Authored by: Carolyn Crandall, Chief Deception Officer and CMO – RSAC 2020 has come and gone, and cybersecurity experts from all across the globe have departed San Francisco armed with new knowledge, connections, and new ways of thinking about solutions to the cybersecurity problems facing all enterprises. Attivo Networks came ready to showcase new capabilities of the ThreatDefend® platform and educate customers and prospects on detection technology and—more specifically—the stages in which it can help them fortify their defenses: early detection, analysis and forensics, automated response and post-compromise threat detection. On a fun note, our “wolf in sheep’s clothing” plushes were in high demand and got quite a bit of attention on the show floor and social media. Overall, there were no shortage of great speaking engagements, breakout sessions, and keynotes to attend, so let’s talk about some of the conference’s key takeaways.
Henry Ford once said, “Coming together is a beginning; keeping together is progress; working together is success.” Black Hat anticipates that they had a 20% increase in attendance over the 15,000 that attended in 2016. Attendees flooded the halls with eager anticipation to discover new technologies and sharpen their skills to defeat the modern day cyber attacker. Deception technology demonstrated that it was top of mind for many of last week’s attendees. Attivo Networks upped the exhibition game with a never-been-done-before Deception Hall of Mirrors where attendees could experience an altered reality within a mirrored maze. Audio enhancements helped attendees understand how deception plays into an attack and attendees had some fun with form altering mirrors.
This year’s Gartner Security and Risk Management Summit had a very clear message: You need an adaptive defense to survive today’s onslaught of cyber threats. Building on Gartner’s Adaptive Security Architecture vision, the message was on extending abilities and the need to be continuously adaptive to all disciplines of information security. It was said that this approach will be the only way that information security will be able to balance the rapidly changing requirements of digital business with the need to protect the organization from advanced attacks while maintaining acceptable levels of risk and compliance.