Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

5 key takeaways for CISOs, RSA Conference 2024 – Source: www.cybertalk.org

5-key-takeaways-for-cisos,-rsa-conference-2024-–-source:-wwwcybertalk.org

Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Last week, over 40,000 business and cyber security leaders converged at the Moscone Center in San Francisco to attend the RSA Conference, one of the leading annual cyber security conferences and expositions worldwide, now in its 33rd year. Across four days, presenters, exhibitors and attendees discussed a wide […]

La entrada 5 key takeaways for CISOs, RSA Conference 2024 – Source: www.cybertalk.org se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

RSA (“RSAI”) Conference 2024 Powered by AI with AI on Top — AI Edition (Hey AI, Is This Enough AI?)

14 May 2024 at 18:48

RSA (“RSAI”) Conference 2024 Powered by AI with AI on Top — AI Edition (Hey AI, Is This Enough AI?)

Where do we have “41,000 attendees, 650 speakers, 600 exhibitors and 400 members of the media” who all care about cyber security? Ha, an easy question: RSA Conference 2024, of course!

I started my post-RSA blog tradition in 2006 — most of the blogs of course didn’t age well (“NAC is cool?!? What Year is This!?!” — “Eh… that’s 2007, Anton!”)

RSA 2024 Booth Photo

Here is my latest (and here is our RSA 2024 recap podcast …).

First, remember my bias: SecOps, cloud security and now securing AI, some data security and some odds and ends. I may not be looking at your favorite security segment (hi AppSec!) as intently as I am looking at SIEM, SOC, D&R, various cloud things and securing AI too.

Themes on the rise:

  • AI and GenAI: is there anything more obvious? Well, this is definitely the year where “AI” and “AI-powered” decorated every booth (they missed the bus last year). Many are annoyed by this, but I think this is a healthy sign of a use case discovery phase of GenAI for security. Many tool vendors summarize with GenAI, some explain, some vaguely “assist”, some try to generate playbooks or rules, and, yes, there is occasional magic too. We perhaps will see a lot more GenAI for report writing and yes, some for detection and remediation code creation (but carefully!). BTW, I think “AI-powered ML” is pushing it a bit…
  • Still comparatively little of “securing AI” (coincidentally the topic of my RSA presentation): my guess is that we need to wait for more organizations to “trip and fall” with this, before the vendor ecosystem arises to help.
  • Cloud security: Cloud security posture management (CSPM) remains very popular (even if hidden inside a CNAPP “combo-monster”), while cloud detection and response (CDR) is gaining traction, with some vendors focusing on other niches (in terms of money spent, “CNAPP = CSPM + CDR + misc”, it seems). And yes, securing various cloud-native services is still growing in popularity, as more organizations a) move to cloud and b) try to evolve from lift/shift to cloud native approaches in their practice (so expect fewer firewalls and more observability). Just as in 2014, cloud security problems are configuration problems, identity problems and — here is the real shocker! — identity configuration problems…
  • SecOps, SIEM and SOAR spiced with various flavors of TDR and TDIR: naturally, I’ve looked through all the SIEM with SOAR, SOAR without SIEM and everything in between (now “powered by AI”, obviously). I sense that many organizations have been stuck in the past here (some in distant past… some even in the pre-SIEM, ancient past), and that we can expect more disruption. Some want more detection engineering, others vote for the opposite (essentially, the “EDR-ization of SIEM” where you consume detections rather than engineer them). The latest batch of SIEM vendors were born in 2019 (hi Chronicle now called Google SecOps) and 5 years have passed since that day. Will a new batch of SIEM be born? Who knows, but what I do know that it ain’t the security data lakes… these are so 2014 (hi Hadoop … born in 2006, BTW).
  • Vulnerability management (VM): first, I thought that I accidentally time-traveled to RSA 2014, but then I realized that “prioritize what vulnerabilities to fix” is actually rising in importance. Perhaps it is time for the next wave of vendors, perhaps some sort of “Kenna 2.0” will rise as a result. Not sure, frankly, what they can do differently — the problem is often the process/culture, not the tool. By the way, I think that CSPM vendors have rediscovered vulnerability management and so they seem to be intent on repeating and then relearning the mistakes that the VM vendors (“the Q/R/T”) made in the late 2000s and early 2010s (“We can prioritize using exploit data, OMG WOW!!” — “Eh… welcome to 2009?” )
  • Identity-Centric Security: while very cliche, “identity is becoming the new security perimeter” and it finally shows in real life. ITDR is rising (many types of it), non-human/workload identities proliferate. I suspect this area will become more fun in the coming months. IAM is not just password changes :-)
  • ASPM is here, this means … ADR is coming. I definitely spotted application security posture management on a few booths, some focused on complex enterprise applications, internal application building and some cloud applications (but then it would be CSPM / CDR, no?). BTW we have SSPM (for SaaS) and DSPM (for data). Somebody tried DDR a few years ago (dead now?) and I have not seen people shoot for “SDR” for SaaS Detection and Response name (even though there are vendors effectively doing just that).

