Soundcloud YouTube
Extract The Signal From The Noise - Follow Us

RSA Conference US 2017 (February 13-15): San Francisco, CA

RSA Conference US 2017


Watch theCUBE’s Coverage of the RSA Conference 2017 LIVE



Event Details:

  • Date:
        February 13-15, 2017
  • Location:
         Moscone Center
         San Francisco, CA

Protecting and Defending against Cyberthreats in Uncertain Times
While many hacks, data breaches and leaks are the work of criminals seeking financial gain, new threats continue to emerge targeting civilians, businesses and governments. Join Microsoft President Brad Smith as he discusses these growing and evolving cyberthreats and what’s needed to protect and defend this critical infrastructure.


Guests Included


Tom Corn
SVP, Security Products, VMware

Tom Corn

Interview Overview: Using automation and virtualization to protect data in the cloud
Tom Corn, senior vice president of security products at VMware, stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how VMware is seeking to find answers to security problems in the cloud. “The thing that hasn’t been talked about [are the] ways to use the unique properties of the cloud to secure things,” said Corn. He began his discussion about security wondering how companies are going to secure and protect data and applications in the cloud. Citing the interesting features that come with the cloud, like automation and virtualization, he stated that one of the largest gaps in security is of an architectural nature. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Ian Foo
Director, Product Marketing, Data Center Networking, Huawei

Ian Foo

Interview Overview: Cloud and mobile drive new security tech to combat hackers
Ian Foo, vice president of security and compliance at Sumo Logic Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how cybersecurity is a team sport. Because cloud has changed the landscape, cloud service providers are looking for ways to provide capabilities that match what customers are used to in their environment, according to Foo. “What’s evolving is the way threats are addressed and recognized,” he said. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


George Gerchow
VP of Security & Compliance, Sumo Logic

Interview Overview: ‘It takes an ecosystem’ to secure the cloud, says security VP
George Gerchow, vice president of security and compliance at Sumo Logic Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how The old way of securing data simply isn’t cutting it in the cloud. “They’re so scared, some of them, of ‘oh my gosh, my data is leaving beyond my control,’” he exclaimed. “But the reality is, I can use some of that scale and some of those automated systems in the cloud to make the data more secure once it moves out there. I can leverage the power of code to really lock down how that data is protected against both inside sources and external sources.” Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Rohit Ghai
President, RSA

Interview Overview: Oops, hackers can use AI and machine learning too. Now what?
Rohit Ghai, president of RSA Security LLC., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about the catch in all the hurrah about businesses using AI and machine learning to secure data: Cybercriminals have them too, and they may be even better at using them. “It’s not a technology problem anymore,” said Ghai. “All of the things like advanced artificial intelligence, machine learning, data science, all of those things are great capabilities.” The catch: Hackers have all the same technology, so companies need another way to get the leg up, he added. “The context is super important,” he said. “If you can apply business context to the way you apply that information and those tools, that’s how you win.” Ghai said that RSA’s Business Driven Security plays to an advantage that hackers can’t get their hands on. He said that applying business context to threats and their handling lets companies set priorities and stay a step ahead of attackers. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Ajay Gupta
Director of Product Management – Security, Huawei

Ajay Gupta

Interview Overview: Mixing man and machine: automating security functions in the cloud
Ajay Gupta, director of product marketing and management at Huawei Technologies Co. Ltd., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how as more organizations choose cloud solutions to meet their IT needs, they are also looking to cloud-based security to keep information secure. “From a security perspective, no single vendor can offer best-of-the-breed security to their customers,” said Gupta. Gupta explained that for cloud security, different partners must bring their different strengths together to provide the pieces of the security puzzle. Huawei announced its new security gateway, USG9000V, at the RSA Conference. It is the industry’s first terabit-level cloud integrated security gateway, combating security threats in the cloud, he explained. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Ted Julian
Co-Founder & VP of Product Development, IBM Resilient

Ted Julian

Interview Overview: Companies need to share data to keep hackers at bay
Ted Julian, Co-Founder & VP of Product Development at IBM Resilient, stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how Hackers share information about targets and tools to attack them, giving them a potential edge against individual companies aiming to protect themselves. “It’s only when the good guys share what they’re experiencing we’ll turn the tables on the bad guys,” he said. The best in the business are getting better, Julian said. The challenge is to percolate that improvement down through the marketplace. For its part, Resilient offers customers a platform to create a consistent and repeatable process to deal with the inevitable breach when it happens. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Derek Manky
Global Security Strategist, Fortinet

Derek Manky

Interview Overview: Is IT security moving faster than the bad guys?
Derek Manky, global security strategist at Fortinet Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how hackers and cybercriminals of the world are constantly working on new ways to attack computers. “The manual work is what’s killing a lot of people out there,” he said. By the time someone plugs in a new manual or downloads an update, it’s already too late. While data is vital, there’s also so much data that it’s hard to make sense of it all. Fortinet has taken an approach where it has invested a lot into automation, machine learning, and artificial intelligence, Manky explained. The company’s focus is on making data — including threat intelligence — actionable. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Tamara McCleary
CEO, Thulium

Tamara McCleary

Interview Overview: Geeks with capes: The new cybersecurity superheroes?
Tamara McCleary, chief executive officer of Thulium.co, stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how security professionals continue to battle back as cybersecurity breaches challenge organizations of all types. “I actually think that right here, right now, we are in the midst of geeks with capes. These are the new superheroes. My cybersecurity superheroes are right here,” said McCleary. She went on to discuss the cool new things she saw at the RSA Conference and pointed out her interest in Internet of Things threats and how the cybersecurity industry is using artificial intelligence to battle security threats today and what that might lead to tomorrow. Read the full blog post with highlights from her interview at SiliconANGLE.com.
 


Mark Nunnikhoven
VP, Cloud Research, Trend Micro

Interview Overview: How the cloud is actually making cybersecurity better, not worse
Mark Nunnikhoven, vice president of cloud research at Trend Micro Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how the cyberattacks continue to evolve and adapt to the efforts of cybersecurity teams, the possibility of full defense seems unattainable. “That’s sort of the name of the game: Make it harder so that you get a better chance at protecting your data and at least being aware when you have been breached,” he said. Nunnikhoven is seeing “a lot of maturity in that space, where people are embracing that fact, and starting to enable some things that we’ve been trying to do. Like solid identity and access management, that’s been really difficult in the enterprise. It’s far simpler in the cloud space.” Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Jason Porter
VP Security Solutions, AT&T

Interview Overview: Tech-telecom alliance aims to solve the burning issue in IoT: security
Jason Porter, vice president of security solutions at AT&T Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about the the burning question as the Internet of Things starts to transform entire industries. “We formed an alliance with some big names out there, like Palo Alto Networks, IBM, Trustonic and others,” Porter said. “IBM and AT&T are two of the largest managed security companies on the planet, so you would think competition,” Porter said. He said that solving IoT’s security problem is so pressing right now that companies can’t afford not to work together. “It’s the number one barrier or concern for adopting IoT,” he said. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Kapil Raina
VP of Product Marketing, HyTrust

Interview Overview: How can companies tackle security and compliance for multi-cloud workloads?
Kapil Raina, vice president of product marketing at HyTrust Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about security threats and tightening compliance regulations added to managing multi-cloud workloads. “Target and all these breaches have shown that regardless of how it happens, you’re still responsible at the end of the day for your customers’ safety,” he said. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


John Smith
Principal Solutions Architect, ExtraHop Networks

Interview Overview: Real-time wire intelligence for tomorrow’s networks
John Smith, vice president of security and compliance at Sumo Logic Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about how with the data revolution pushing more and more volume onto networks of all kinds, the need to monitor those networks as the data comes in is critical to guard against cyberattacks. “What we’ve seen with our customer base is kind of a burgeoning security practice, where people are actually using the appliance more in a security use-case. That’s probably our fastest-growing use-case right now,” Smith said. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


Muddu Sudhakar
SVP & GM, ITOM, ServiceNOW

Muddu Sudhakar

Interview Overview: Will security staff get a helping hand from AI with automated ‘SecOps’?
Muddu Sudhakar, senior vice president and general manager at ServiceNow Inc., stopped by theCUBE and talked with Jeff Frick (@JeffFrick) about companies are still short on staff to actually deal with threats once they are found. “What people don’t have is people,” Sudhakar said, referring to the dearth of cybersecurity workers at most companies. He said that what companies are seeking is called security operations or SecOps. Its chief aim is to automate the security response, and it is the next hot area in security, he believes. Read the full blog post with highlights from his interview at SiliconANGLE.com.
 


For More Information : Contact theCUBE

Share Button