RSA Conference 2021 will be held on May 17, 2021, US time. This will be the first time in the history of the RSA Conference that it will be held in the form of a virtual conference. The organizing committee announced the theme of the conference six months in advance: Resilience.
Resilience emphasizes “resilience”. “Resilience” has different meanings in different fields, but the constant essence is the ability to be flexible. From the perspective of confrontation and competition in human real and virtual societies, it is the ability to predict, resist, recover and adapt to adverse conditions, stress, attack or destruction.
Every year since 1995, the RSA Conference has set a refined theme. These themes reflect, to a certain extent, changing trends in the global security market. As Connect to Protect said in 2016, the Internet of Everything. In 2019, Better uses new technologies such as AI to race against cyber attacks. In 2020, Human Element emphasizes the importance of “people” in cyber security.
Resilience 2021 emphasizes “resilience”. “Resilience” has different meanings in different fields, but the constant essence is the ability to be flexible. From the perspective of confrontation and competition in human real and virtual societies, it is the ability to predict, resist, recover and adapt to adverse conditions, stress, attack or destruction.
Simply put, cybersecurity itself requires flexible thinking and capabilities, and cybersecurity practitioners and the solutions they provide need to be adaptive and constantly evolving.
The Core of Cyber Resilience
Be prepared for anything that may come.
Enterprises have long focused on building layers of protection for their networks, systems, and data, and researching technologies that implement how to detect and respond to attacks can be very useful, but this line of research also reflects a dangerous reality: we are passive Ground defense, now it’s time to think about how to shift the initiative from the opponent to our advantage.
Attackers attack corporate networks for two purposes: one is to steal, destroy or modify data, and the other is to implant programs that can control corporate networks or systems. While it’s never possible to predict exactly when or how an attacker will launch an attack, you can always do something about it: make a corporate network or system hard to find, hard to attack, hard to damage, in short, It’s about being resilient. When we design networks and systems, even if attackers successfully penetrate into networks and systems, we will try our best to minimize the damage caused by them and ensure the continuous operation of enterprise networks and systems.
Going further, CyberSecurity focuses on reacting during and after events, while CyberResilience focuses more on anticipating in response to any event that may occur.
How to achieve enterprise cyber resilience from scratch?
According to Accenture, there are six ways companies can build a solid foundation for eventual enterprise cyber resilience:
1. Do a good job in the basic work of traditional network security
Includes routine security operations tasks, such as software vulnerability patches, system updates, and access control. These tasks are an essential part of an enterprise’s security operations, but they are certainly not enough. Such conventional measures are a remedy for previous security incidents and are a delayed measure.
2. Leverage the elasticity of the cloud for improved security
There are many reasons why companies move applications and data to the cloud, and security should be one of the most important. When you become a user of cloud computing, in fact, the cloud is equivalent to adding a “shell” to your enterprise network and data. You can make full use of the cloud’s elastic load, multi-domain computing and multi-cloud strategy functions. These functions make the enterprise network The exponential increase in the difficulty of external location and destruction of data and data can greatly enhance the ability of an enterprise to sustain its business.
3. Implement truly data-centric security measures
Data-centric security goes far beyond traditional data security policies. It includes technologies such as: encryption, tokens, segmentation, access restrictions, annotations, labels, strong identity and access management, and automated access decisions. With these technologies, data security is no longer a function of lag. Data security is implemented in the entire process of enterprise management and use of these critical assets. When relevant technologies are applied, enterprise data will be more difficult to steal, modify or destroy.
4. At the stage of designing business application systems, it is necessary to meet security requirements
Put security considerations first and make them integral to every stage of an enterprise’s process of developing applications: adopt DevSecOps practices, use automated scanning and testing to continuously discover potential security vulnerabilities, use polymorphic coding techniques to continuously Change the attack surface an application may receive, thereby increasing the cost of intrusion attacks and defeating them.
5. Strategies for Leveraging Software-Defined Networking (SDN)
If an attacker can’t see your network, he has no way to attack. SDN enables you to continuously change the topology of the enterprise network, and you can even change routes in the middle of a session, confounding attackers when faced with the enterprise network.
6. Actively take active defense
Apply AI technology and security automation and orchestration tools (SOAR) to find problems and take action in real time; conduct continuous scanning and stress testing of enterprise network environments to find vulnerabilities before attackers; make full use of threat intelligence, more Gain a good understanding of the current state of outside attackers and focus on the most important and valuable threats to your business. These active defense technologies enable you to become the hunter, not the prey, in cyber warfare.
Let’s do our homework and wait quietly for the conference to come!
The four-day agenda is attached below.