Blog

Leading in an Era of Chaos

Consider… American Authorities are confident that the Russian Government was behind the cyberattack on the Democratic National Committee. Did that attack change the course of the U.S. presidential election? We’ll never know. But it definitely changed the discourse that followed. The idea of a foreign power mounting a cyberattack to undermine a U.S. election went…

The Forum at RSA Conference

This year’s RSA Conference continues the long string of high powered speakers from both the private and the public sector. While there are great keynotes and more than 500 track sessions, we discovered we needed more! Five years ago, many senior government officials were looking for a platform from which they could communicate what they…

2017 is the Year for RSA Business-Driven Security™ Solutions

This week, RSA will be making a global announcement during the 2017 RSA Conference to formally unveil RSA Business-Driven Security solutions, a new approach to help customers manage cyber risk. This architecture, along with several concurrent solution and service announcements, enables customers to take command of their risk posture and secure what matters most. BUSINESS-DRIVEN…

Defining Business-Driven Security™ for the Modern Enterprise

As I travel around the world and meet with CISOs and security teams, I continue to be amazed at the organizational disconnects around managing cyber risk. Security Operations and Identity & Access Management teams operate their own business processes with very few connection points. Security and Risk & Compliance teams have different world views of…

Delivering on the Promise of Business-Driven Security™ Globally

Today, with the introduction of RSA Business-Driven Security, we also introduced the RSA Risk and Cybersecurity Practice. This Practice includes more than 650 globally deployed, employee-based cybersecurity and risk experts to help our clients operationalize their unique business-driven security strategy. Our primary tenant is enabling and accelerating the business while reducing risk, thus creating the…

Reimagine Your Identity Strategy

We are at the edge of yet another evolution for the Identity and Access Management (IAM) industry. Applications are being deployed at incredible speeds with user populations demanding access from wherever they are, whenever they want, from any device. The network is no longer clearly defined, in fact, identity is the new perimeter. Regulations and…