RSA Conference 2013 summary: Big vendors with Big security solutions using the Big data

The security conference RSA 2013 concludes on Friday with Condoleezza Rice’s remarks on disclosure principles of large corporations when hacked. She suggested that now that Wall Street Journal and New York Times were hacked last week, the issue might get bigger and louder.

 

Hugh Thompson, the chairman of RSA Conference also compared the cold war and the “code war” with many countries. He also said that the conversation is long over about whether security is needed for IT, and is now only about how much and ROI of security analytics. Billy Bean, the guy who “stole everything and didn’t invent anything” on the baseball analytics using the moneyball strategy also suggested that it’s the security analytics and intelligence that could keep helping the good guys getting better than the bad guys.

 

Art Gilliland, the head of security group at Hewlett-Packard said that bad guys are depending on the big data such as combination of application vulnerabilities, network gaps, machine data, and social media to know who you are, where you go, and what you do to target specific company, group or even machine. So, this issue can be resolved through big data security intelligence platforms.

 

Art Corviello from RSA, who delivered the opening keynote started with how big data, converging with social, mobile, and cloud, will provide a wealth of information that can be sliced, diced, and analyzed to fuel intelligence-based security systems. He said an "intelligence-driven model can be made future proof. It evolves and learns from change". However he added a caveat that “if we, as an industry, overhype this situation, organizations won't take the necessary measures to prepare themselves”. 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation