Event Date: April 25, 2017
Hosted By: RSA, Assurance Data & Carahsoft
Location: Washington, DC
Attendees of this luncheon explored the approaching problem of hunting for malware on their networks and endpoint. User learned more efficient and advanced methods for identifying threats using the latest IR tools.
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
Today’s evolving threat landscape makes it difficult for government agencies to
adequately detect and respond to increasingly sophisticated attacks. Perhaps the single
most challenging threat facing the United States government is the insider threat. Though
they occur with less frequency than t...
Achieving the right balance of security – without compromising the user experience – is a challenge for many federal agencies. RSA® Adaptive Authentication solves this challenge by providing risk-based multi-factor authentication for government agencies, ensuring the integrity of every user log...
This presentation is for informational purposes only. This document contains certain statements that may be deemed “forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995.
It’s an exciting yet daunting time to be a security professional. Security threats are
becoming more aggressive and voracious. Governments and industry bodies are
getting more prescriptive around compliance. Combined with exponentially more
complex IT environments, security management is increa...
RSA Identity Governance simplifies how user access is governed across the enterprise, making it possible to achieve sustainable compliance by fully automating the monitoring, reporting, certification, and remediation of user entitlements.
RSA Identity Governance simplifies how user access is governed across the enterprise, making it possible to achieve sustainable compliance by fully automating the monitoring, reporting, certification and remediation of user entitlements.
Industry expert Matt McCormack, former CISO at IRS and the Defense Intelligence Agency and now Chief Technology Officer of RSA’s Global Public Sector gives Director of Custom Media Jason Fornicola an overview of how organizations can rapidly respond to a data breach.
When organizations have confidence their information is secure, they are empowered to use it to accelerate their business. Identity assurance creates confidence and extends user authentication from a single security measure to a continual trust model that is the basis of how an identity is used and ...