What to Expect at RSA 2016

Arguably the world’s largest and most important Cybersecurity show is just around the corner. With over 30,000 attendees and over 500 highly specialized security specific exhibitors, it is the show which the industry benchmarks itself.

So what can we expect as consumers, vendors and media/analysts within the cybersecurity industry.

  1. The Privacy vs Security debate will be in full force. With government agencies and law enforcement looking for IT vendors to somehow give these agencies under court order access to encrypted data or build in security back doors into their products. The Apple/FBI debate will be the cornerstone debate for years to come.

    Expect a lot of debate on this sensitive and precedent setting subject.

  2. Data Governance – National (or blocks like the EU) governments are demanding data sovereignty be enforced. Creating strict guidelines and procedures for ensuring sensitive data is held and proceeded under restrictions, normally bound by borders. But with sensitive data being generated globally (I previously used credit card transactions as an example), but required to be processed and analyzed in numerous regions poses a problem. Data lives everywhere and nowhere. How do we globally manage data that gets created everywhere?

    Expect the requirements for data governance and the associated challenges to be very pronounced and public at RSA

  3. IoT, IoT, IoT. 28 billion devices, sensor and meters will be pumping data all over the globe. Some critically important like utilities, medical devices, ATMs and airplanes sensors, some less so like parking meters. How do we manage, process and secure all that data. The concern is ‘new’ or emerging industries like IoT create disparate, untested and disconnected solutions often causing more confusion than benefit.

    Expected numerous ‘revolutionary’ IoT security strategies and new startups to be announced at RSA.

  4. Consolidation – I recently sat through a key note, where the ‘customer’ explained that when they consolidated the various departmental security groups into one corporate wide department, they had more security tools than they had personnel. Even in the cybersecurity category of encryption, where we develop products, silos of key management and encryption are pervasive. Integration and consolidated to create a complete security stack will be very relevant in the next 12 months.

    Expect numerous acquisition and vendor integration announcements at RSA.

  5. Cognitive Computing (an unmatched disruption/evolution that will affect every industry) – With large financial institutions process, a billion plus security events, human interaction is limited. Cognitive computing can process huge amounts of data and collaborate with the human experts in solving the fundamental issues:
    1. What human behavior actions or anomalies are security threats?
    2. How do we automatically and intuitively respond to make it near impossible for the bad guys to get in?
    3. How do we analyze the data and behaviors to determine when the bad guys are in a need to be removed/blocked.

    Expect some very early and very significant product and/or strategic initiatives around the use of Cognitive Computing to Cybersecurity.

For more information on Cybersecurity and data security solutions, please visit us at booth 527 at the 2016 RSA Security Conference in San Francisco.

Previous Post
How Small Security Breaches Cost Big Money
Next Post
Apple vs. FBI: The Great Back Door Debate Broken Down

Related Posts

The Dark Side of Encryption

I know it’s very tedious these days to use a Star Wars metaphor, but as everyone’s doing it so will I. Encryption techniques have been used for some time to secure communications and protect personal or intellectual property. (more…)

Human Error with Big Consequences

Everyone makes mistakes, after all we are only human, and no one is perfect. We are prone to mistakes, but what happens when these mistake have high consequences, not only affecting the individual that made the mistake, but millions of…
Read more

Last Day Exhibiting At Interop

Today is the last day we will be exhibiting at Interop – New York. Come by and visit Booth #548 to learn about the latest in our data encryption solutions. We have specialists on hand who can answer any of…

A more BYOD friendly MDM

If Cisco’s forecasts are accurate, in a couple of months the number of mobile-connected devices will exceed the number of people on the planet, and by 2017 there will be nearly 1.4 mobile devices per each person. (more…)

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu