Here's a sampling of the many sessions at RSA 2014 that will provide timely insights for security specialists in the government sector on such topics as vetting foreign technologies and implementing the new cybersecurity framework.
A recent attack on the server of a Texas healthcare organization exposed information on hundreds of thousands of patients and employees. A security expert outlines steps for preventing and detecting such incidents.
Encryption gaps in retail payment card transactions were highlighted at a Congressional hearing that examined security failures in the aftermath of malware attacks against point-of-sale systems at Target and Neiman Marcus.
At a Feb. 4 Senate hearing, a senior executive from Target Corp. endorsed a shift to chip cards, combined with PINs, to enhance security, while a Neiman Marcus executive questioned if that was a prudent move.
A review of the RSA 2014 agenda shows several seminars, panels and speakers of particular interest to healthcare-focused attendees, including those focused on mobile device security and medical device hacks.
Several payment system experts testifying at a Senate hearing on Feb. 3 urged the adoption of chip card technology in the wake of breaches at Target Corp. and Neiman Marcus. But representatives of banking and retailing engaged in some finger-pointing.
The PCI Security Standards Council has no plans to modify its standards for payment card data security in response to high-profile payment card breaches at Target and Neiman Marcus, says Bob Russo, the council's general manager.
They're thought-leaders. Movers and shakers. VIPs and MVPs within their industry sectors. And their actions weigh heavily on how information security is practiced, taught and tested. These are 2014's Influencers.
A class action lawsuit has been filed against Horizon Blue Cross Blue Shield of New Jersey in the wake of a recent data breach that affected nearly 840,000 members. One legal expert predicts breach-related litigation could soar in 2014.
Anecdotal evidence usually supports the data the Labor Department culls on IT security employment. Usually isn't always, and the 2013 stats reported by the Bureau of Labor Statistics are at odds with what is likely true.