Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

RSA’s Coviello calls for security industry to abandon fear and trepidation

RSA’s Coviello calls for security industry to abandon fear and trepidation
RSA conference keynotes tackle effects of digital interdependence, provide steps to operationalize intelligence driven security News | CIOL Bureau SINGAPORE: Kicking off RSA Conference Asia Pacific & Japan 2014 in the opening keynote, Art Coviello, executive VP of EMC Corp. and executive chairman of RSA, The Security
RSA conference keynotes tackle effects of digital interdependence, provide steps to operationalize intelligence driven security
News | CIOL Bureau
SINGAPORE: Kicking off RSA Conference Asia Pacific & Japan 2014 in the opening keynote, Art Coviello, executive VP of EMC Corp. and executive chairman of RSA, The Security Division of EMC, addressed the security implications of today's digitally interdependent world.
With attendance doubled from last year, Coviello emphasized that society's digital interdependence now requires new "norms of behavior," more effective security measures and greater co-operation. Following Coviello's keynote, Amit Yoran, RSA's senior VP, Unified Products, shared key insights for how to operationalize Intelligence Driven Security through a four-part Intelligence Driven Security "stack."
Coviello stressed that while driving advocacy for digital norms, organizations also must adapt to more effectively defend against the expanding attack surface and evolving threat environment exacerbated by digital interdependence. Coviello advanced recommendations for organizations to fortify their security measures across the three key areas -- visibility, analysis and action.
Coviello explained the need for security organizations to develop deep visibility, beyond what traditional solutions currently deliver, to enable a better understanding into how information is being accessed and used, and to expose vulnerabilities across the enterprise.
He underscored the urgency for more advanced analysis capabilities to decipher "patterns in the noise" to detect and ultimately thwart stealthy attacks. Finally, Coviello asserted that, together, deep visibility and advanced analysis enable security organizations to take the right actions needed to actively engage in faster, more seamless defensive measures.
Coviello also stressed the mandate for new levels of cooperation and information sharing among organizations and the unprecedented layers of protection that Intelligence Driven Security strategies can bring to organizations of every type and size.
"For too long, we have approached our interdependence with fear and trepidation," Coviello said. "We have viewed it as a threat to our organizations. The truth is anything but. If we begin to engage with and leverage our interdependence, a world of benefits opens up for us."
Amit Yoran detailed a model to aid organizations in operationalizing Intelligence Driven Security. Yoran explained that when Intelligence Driven Security technologies are embedded in an organization's security operations stack, unparalleled visibility results. Organizations are then equipped to better analyze the situation, spot anomalies and execute a plan to prevent or mitigate potential damage from cyber-attacks.
According to Yoran, the Intelligence Driven Security stack starts with policy-based authentication and identity management, access control, and governance. Yoran outlined a 10-step roadmap designed to help guide organizations to pursue the Intelligence Driven Security strategy required to defend against advanced cyber-attacks.
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: