The first day of 2016's RSA Security Conference is in the books, and the ESG team offered some thoughts from San Francisco on the sights, sounds, and news from the event:
Doug Cahill, Senior Analyst
The first day of the RSA Conference is as much about the side conferences as it is about RSA itself, including America Growth Capital’s (AGC) investor conference and the Trusted Computing Group’s sub-conference focused on securing the Internet of Things (IoT) in both the panels and vendor expo.
Of note at the TCG event were representatives from the operating system sides of Microsoft and Google — as well as a principal engineer from CoreOS — who were not there to debate which OS would win the IoT war, but more to talk about leveraging Trusted Platform Module (TPM) as a trusted foundation to secure the increasingly vast array on IoT devices, sensors, and systems.
With self-encrypting drives (SED) and encryption in general key to securing IoT, the conversation also ventured into the privacy v. national security conundrum as manifested in the Apple v. DOJ\FBI issue. Darin Andersen from CyberUnited rightfully posited that as an industry, we will need to start to segment how we talk about IoT devices given the significant differences in consumer devices such as wearable, industrial-grade systems, kiosks and ATMs. With last night’s opening expo hall reception and a myriad of vendor parties, RSA has now kicked off with a number of important industry discussions. Stay tuned.
Dan Conde, Analyst
The NSX Session with Guido Appenzeller emphasized that a new approach is needed, as computing makes the second big shift from mainframe to client/server and currently undergoing a change to the cloud. For example, a unified virtual network with NSX helps with a rethinking. Traditional ways of deploying physical firewalls will require one to deploy hundreds of firewall appliances (not practical), so using a VM appliance along with a virtual network is a way to rebuild systems.
The Innovation in Network Security session with Michael Geller of Cisco talked about how SDN and NFV enables one to change the trust boundaries and redesign your security approach. This enables one to drive complexity out and it can secure the network further. A loop between applying policy and analytics enables one to program the network better. One needs to separate what it means to create security by the network (e.g. network as a sensor) vs. security for the network (e.g. controller security)
Jon Oltsik, Senior Principal Analyst
Jon's thoughts on Day One are elaborated on in his blog post.