Themes on the wane:

  • Zero trust: I sense it is lower from a very high point of last year, but I also sense that vendors are finally showcasing tools that extend zero trust principles to many parts of the digital environment, so this may actually be a good thing! ZT is still largely a buzzword, but it may have started the climb towards maturity…
  • XDR: there was less emphasis on XDR, with some vendors still promoting it (like why? like … don’t?), but it seems to be falling into the trough of disillusionment.

Random themes we also spotted:

  • Email security had a surprising presence at RSA 2024, with several new vendors emerging despite the prevalence of existing solutions, and built-in email security.

Other fun things and ideas:

  • The debate between platform solutions and best-of-breed tools continues, with the market showing an obvious preference for single-purpose tools, indicating a vast number of niches in cybersecurity. How do I know that? Well, RSA expo has 600+ security vendors and some sources show 3000–5000 security vendors on the planet. They exist, ergo people buy them, ergo market favors niches. End of the debate. Sorry, broad platform fans. People complain about “too many security vendors” but what do they actually do? Buy from even more different security vendors! Exhibit A: RSA Expo hall 1991-2024+
  • The pull of the past remains strong in cybersecurity: with established vendors still present and organizations continuing to use older technologies. Mid-2000s SIEM vendor and early 2000s DLP vendors had decent presence, and some of them can barely spell “cloud”, much less “AI.” Yet they exist, they have customers, the past is real. You say “container”, I say “mainframe” :-)

Fun presentations:

Cloud Security Podcast by Google “official” booth presence (RSA 2024)

“Vendor hat = ON” stuff:

P.S. I also had my first Waymo ride (with no driver at all). It probably changed my life … ok, not really …but it definitely made me shut up about “but Tesla sort of can do it too” because it is absolutely, utterly, unequivocally not the same…

P.P.S. Here is how an AI suggested I start this blog: “From the moment I stepped onto the bustling expo floor, I was immersed in a whirlwind of cutting-edge technology, thought-provoking discussions, and a shared passion for safeguarding our digital world. The sheer scale of the event was awe-inspiring, with thousands of cybersecurity professionals from around the globe converging to learn, network, and chart the course for the future of our industry.” (and no, if you have to ask, I am not doing it … real humans don’t talk like this, sorry AI!). Gemini does an epic job correlating the themes on the Expo floor to presentation topics, for example… It is all about the use case!

Related:


RSA (“RSAI”) Conference 2024 Powered by AI with AI on Top — AI Edition (Hey AI, Is This Enough AI?) was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post RSA (“RSAI”) Conference 2024 Powered by AI with AI on Top — AI Edition (Hey AI, Is This Enough AI?) appeared first on Security Boulevard.

Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools

By: Tom Eston
13 May 2024 at 00:00

In this first-ever in-person recording of Shared Security, Tom and Kevin, along with special guest Matt Johansen from Reddit, discuss their experience at the RSA conference in San Francisco, including their walk-through of ‘enhanced security’ and the humorous misunderstanding that ensued. The conversation moves to the ubiquity of AI and machine learning buzzwords at the […]

The post Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools appeared first on Shared Security Podcast.

The post Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools appeared first on Security Boulevard.

💾

ISMG Editors: RSA Conference 2024 Wrap-Up – Source: www.databreachtoday.com

ismg-editors:-rsa-conference-2024-wrap-up-–-source:-wwwdatabreachtoday.com

Source: www.databreachtoday.com – Author: 1 Events , RSA Conference , RSA Conference Videos Panels Unpack the Buzz Around AI, Future Trends for CISOs Anna Delaney (annamadeline) • May 10, 2024     Mathew Schwartz, Tom Field, Anna Delaney, Rahul Neel Mani and Michael Novinson From the RSA Conference in San Francisco, five ISMG editors unpack […]

La entrada ISMG Editors: RSA Conference 2024 Wrap-Up – Source: www.databreachtoday.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

RSAC 2024 Day 2: IoT Security Questions (and Answers)

8 May 2024 at 14:54

RSA Conference delivers in terms of interesting dialogues with other cybersecurity professionals, and this year while there is not much on the conference agenda related to IoT security there is a lot of discussion about it.  Whether it’s the UK’s Product Security law going into effect at the end of April, the growing focus by […]

The post RSAC 2024 Day 2: IoT Security Questions (and Answers) appeared first on Viakoo, Inc.

