by Avivah Litan | April 12, 2018 | Comments Off on What to look for at the RSA Security Conference
Effectively navigating the RSA Security conference next week will be a challenge – there’s always so much to see, so much to learn, and so many people to connect with face to face.
This year I am attending with five main areas of interest that the conference sessions support, and I’m optimistic that I will come back much more informed than I was when I got there.
- Blockchain technology and security implications
Blockchain technology is likely to have a profound impact on our planet in the next 5-10 years. It’s slow to develop outside cryptocurrency use cases so I’m particularly interested in learning about the infrastructure being put in place to scale the use of this technology, the security implications, and what type of blockchain implementations can have the biggest impact on our society.
For example, I am very interested in how blockchain based advertising models can put consumers back in control of their own data, enable consumer privacy, and disrupt the gatekeeper-like business models that drive Internet commerce today (e.g. where Google and Facebook control most of the digital ad business).
Gartner just published a special report on blockchain that sheds a lot of light on the current and future state of this technology. See Gartner research on Blockchain Based Transformation
- Women in Security
Women represent just 11% of the information security workforce, a number that has remained stagnant since 2013, according to a comprehensive 2017 study co-authored by the Executive Women’s Forum and (ISC)2 & the Center for Cyber Safety and Education. See Women’s Report .
I’m very much looking forward to exploring this topic as the moderator of a panel with women from Israel’s elite 8200 cybersecurity unit. The session “The Untold Story of 8200: A Launching Point for Women in Cybersecurity” is on April 17 at 1 p.m.
Three other areas of interest I have that are supported by the RSA agenda are:
- Automated AI driven security incident prevention, orchestration and response
- Advanced Hacking methods
- Healthcare (iOT) security risks
Should be a vibrant motivating conference – and it’s always refreshing to see people “live”.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.