Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Education & TrainingCybersecurity News

RSA 2017: The "Culture" of Cybersecurity Collaboration

Platform integration, centralized management and a holistic view of risk were recurring themes at RSA this year.

RSA 2017: The "Culture" of Cybersecurity Collaboration
Dan Dunkel

Dan Dunkel

RSA 2017: The "Culture" of Cybersecurity Collaboration
Dan Dunkel
April 1, 2017

The 2017 RSA Cybersecurity Conference in San Francisco was more crowded than last year, if that’s even possible. Cyber crime and espionage in general show no signs of slowing down as industries, militaries and governments answer the challenge.

End point integration and central management were recurring themes, and for the first time “Physical Security” was actually a category on the exhibitor website.

Having researched the current trend of startup firms emerging from technology incubators, in Israel and here in the U.S., I was anxious to meet several companies featuring innovative products at this year’s show. While the Jewish nations Cyber Intelligence Unit 8200 is renowned globally for its expertise in developing offensive weapons and countermeasures, Israel’s cybersecurity success appears to be a direct connection between a shared “military culture” and a government that both supports, and more importantly, “does not over regulate” this critical industry. Both of these points were driven home by a panel discussion, “Meet the Leaders of the Startup Nation,” featuring the CEO’s from Team 8 and CyberArc, the head of R&D from the Israeli National Cyber Directorate, and a professor from the Interdisciplinary Cyber Research Center at Tel Aviv University. The panel also stressed the fact that in Israel “critical debate” is another important cultural factor of continued success while embracing the need for continuous improvement in product development and research. Stateside, The Hive (www.hivedata.com) is a Palo Alto, CA-based co-creation studio and think tank incubator that funds start-ups in emerging technologies and markets. The Hive utilizes seasoned executive advisors to execute market strategies to drive revenues. Its business model leverages a culture of “collective networking” as applied to emerging innovations.

These cultural traits can be recognized in several cyber companies attending RSA that are poised for rapid growth. I witnessed first hand the overflow crowds at the booth for SentinelOne (www.sentinelone.com) a leader in next generation endpoint protection, and founded by Israeli defense and intelligence experts. The company maintains an R&D team in Israel, and has established domestic operations in Palo Alto to manage its rapid worldwide growth. SentinelOne has proven itself to be an innovative platform to replace traditional anti-virus solutions through its machine learning capabilities and a Deep File Inspection (DFI) engine. For the second year in a row, the company was recognized by Gartner as a Visionary in their Magic Quadrant for Endpoint Protection Solutions. In fact, it also received a “Recommended” rating from NSS Labs for its platform after achieving a 100-percent rating across six tested categories.

E8 Security (www.e8security.com), a portfolio company from The Hive, was working the show from their suite in the St. Regis hotel. If they planned to lie low, the fact that they won the “Best Cybersecurity Startup in 2017” from the Information Security Community on LinkedIn, may have blown their cover. The ISC on LinkedIn is a vast community of 350,000 cybersecurity professionals with a keen eye on emerging players in the cyber market. The E8 Security Fusion Platform uses a unique approach to automate the learned behavior of both users and devices, resulting in improved “proactive” signals to accelerate cyber investigations. The platform provides the “next generation” in Security Operations Center (SOC) efficiency by essentially transforming traditionally manual operations, while focusing a human analyst on actionable intelligence. In the process, E8 Security can essentially double the performance of these valuable and in-demand human resources, and act as a force multiplier. Matt Jones, CEO at E8, is driven by understanding customer challenges, and explained, “We have quickly achieved a culture of collaborative innovation that has allowed us to ascend to a leadership position in Behavioral Analytics, which is transforming the way teams detect, hunt and respond to hidden threats inside their organizations.” Tom Kellermann, CEO at Strategic Cyber Ventures, is an investor in E8 Security and a recognized visionary in the cybersecurity field. Kellermann sees multiple market forces converging to counter sophisticated attackers, “When we created SCV we decided that we would invest in intrusion suppression technologies. Intrusion suppression includes capabilities that can, detect, deceive, and divert attacks from an elite hacker adversary,” he said.

A new Israeli cyber start up that I visited, Nyotron (www.nyotron.com) launched  in the U.S. market in January 2017, had a James Bond double providing a demonstration of their patented Behavior Pattern Mapping (BPM) solution at its booth. Nyotron promotes its ability to detect and block “ALL” malware attacks in real time. The technology is able to stop Advanced Persistent Threats (APT), Zero-Day and ransomware breaches before they occur, regardless of the type of methods used to access the network. The founder, Nir Gaist, is a former childhood cyber prodigy who started hacking at nine years old and later established the company as its first CTO, and today leads it as the chief executive. At age 14 he dropped out of school and wrote the cyber curriculum that was adopted by Israeli colleges and universities, and which is still in use more than 15 years later. He also believes that the culture is a major reason that Israel excels in cyber startups.

Nyotron believes that Threat Agnostic Defense is the next security paradigm. The PARANOID platform assumes you will be breached and acts as the last line of defense to protect, defend, respond and analyze. Nir explained, “Competing endpoint protection vendors are only able to analyze data…not the malware’s behavior.” It is a unique vantage point from which to view the problem of cybersecurity.

Platform integration, centralized management and a holistic view of risk were recurring themes at RSA this year. Moving forward, cyber and physical security (surveillance/access/sensors) are aligning around the huge Internet of Things (IoT) market opportunity, where cyber is the foundational technology, and “Collaboration is king!”

KEYWORDS: cyber security products cybersecurity tools RSA security convergence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security awareness freepik

    Building a culture of cybersecurity: 3 key takeaways from the 2021 SANS report

    See More
  • executive stands in front of skyscraper

    Embracing a company culture of cybersecurity starts at the top

    See More
  • RSA Conference 2014

    RSA Review: Converged Risk and the Internet of Things

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • databasehacker

    The Database Hacker's Handboo

See More Products
×
Dan Dunkel

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!