-
Recent Posts
Recent Comments
Final Wrap Up… on How to Transform Developers in… Salvador on Big data – discussi… Nichole Gladky on Google apps constituency … Jason on Educause 2013 – first… Mike Gay on MS Office 365 for Educati… Archives
Categories
Meta
Monthly Archives: February 2017
Final Wrap Up – Top Three Take Aways
I’m actually posting this from home. I was too tired to finish this in SF. Overall, I was very happy with the conference and the information it provided. It is hard to identify my top three takeaways for this conference … Continue reading
Posted in Identity, leadership, RSA Conference 2017, security, Uncategorized
Leave a comment
Final Keynote: Seth Meyers
Just left the final keynote for RSA 2017. They had Seth Meyers come in and give the final keynote. He’s a funny guy, and had a lot of funny jokes about current events, politics, etc. However, I couldn’t help but … Continue reading
Posted in Uncategorized
Leave a comment
The quest to measure strength of function for authenticators: SOFA, So Good
Elaine Newton, Colin Soutar Key Takeaway: SOFA-B allows us to measure the efficacy of various biometric options so that they can be compared across vendors. https://pages.nist.gov/SOFA Biometrics provide a convenient way to provide security to phones. Introductino of biometrics doubled … Continue reading
Protecting People and Content from Threats Already on the Inside
Key Takeaway: Asking people to “Opt In” to more behavior analysis is the best chance of identifying threats in the future. Good employees who are trusted and in trusted positions can change. Either the employee could go south, or his … Continue reading
Posted in Uncategorized
Leave a comment
Measuring Authentication: NIST 800-63 and Vectors of Trust
Sarah Squire Key takeaway: New NIST document goes over all new ways to categorize what used to be Levels of Assurance. Identity team needs to understand this standard. Level of identity vs level of security Authentication – why do we … Continue reading
Privileged Access Management: Unsticking your PAM program
Key Takeaway: Do we use TLAs for all admin functions, including our customers? Would they be willing to go to the next step to use PAM ids? *** PAM – accounts. Should be only used to access privileged systems. NOT … Continue reading
How to Transform Developers into Security People
Key Takeaway: Need to take these ideas and look at how we can get security training for our developers. *GREAT SESSION!!! Software is everywhere and in everything. Developers become crucial and the first line of defense to insure it is … Continue reading
Radical Innovation:Revolutionizing the Future of Cybersecurity
Hugh Thompson Key Takeaway: We need to look into how we can make a difference in people’s lives using big data. Topic of Innovation. What can we become as a security industry? Proliferation of IoT devices has created a massive … Continue reading
Vendors, Vendors and Bears. Oh My.
Wow. I am beat. Just spent the last three hours walking the vendor floor. There are a LOT of vendors here, and all of them are eager to talk. I didn’t even want any of the SWAG. I was mainly … Continue reading
Posted in Uncategorized
Leave a comment
The Coming Disruption
Key Takeaway: Interesting prospect. Application developer ecosystems. If we built all the infrastructure with APIs and preset data gathering and other basics, then we can code to those APIs. Rather than having to go and gather data, it would be more, … Continue reading
Posted in RSA Conference 2017, security
Leave a comment