Monthly Archives: February 2017

Final Wrap Up – Top Three Take Aways

I’m actually posting this from home.  I was too tired to finish this in SF.  Overall, I was very happy with the conference and the information it provided.  It is hard to identify my top three takeaways for this conference … Continue reading

Posted in Identity, leadership, RSA Conference 2017, security, Uncategorized | Leave a comment

Final Keynote: Seth Meyers

Just left the final keynote for RSA 2017.  They had Seth Meyers come in and give the final keynote.  He’s a funny guy, and had a lot of funny jokes about current events, politics, etc.  However, I couldn’t help but … Continue reading

Posted in Uncategorized | Leave a comment

The quest to measure strength of function for authenticators: SOFA, So Good

Elaine Newton, Colin Soutar Key Takeaway: SOFA-B allows us to measure the efficacy of various biometric options so that they can be compared across vendors. https://pages.nist.gov/SOFA Biometrics provide a convenient way to provide security to phones.  Introductino of biometrics doubled … Continue reading

Posted in Identity, RSA Conference 2017, Uncategorized | Tagged | Leave a comment

Protecting People and Content from Threats Already on the Inside

Key Takeaway: Asking people to “Opt In” to more behavior analysis is the best chance of identifying threats in the future. Good employees who are trusted and in trusted positions can change.  Either the employee could go south, or his … Continue reading

Posted in Uncategorized | Leave a comment

Measuring Authentication: NIST 800-63 and Vectors of Trust

Sarah Squire Key takeaway: New NIST document goes over all new ways to categorize what used to be Levels of Assurance.  Identity team needs to understand this standard. Level of identity vs level of security Authentication – why do we … Continue reading

Posted in Identity, RSA Conference 2017, Uncategorized | Tagged , | Leave a comment

Privileged Access Management: Unsticking your PAM program

Key Takeaway: Do we use TLAs for all admin functions, including our customers?  Would they be willing to go to the next step to use PAM ids? *** PAM – accounts. Should be only used to access privileged systems.  NOT … Continue reading

Posted in Identity, RSA Conference 2017, Uncategorized | Tagged | Leave a comment

How to Transform Developers into Security People

Key Takeaway: Need to take these ideas and look at how we can get security training for our developers.  *GREAT SESSION!!! Software is everywhere and in everything.  Developers become crucial and the first line of defense to insure it is … Continue reading

Posted in RSA Conference 2017, security | Tagged | 1 Comment

Radical Innovation:Revolutionizing the Future of Cybersecurity

Hugh Thompson Key Takeaway: We need to look into how we can make a difference in people’s lives using big data. Topic of Innovation.  What can we become as a security industry? Proliferation of IoT devices has created a massive … Continue reading

Posted in RSA Conference 2017 | Tagged | Leave a comment

Vendors, Vendors and Bears. Oh My.

Wow. I am beat.  Just spent the last three hours walking the vendor floor.  There are a LOT of vendors here, and all of them are eager to talk.  I didn’t even want any of the SWAG.  I was mainly … Continue reading

Posted in Uncategorized | Leave a comment

The Coming Disruption

Key Takeaway: Interesting prospect.  Application developer ecosystems.  If we built all the infrastructure with APIs and preset data gathering and other basics, then we can code to those APIs.  Rather than having to go and gather data, it would be more, … Continue reading

Posted in RSA Conference 2017, security | Leave a comment