2016 RSA Conference Trends and Predictions

Conference Trends and Predictions

Recent cyber threats and security breaches have created quite a bit of chaos around the world. This year’s RSA Conference, the world’s largest security event, was hosted with this in mind. From IoT management, to access control systems, to encryptions, there are a lot of topics that have been discussed, and as a modern business, it is upto you to keep you with them.

To know more about the latest trends and news of the RSA event, check out the following article:

Trends and Predictions from the 2016 RSA Conference

The RSA Conference (RSAC) is the world’s largest security event, providing the latest security trends, predictions and threats. Below, we highlight three key topics from the 2016 RSA Conference:

  • Internet of Things (IoT) security
  • Encryption and privacy
  • Lack of cyber security talent

IoT Security Threats

Michael Brown, CEO of Symantec, stated that IoT devices are expected to grow from five billion to 50 billion within the next five years.

As IoT devices, such as beacons, wearable devices, smart lights and locks, continue to expand in the workplace, businesses must prepare for the added risks that come along with them.

Having multiple devices connected not only to each other, but the company network, increases the risk of hacker’s gaining access to systems and data, if left unsecured.

For example, nearly 70% of people that own wearable devices do not protect them with passwords or passcodes. If employees bring these devices into your workplace unsecured, you run the risk of critical information being compromised. Businesses need to enforce strong IoT security measures, such as:

  • Professional installation. Work with a vendor that has the necessary expertise, insurance and certifications to properly coordinate with IT teams and ensure accurate equipment configuration.
  • Vendors that have security in mind. Unfortunately, not all IoT vendors have security in mind. Before purchasing, evaluate products and services to determine if they can encrypt network communications, enable password/passcode protection, and regularly support updates.
  • Network firewalls. Installation of network firewalls and antivirus software can add an extra layer of protection, preventing hackers from gaining access to critical systems and devices. Remember, when installing these systems, update regularly to avoid weak networks and outdated protection.

The Need for Encryption and Privacy

As technology continues to evolve, so will the security measures needed to protect new devices, equipment and systems. The CEO of the International Association of Privacy Professionals, Trevor Hughes stated, “Technology will continue to change our definition of privacy and our expectations of privacy.”

For example, Apple recently refused to unlock the San Bernardino shooter’s iPhone to release information to the FBI. Situations like this question the future of technology and individual’s security rights.

AAEAAQAAAAAAAAQHAAAAJGFkMGIyOTBjLTEzYTItNDdhYS04ODc5LTZkNDRkMjlkNDgzYw

Michael Chertoff, co-founder and executive chairman of The Chertoff Group, stated, “Encryption is going to be a key element in a strategy to secure all of this going forward.”

Although encryption is not a new form of security, it is a growing necessity to secure sensitive information and ensure privacy in today’s tech-driven world.

Lack of Talent in Cyber Security

The Internet provides your business with convenience and easy access to information, but increases risk when networks, devices and systems are not properly protected.

To avoid threats, quality cyber security talent must be present. According to a report conducted by ISACA and the RSA Conference, 59% of respondents cited that half of cyber security and information specialists hired lacked the proper qualifications.

Written by 

Taylor doesn't just write about the latest technology to the thousands of devout followers who have the privilege of reading her daily work, she also lives it all through proving all the new ideas and reporting to the keen followers she whispers to.

Leave a Reply

Your email address will not be published. Required fields are marked *