As I mentioned in an earlier blog, we have a stronger focus on cybersecurity at this year’s EMCworld than ever before. That blog talked about how much you’ll see and hear about security analytics, particularly in the sessions by Michal Blumenstyk-Braverman and by Matthew Gardiner.

The application of Big Data analytics to security has resulted in a transformation not only in detecting and responding to threats. It also transforms how we establish and evaluate trust, based on understanding risk rather than expecting absolute security. This transformation doesn’t just affect security professionals. Understanding trust is critical for many of the topics that are explored at EMCworld, including cloud, virtualization, storage and document management. Understanding trust can help in enabling new business opportunities, finding more effective operational processes and working more effectively with partners.

This approach to trust through understanding and responding to cyber risk will be a focal topic in several sessions. John McDonald, well known to EMCworld audiences for his past sessions on security for disaster recovery, will be talking about how to understand and address the security risks for virtualized infrastructure. There are important ways in which virtualization has transformed risk, including in terms of ways to mitigate those risks. As always, John’s session will be great fun, as well as deeply informative.

Matthew Coles will discuss the transformation in trust from the perspective of the security capabilities that are being built into EMC products. Matthew’s responsibilities in the EMC Product Security Office give him unique insight into these capabilities and how to use them effectively.

Jason Rader will take yet another point of view on risk by describing a pragmatic approach to evaluating the value of information assets. He’ll bring to the session his practical experience in how to understand the value of your information, discussing how that understanding can be applied in critical decisions such as what information can be entrusted to the cloud.

Join us for these great sessions! And I hope you’ll follow my blogs and tweets @robtwesgriffin throughout EMCworld.

 

Bob Griffin
Author:

Bob Griffin is Chief Security Architect at RSA, the Security Division of EMC, where he is responsible for technical architecture, standards and strategy, particularly for RSA’s data security products. He represents EMC to several standards organization, including as co-chair of the OASIS Key Management Interoperability Protocol (KMIP) technical committee. Bob has extensive experience in security strategy, corporate governance, business process transformation and software development. He has had the primary architectural responsibility for a number of production systems environments and for major software engineering projects at RSA, Entrust and Digital Equipment Corporation,. He is a frequently requested speaker for professional and industry conferences and has instructed courses within both professional and university settings.