RSA Conference Daily
-- Brought To You By Dark Reading & InformationWeek

Follow our coverage of RSA on:
Facebook: http://www.facebook.com/pages/Dark-Reading/117573104930124
Twitter: https://twitter.com/DarkReading
LinkedIn: http://www.linkedin.com/groups/Dark-Reading-3193466

Thursday, April 19, 2018

HIGHLIGHTS:
- 2018 RSA Conference: Execs Push Cooperation, Culture & Civilian Safety
- Data Visibility, Control Top Cloud Concerns at RSA
- Cyber War Game Shows How Federal Agencies Disagree on Incident Response
- The Role of KPIs in Incident Response
- RSA Keynote: Akamai CISO Andy Ellis and VP of Web Security, Josh Shaul

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TOP STORIES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- 2018 RSA Conference: Execs Push Cooperation, Culture & Civilian Safety

On the keynote stage, execs from Microsoft and McAfee introduced a new Cybersecurity Tech Accord.
https://www.darkreading.com/risk/2018-rsa-conference-execs-push-cooperation-culture-and-civilian-safety-/d/d-id/1331563

- Data Visibility, Control Top Cloud Concerns at RSA

As the traditional perimeter dissolves and sensitive data moves to the cloud, security experts at RSA talk about how they're going to protect it.
https://www.darkreading.com/cloud/data-visibility-control-top-cloud-concerns-at-rsa-/d/d-id/1331573

- Cyber War Game Shows How Federal Agencies Disagree on Incident Response

Former officials at DHS, DOJ, and DOD diverge on issues of attribution and defining what constitutes an act of cyber war.
https://www.darkreading.com/operations/cyber-war-game-shows-how-federal-agencies-disagree-on-incident-response/d/d-id/1331574

- 7 Steps to a Smooth, Secure Cloud Transition

Security leaders share their top steps to keep in mind as your organization moves data and applications to the cloud.
https://www.darkreading.com/cloud/7-steps-to-a-smooth-secure-cloud-transition/d/d-id/1331535

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
LATEST NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- The Role of KPIs in Incident Response

Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program.
https://www.darkreading.com/vulnerabilities---threats/the-role-of-kpis-in-incident-response/a/d-id/1331516

- 8 Ways Hackers Monetize Stolen Data

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
https://www.darkreading.com/attacks-breaches/8-ways-hackers-monetize-stolen-data-----------/d/d-id/1331560

- Latest News from RSAC 2018

Check out Dark Reading's exclusive coverage of the news and security themes that are dominating RSA Conference 2018 this week in San Francisco.
https://www.darkreading.com/careers-and-people/latest-news-from-rsac-2018/d/d-id/1331575

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TODAY'S RSA EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Keynote: How Do I Get My Company to Ditch the Firewall | 10:30 AM - 10:55 AM | Moscone West Level 3

Akamai CISO Andy Ellis and VP of Web Security, Josh Shaul will provide insight into how you can drive efficiency and simplifiy access for your global teams, without losing control over secure access.
https://www.rsaconference.com/events/us18/agenda/sessions/11294-How-Do-I-Get-My-Company-to-Ditch-the-Firewall

- Incorporating Security Practices into Business Processes | 1:45 PM - 2:30 PM | Moscone West 2004

This presentation will talk about how to build security behaviors into organizational policies and procedures and therefore practice.
https://www.rsaconference.com/events/us18/agenda/sessions/11109-Incorporating-Security-Practices-into-Business-Processes

- The Hugh Thompson Show: Artificial Intelligence | Friday April 20, 2018 | 1:00 PM - 2:00 PM | Moscone West Level 3

The Hugh Thompson Show will bring together rock-star experts Dr. Dawn Song, Dr. Kate Darling and Dr. Sebastian Thrun to explore with fun, fear and fascination the many layers of artificial intelligence and its application and potential to help—or hurt—humanity.
https://www.rsaconference.com/events/us18/agenda/sessions/11994-The-Hugh-Thompson-Show-Artificial-Intelligence


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
VENDOR ANNOUNCEMENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- CompTIA Offers Free Cybersecurity Mini Boot Camps at Upcoming AFCEA Defensive Cyber Operations Symposium

The comprehensive, three-hour mini boot camps will focus on two of CompTIA’s industry leading cybersecurity certifications.
https://www.darkreading.com/careers-and-people/comptia-offers-free-cybersecurity-mini-boot-camps-at-upcoming--afcea-defensive-cyber-operations-symposium/d/d-id/1331586

- SAP Security Tool Enables Automated QA & Security Checks for SAPUI5

Virtual Forge now offers its CodeProfiler for HANA with support of SAPUI5.
Link

- RedLock Enhances Visibility, Compliance Assurance, and Threat Detection with Azure

Integration with Azure Network Watcher Enriches Context on Risks.
https://www.darkreading.com/cloud/redlock-enhances-visibility-compliance-assurance-and-threat-detection--with--azure/d/d-id/1331569

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ADDITIONAL RESOURCES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Interop ITX: The Independent Conference For Tech Leaders, April 30 - May 4, Las Vegas

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts.
http://schedule.interop.com/track/security

- Dark Reading Tech Digest
Explore the steps enterprises can take to manage the cybersecurity skills shortage, and the risk these shortages pose in protecting against attacks
https://www.darkreading.com/drdigital/20180212td?

- [Strategic Security Report] Navigating the Threat Intelligence Maze

Most enterprises are using threat intel services but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
http://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/[strategic-security-report]-navigating-the-threat-intelligence-maze/393933?

- Webinar May 9, 1:00 PM EDT: Outsourcing IT Security

A top expert discusses security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.
https://webinar.darkreading.com/3587?keycode=sbx&cid=smartbox_techweb_webcast_8.500000824

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TO UNSUBSCRIBE:
To opt-out of any future marketing promotions from Dark Reading, please click here
Link

PRIVACY NOTICE
UBM Tech takes your privacy seriously.
To learn more, please read our Privacy Policy http://legal.us.ubm.com/privacy-policy/

FOR FURTHER COMMUNICATION, PLEASE CONTACT:
Customer Service
UBM Tech
2 Penn Plaza, 15th Floor
New York, NY 10121