Spring is here. And it could not have come soon enough, after a particularly difficult winter for most of the U.S. Record-setting snow falls, flooding, and extreme cold temperatures plagued businesses, homeowners and travelers from November through March. Businesses shut down, flights were grounded, and many people were forced to hunker down and stay home.
The 2015 RSA Conference provides security professionals access to myriad keynotes, educational sessions and solutions for today’s cybersecurity risks. Whether you’re headed to San Francisco for the conference April 20-24 or you’re observing cybersecurity trends from your office, here is a sampling of some of the trends, products and services showcased at this year’s event.
Speaking of a supply chain security challenge, one of United Iron and Metal’s warehouses is outdoors in a hard-scrabble urban neighborhood of Baltimore, and it sprawls over more than 20 acres with one boundary chockablock against railroad tracks. Unwanted visitors were a relentless headache... until John Creighton, the director of security at United Iron and Metal, did something about it.
Helping your enterprise to stand out in today’s marketplace means providing services above and beyond your competition, and that involves making your stakeholders, customers and employees feel safe while surrounding them with top-notch amenities, from the building to the perimeter to the parking lot.
Walk through the show floor at ISC West in Las Vegas next month and you’ll see hundreds of security products peddled by vendors wanting to sell you the “latest and greatest” in security technology. But sometimes, you don’t need technology as much as you need someone to sit down with you and have a frank and honest conversation about what you should or should not install in your enterprise. Then you can talk technology, right? Of course, it all depends upon your situation, your environment and the risks that you are trying to mitigate, but who wants to be sold something that they don’t need or can’t use?
Though biometric analytics have been around for a few years now, Apple and Samsung’s recent introduction of fingerprint readers to their newest mobile devices prove that biometric security systems are going to be more and more commonplace in the public sector. The research organization Goode Intelligence estimates that biometric authentication will be on most mobile devices by the end of 2015 and that by 2019, it will be used by 5.5 billion people worldwide. Familiarity with biometric analytics means ease of use for employees and consumers alike.
In fact, the scope of this attack differs from any we have responded to in the past, as its purpose was to both destroy property and release confidential information to the public. The bottom line is that this was an unparalleled and well planned crime, carried out by an organized group, for which neither SPE nor other companies could have been fully prepared.”
In the midst of mergers and acquisitions, there is still plenty of innovation and energy within the security industry, and enterprise security executives are in a position to benefit. As more and more end users attend the annual ISC West conference April 15-17 in Las Vegas, more focused solutions find their way to the forefront of booths, as manufacturers outline not only the technical aspects but the integration possibilities, risk mitigation benefits and problem-solving features of their new solutions for active end users.
In 2009, Heartland Payment Systems announced that it had suffered a devastating breach: 134 million credit cards were exposed through SQL Injection attacks used to install spyware on Heartland’s data systems. The company processes payments for debit, prepaid and credit cards, in addition to online payments and checks and payroll services.
In June 2014, Sy Alli made a career move that was controversial, daring and, in his opinion, potentially ruining to his future prospects: He became the first director of corporate security for a marijuana-based enterprise: Dixie Brands, Inc.
Global Security Operations Centers (GSOCs) are a valued necessity to support an enterprise’s global business goals and operations today, but building one requires buy-in, organization and insight from the enterprise’s internal and external customers, including its GSOC operators.