Social Network For CISO (Chief Information Security Officers)
Businesses and organizations are fielding more & more next-generation Information Security technologies to reduce their risks as businesses leverage cloud capabilities and from advanced persistent threats. Unfortunately, we see our customers falling into a common Information Technology and general acquisition trap: Significantly underestimating the complexity, cost, and time to complete the Next Generation Firewall (NGFW)…Continue
How Google Protects Its Corporate Security Perimeter without Firewalls (RSA Conference 2017)
The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its ground breaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place,…Continue
Cybersecurity vs. Tokenization (RSA Conference 2017)
Tokenization is the latest data protection method, but does it help or hinder cybersecurity-this is the current debate. This session will look at who, what, where, when, how and why of using tokens.
Hacking Blockchain (RSA Conference)
Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity management, verifiable records and digital assets such as stocks. Is the industry building new systems on a cryptographically…Continue