The post RSAC 2024 Day 2: IoT Security Questions (and Answers) appeared first on Security Boulevard.

RSA Conference 2024: What to Expect from the World’s Largest Cybersecurity Event

RSA 2024

The RSA conference 2024 , the world's largest cybersecurity gathering, commenced in San Francisco from May 6 to 9, 2024. With over 45,000 attendees expected, the event promises to be a hub for industry discussion, product launches, and critical talks on emerging threats. This article explores some of the key themes likely to dominate RSA 2024.

Quantifying Cyber Risk: A Business Imperative

One of the most pressing issues for businesses today is understanding cyber risk in financial terms. While data breaches often headline the news, accurately calculating the potential cost of such an attack remains elusive. This lack of clarity hinders informed decision-making around cybersecurity investments.

However, a potential solution may be emerging. Companies like CDW are developing tools that leverage cybersecurity insurance data and best-practice protocols to quantify cyber risk. By translating risk into dollar figures, businesses can prioritize security investments and make data-driven decisions about mitigation strategies.

The Double-Edged Sword of AI

Artificial intelligence (AI) is rapidly transforming the cybersecurity landscape. While AI-powered tools hold immense potential for automating repetitive tasks and improving efficiency, security professionals are concerned about the technology's potential misuse by attackers.

The fear lies in the possibility of AI exposing sensitive data through large language models, especially in the absence of robust data governance and access control measures. Companies considering AI implementation will need to prioritize these aspects to ensure their data remains secure.

Securing Operational Technology (OT): A Growing Challenge

Critical infrastructure facilities, like power plants and water treatment centers, are increasingly targeted by cybercriminals. These facilities often rely on aging OT systems, not designed for today's internet-connected world, making them vulnerable.

The potential consequences of a successful attack on such facilities are far-reaching, potentially disrupting entire regions. To address this growing threat, a holistic approach is needed. One such approach, the 5D security model, focuses on identifying vulnerabilities, deploying solutions, and fostering a culture of shared accountability between IT and OT teams.

RSA 2024 Beyond Technology: Collaboration and Community

The RSA Conference is more than just a showcase of new technology. This year's RSA Conference theme, "The Art of Possible," reflects a focus on innovation and community collaboration. Keynote speakers such as Secretary of State Antony J. Blinken will discuss the government's efforts to integrate cybersecurity into emerging technologies like AI and quantum computing.

The conference will also feature a diverse roster of speakers from the cybersecurity industry, including technologist Bruce Schneier and former CISA Director Chris Krebs.

Hugh Thompson, RSAC's executive chairman, emphasizes the conference's role in fostering collaboration within the cybersecurity community. This "community problem-solving" approach is crucial in combating evolving threats.

The event will feature a diverse range of speakers, including government officials, technologists, security experts, and even representatives from the arts and entertainment world. This cross-disciplinary approach underscores the importance of collaboration in building a more secure future.

Innovation and Learning Opportunities

With over 500 sessions, RSA 2024 promises to be a hub of knowledge sharing and networking opportunities. Attendees can participate in hands-on cybersecurity labs, networking sessions, and keynote presentations. The Innovation Sandbox will showcase startups competing for the title of "Most Innovative Startup," highlighting the latest advancements in cybersecurity technology.

Cyble's Participation

Cyble, a leading provider of AI-driven cybersecurity solutions, is showcasing its Cyble Vision Platform at RSA 2024. Attendees can visit Cyble's booth to learn how the platform enhances network resilience and proactively tackles cybersecurity threats. Cyble's leadership team will be available to discuss the latest trends and challenges in cybersecurity.

The RSA 2024 remains a cornerstone event for the cybersecurity industry. By addressing critical issues like quantifying cyber risk, securing OT systems, and fostering collaboration, the event aims to equip attendees with the knowledge and tools needed to navigate the ever-evolving threat landscape.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

❌
❌