RSA CONFERENCE 2023 — San Francisco — Cybersecurity leaders dug right into a broad array of matters throughout their Information Desk conversations with Darkish Studying at this 12 months’s RSA Convention. From rising safety applied sciences (CNAPP), important infrastructure assaults, id administration, digital networking, and generative AI, these Information Desk interviews lined a whole lot of floor. There have been conversations about automation and vulnerability administration, as properly. Try our YouTube playlist of all of the matters that got here out of Darkish Studying Information Desk throughout RSA Convention 2023 in San Francisco.
Xage CEO Duncan Greatwood traces the fast rise of important infrastructure assaults again to the Colonial Pipeline assault a number of years in the past, noting the vulnerability of each info and operational applied sciences.
TXOne Networks on Industrial Safety Is Evolving to Preserve the Operation Working
Terence Liu and Jeff DePasse of TXOne Networks speak concerning the heightened profile of important infrastructure within the Nationwide Cybersecurity Technique, as properly whether or not insurance policies for info expertise also can work for operational expertise (OT).
Mandiant Consulting, Google Cloud on Mandiant Report: Dwell Time Decreases Whereas Ransomware, Extortion Flourish
Mandiant’s Charles Carmakal digs into the findings from the corporate’s newest annual M-Tendencies report, noting that common dwell time has decreased to 16 days.
Past Identification on What Is Zero-Belief Authentication and Why Does It Matter?
Past Identification’s Patrick McBride takes on the multitude of challenges and shortcomings with most current authentication applied sciences, in addition to some developments that can enhance the effectiveness and accuracy of authentication.
Sumo Logic on Why We Aren’t There But With Safety Automation
Dave Frampton of Sumo Logic Safety describes the challenges organizations face with safety administration, and the place automation falls brief in fulfilling them.
Yinon Costica of Wiz talks about cloud-native software safety platforms (CNAPP), and the way their mixed performance streamlines operations for safety professionals.
Corey Bodzin of Automox pulls aside the outcomes from the corporate’s newest IT operations report, which reveals that corporations are lowering the variety of instruments they use for endpoint administration.
John Shier of Sophos takes a deeper lower on the firm’s new lively adversary reviews and describes how attacker habits is altering, in addition to the forces which are driving these adjustments.
OpenText Cybersecurity on Integrating Processes — and Technique — Is Nonetheless the Greatest Protection
OpenText’s Geoff Bibby shares the most recent findings from the corporate’s cybersecurity international menace report, and discusses the problems that small, medium and enormous enterprise are up towards the place threats and assaults are involved.
Invicti’s Patrick Vandenberg reveals findings from the corporate’s newest AppSec report, traits Invicti has not too long ago noticed and the way they’re evolving.
SlashNext on How Generative AI is Altering the Menace Panorama
Patrick Harr of SlashNext takes on that type of synthetic intelligence often known as generative AI, which has been linked to new, extra devious assaults on organizations, their knowledge, and customers.
Electronic mail continues to be by far the most typical entry-point for a cyber-criminal, in line with Dan Fein of Darktrace.
Lookout CEO Jim Dolce talks concerning the enlargement of assault surfaces with extra work-from-home and hybrid work staff, and has some ideas for locking down units, apps, and finish customers.
Cisco’s Tom Gillis affords an replace on the most important threats dominating the present panorama, and what organizations can do to guard themselves.
Rick McElroy of VMware talks concerning the ongoing menace — and hazard — posed by lateral motion by attackers inside a goal group.
ZeroTier’s Marc Patterson talks concerning the rising safety resolution often known as digital networking, to not be confused with digital personal networking.
Cybersixgill on State Of Immediately’s Cybercrime Underground
Delilah Schwartz of Cybersixgill unpacks the findings of the corporate’s report on the cybercrime underground, and all it reveals about new techniques and targets.
Theresa Lanowitz of AT&T Enterprise discusses how the appearance of edge computing has created inadvertent safety dangers for organizations.
Brendan O’Connor of AppOmni makes the case for why CISOs and their groups must be constructing applications that deal with the safety for software program as a service (SaaS).
Brad Rinklin and Renée Burton of Infoblox focus on the corporate’s latest rebranding that unites networking and safety, in addition to how this mix delivers improved efficiency and safety.
Elastic Safety on Increasing Cloud Safety Capabilities With Improved App Safety
Mike Nichols of Elastic Safety digs in round prolonged detection and response (XDR) as a significant software within the cybersecurity arsenal.
JupiterOne on The Want For Unified Cyber Insights
JupiterOne founder Erkang Zheng talks about how at the moment’s corporations can get a greater grip on what they should handle and tips on how to safe their property correctly.
Mend CMO Arabella Hallawell talks concerning the wakeup name from provide chain safety failures, the function of software safety, and the way improved dependency administration can cut back the scope of the assault floor.
Because the menace panorama morphs and presents new hazards, so has the strain for tighter integration amongst safety techniques and functions, in line with Expel’s Dave Merkel.