApplicaIon  Security  &  DevOps    

IdenIty   Professional  Development  

C-­‐Suite  View   Industry  Experts   ProtecIng  Data  &  Applied  Crypto  

Cloud  Security  &  VirtualizaIon    

Law   RSAC  TV  Studio  

Governance,  Risk  &  Compliance  

Mobile  Security   Security  Mashup    

Hackers  &  Threats   Policy  &  Government   Security  Strategy  

Hackers  &  Threats  Advanced   PracIIoner’s  Dilemma   Technology  Infrastructure  &  OperaIons  

Page 5: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Quick  Overview  

5  

 

Hot  topics:  Internet  of  Things  (IoT)  security  Data  sovereignty  and  legislaJve  volaJlity  Cyber  Insurance  Privacy  vs.  Security  

Of  parJcular  intrigue  Breaches  –  implicaJons  of  the  theO  of  persistent  PII  

Page 6: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

2015  Submission  +  Abstract  Titles  

6  

2015  Submission  Titles  +  Quick  Abstract  

Page 7: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC 2016  Sbumssion  Titles  +  Abstract016  16  Submission  +  Abstract  Titles  

7  

2016  Submission  Titles  +  Quick  Abstract  

Page 8: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Other  InteresIng  Trends  

8  

Overall  maturity  in  many  submissions  –  moving  from  “hacks”  to  “let’s  talk  about  how  to  manage  risk”  

More  “agile”  security  

Second  year  where  frequency  of  “cloud”  and  “mobile”  drop  as  words  as  they  become  ubiquitous  

The  term  “Big  Data”  shrinks    

INAMOIBW  used  liberally  

Less  “Point  of  Sale”  submissions  than  last  year  (when  it  surged)  

Page 9: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC 2016  Sbumssion  Titles  +  Abstract016  16  Submission  +  Abstract  Titles  

9  

2016  Submission  Titles  +  Quick  Abstract  

Page 10: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Internet  of  Things  (IoT)  Security  

10  

Year  2  of  IoT  Surge!  Cars,  cars,  and  more  cars…  Most  ICS  submissions  we  have  ever  recieved  Hacking  of  every  Thing:  baby  monitors,  medical  devices,  cars,  ...  LegislaJon  discussions  around  IoT  safety  standards  More  maturity  around  the  topic  –  how  to  defend  devices,  architectures,  frameworks    Surprisingly  li^le  on  “Smart  City”  given  data  from  RSA  Conferences  outside  the  US  

Page 11: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Data  Sovereignty  and  LegislaIve  VolaIlity  

11  

Many  submissions  on  the  implicaJons  of  new  and  pending  legislaJon  

Data  sovereignty  was  an  important  topic  –  speculaJon  on  future  moves,  architectures  for  managing,  etc.  

Designing  for  potenJally  disrupJve  legislaJve  changes  (Safe  Harbor,  the  use  of  data  for  analyJcs,  etc.)  

Page 12: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Cyber  Insurance  

12  

Huge  surge  in  submissions  on  Cyber  Insurance  

PracJcal  discussions  on  how  to  think  about  policies,  planning  for  potenJal  claims,  “raJng”  companies,…”  

Sessions  actually  focused  on  using  cyber  insurance  as  a  tool  in  risk  management,  making  tradeoffs,  etc.  

Reconciling  cyber  insurance  with  supply  chain  security:  requirements,  etc.  

Page 13: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Privacy  vs.  Security  

13  

Seeing  privacy  and  security  communiJes  work  together  

Tradeoffs  between  individual  privacy  and  “group”  safety  coming  to  a  head  

Debates  on  privacy  legislaJon—EU  at  epicenter  but  spreading  

The  implicaJons  of  a  company  or  a  country  “going  dark”    

Cultural  realiJes  

Page 14: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC Of  Interest:  Breaches  –  ImplicaIons  of  the  Thec  of  Persistent  Personal  Data  

14  

Well  understood:  implicaJons  of  stolen  credit  card  data  AcJve  underground  market:  easy  to  sell  CC  numbers  but  low  revenue  per  record  Time  pressure:  need  to  moneJze  stolen  data  quickly  before  breach  discovered,  cards  deacJvated,  cards  expire,  etc.  Impact  to  the  vicJm  typically  low/recoverable  

Not  well  understood:  implicaJons  of  breaches  like  Ashley  Madison,  OPM,  healthcare  providers,  …  

A^ackers  have  the  luxury  of  Jme:  moneJzaJon  sJll  possible  years  later  PotenJal  for  ransomware,  “protecJon”  susbscripJons,  extorJon,  etc.  Data  excepJonally  valuable  in  spear  phishing  Data  cannot  be  “reset”  

Page 15: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

Upcoming  Key  Dates  

15  

Jan  3:  Crowdsource  submissions  close  at  11:59  pm  PT  

Jan  12:  Peer2Peer  facilitator  noJficaJons  sent  

Jan  26-­‐Feb  9:  Crowdsource  public  voJng  

Jan  29:  Discount  deadline  to  a^end  RSA  Conference  2016  

Feb  10:  Crowdsource  presenters  announced  

Feb  29-­‐Mar  4:  RSA  Conference  2016  in  San  Francisco  

Page 16: Mapping&RSAConference& Speaker&Submissions&to&Security ... · #RSAC Agenda& 2 A"peek"behind"the"curtain"of"the"RSA"Conference"submission" process A"graphical"view:"the"2016"word"cloud"

#RSAC

See  you  at  RSA  Conference!!  


Recommended