Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Education & TrainingCybersecurity News

RSA 2017: The "Culture" of Cybersecurity Collaboration

Platform integration, centralized management and a holistic view of risk were recurring themes at RSA this year.

RSA 2017: The "Culture" of Cybersecurity Collaboration
Dan Dunkel

Dan Dunkel

RSA 2017: The "Culture" of Cybersecurity Collaboration
Dan Dunkel
April 1, 2017

The 2017 RSA Cybersecurity Conference in San Francisco was more crowded than last year, if that’s even possible. Cyber crime and espionage in general show no signs of slowing down as industries, militaries and governments answer the challenge.

End point integration and central management were recurring themes, and for the first time “Physical Security” was actually a category on the exhibitor website.

Having researched the current trend of startup firms emerging from technology incubators, in Israel and here in the U.S., I was anxious to meet several companies featuring innovative products at this year’s show. While the Jewish nations Cyber Intelligence Unit 8200 is renowned globally for its expertise in developing offensive weapons and countermeasures, Israel’s cybersecurity success appears to be a direct connection between a shared “military culture” and a government that both supports, and more importantly, “does not over regulate” this critical industry. Both of these points were driven home by a panel discussion, “Meet the Leaders of the Startup Nation,” featuring the CEO’s from Team 8 and CyberArc, the head of R&D from the Israeli National Cyber Directorate, and a professor from the Interdisciplinary Cyber Research Center at Tel Aviv University. The panel also stressed the fact that in Israel “critical debate” is another important cultural factor of continued success while embracing the need for continuous improvement in product development and research. Stateside, The Hive (www.hivedata.com) is a Palo Alto, CA-based co-creation studio and think tank incubator that funds start-ups in emerging technologies and markets. The Hive utilizes seasoned executive advisors to execute market strategies to drive revenues. Its business model leverages a culture of “collective networking” as applied to emerging innovations.

These cultural traits can be recognized in several cyber companies attending RSA that are poised for rapid growth. I witnessed first hand the overflow crowds at the booth for SentinelOne (www.sentinelone.com) a leader in next generation endpoint protection, and founded by Israeli defense and intelligence experts. The company maintains an R&D team in Israel, and has established domestic operations in Palo Alto to manage its rapid worldwide growth. SentinelOne has proven itself to be an innovative platform to replace traditional anti-virus solutions through its machine learning capabilities and a Deep File Inspection (DFI) engine. For the second year in a row, the company was recognized by Gartner as a Visionary in their Magic Quadrant for Endpoint Protection Solutions. In fact, it also received a “Recommended” rating from NSS Labs for its platform after achieving a 100-percent rating across six tested categories.

E8 Security (www.e8security.com), a portfolio company from The Hive, was working the show from their suite in the St. Regis hotel. If they planned to lie low, the fact that they won the “Best Cybersecurity Startup in 2017” from the Information Security Community on LinkedIn, may have blown their cover. The ISC on LinkedIn is a vast community of 350,000 cybersecurity professionals with a keen eye on emerging players in the cyber market. The E8 Security Fusion Platform uses a unique approach to automate the learned behavior of both users and devices, resulting in improved “proactive” signals to accelerate cyber investigations. The platform provides the “next generation” in Security Operations Center (SOC) efficiency by essentially transforming traditionally manual operations, while focusing a human analyst on actionable intelligence. In the process, E8 Security can essentially double the performance of these valuable and in-demand human resources, and act as a force multiplier. Matt Jones, CEO at E8, is driven by understanding customer challenges, and explained, “We have quickly achieved a culture of collaborative innovation that has allowed us to ascend to a leadership position in Behavioral Analytics, which is transforming the way teams detect, hunt and respond to hidden threats inside their organizations.” Tom Kellermann, CEO at Strategic Cyber Ventures, is an investor in E8 Security and a recognized visionary in the cybersecurity field. Kellermann sees multiple market forces converging to counter sophisticated attackers, “When we created SCV we decided that we would invest in intrusion suppression technologies. Intrusion suppression includes capabilities that can, detect, deceive, and divert attacks from an elite hacker adversary,” he said.

A new Israeli cyber start up that I visited, Nyotron (www.nyotron.com) launched  in the U.S. market in January 2017, had a James Bond double providing a demonstration of their patented Behavior Pattern Mapping (BPM) solution at its booth. Nyotron promotes its ability to detect and block “ALL” malware attacks in real time. The technology is able to stop Advanced Persistent Threats (APT), Zero-Day and ransomware breaches before they occur, regardless of the type of methods used to access the network. The founder, Nir Gaist, is a former childhood cyber prodigy who started hacking at nine years old and later established the company as its first CTO, and today leads it as the chief executive. At age 14 he dropped out of school and wrote the cyber curriculum that was adopted by Israeli colleges and universities, and which is still in use more than 15 years later. He also believes that the culture is a major reason that Israel excels in cyber startups.

Nyotron believes that Threat Agnostic Defense is the next security paradigm. The PARANOID platform assumes you will be breached and acts as the last line of defense to protect, defend, respond and analyze. Nir explained, “Competing endpoint protection vendors are only able to analyze data…not the malware’s behavior.” It is a unique vantage point from which to view the problem of cybersecurity.

Platform integration, centralized management and a holistic view of risk were recurring themes at RSA this year. Moving forward, cyber and physical security (surveillance/access/sensors) are aligning around the huge Internet of Things (IoT) market opportunity, where cyber is the foundational technology, and “Collaboration is king!”

KEYWORDS: cyber security products cybersecurity tools RSA security convergence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security awareness freepik

    Building a culture of cybersecurity: 3 key takeaways from the 2021 SANS report

    See More
  • executive stands in front of skyscraper

    Embracing a company culture of cybersecurity starts at the top

    See More
  • meeting-enews

    Prove Cybersecurity’s Value to Build a Culture of Cybersecurity

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing