What will be news at RSA Conference 2015?

In the months following RSA Conference 2013, Executive Chairman Art Coviello saw his company’s name trashed through allegations that a secret deal was made with the NSA that allowed snooping on data, banners unfurled on the Moscone Center during the opening of this year's event and speakers withdraw from this year's event.

We asked Coviello what he thought next year's opening keynote address would be about.

"Even before the Snowden revelations, these issues of cyber-weapons and the Internet of Things and the expansion of the attack surface were increasingly on my mind as a worry. So, I'm not surprised, irrespective of the Snowden revelations that I gave the speech I gave this year".

Coviello told us that he used this year's keynote as an opportunity to "address the issue around RSA so that people had perspective".

"People confuse RSA the algorithm – which is ubiquitous around the world - with RSA the company whose technology to deploy the encryption algorithm is yea big" he added, indicating that this is no longer a huge part of RSA's commercial business.

For his keynote speech in 2015, Coviello thought that three topics would be close to the top of the agenda; virtualisation and security, the four principles he described in this year's keynote and identity management.

While this year's speech was heavily focussed on a response to events, Coviello said that he expected his 2015 address to be "more of a technical speech".

"Next year, I would guess that I would be, there might be more of a talk around software defined networks and using virtualisation technology to secure itself. I gave a similar speech four years ago that, thanks to my researchers and technical researchers, has turned out to be somewhat prophetic. As opposed to virtualised infrastructure being a concentration of risk, using virtual infrastructure to secure itself may indeed be a source of solution to a number of our security infrastructure problems," he said.

A significant part of RSA's strategy is on the use of big data analytics. Coviello sees virtualised technology as a lynchpin of this strategy.

"What if, by policy, every time you created a virtual instance that a security control automatically goes with it? What if, because of the way traffic goes across a virtual environment and the way virtual machines are developed you can get more application information of user information that you can analyse and correlate for potential anomalies in user behaviour of in the use of the application or the flow of data," he said.

Judging by the number of vendors on the expo floor with an interest in identity management, it's no surprise that Coviello sees this as an important area to focus on.

"Identity management, which I touched on in the speech – we need a new model for that," he added.

Join the CSO newsletter!

Error: Please check your email address.

Tags #rsa2014identity managementpolicyrsa conference 2014@RSACSnowdensecurity controlrsavirtualised technologyArt Covielloattackcyber weaponsRSA Conference 2013

More about indeedNSARSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Anthony Caruana

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts