Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

RSA Conference 2016 Wrap-up

This year marked the twenty-fifth anniversary of the RSA USA Conference. Personally, this marked my eighth RSA in seventeen years. Now held in the Moscone Center in San Francisco, things have come a long way since being held in the San Jose convention center. RSA now includes 16 keynotes, over 100 talks, over 350 vendors, 700,000 square feet of expo space and 33,000 attendees.

Most years, we see one new buzzword, technology, or incident dominating the conference environment. We usually see one topic that everyone is talking about. That didn't seem to happen this year. Instead, there seemed to be quite a mix of different topics on people's minds, as part of the messaging of various booths, and in hallway conversations.

FBI and Apple

While the request by the FBI to gain access to one Apple iPhone was at the top of the daily news cycle and the topic in more than one conference session, it did not seem to enter into too many conversations—at least not into the conversations I was having. Prior to the start of the show, I really thought the Apple/FBI controversy would be the main topic of this year’s conference; however, the topic seems to have played a more peripheral or background role this year.

Threat intelligence

One prominent topic this year was Threat Intelligence

Beyond Apple/FBI, one of the more prominent topics this year seemed to be a holdover from last year, as more than one vendor was promoting “Threat Intelligence.” The recent implosion in that part of the industry seemed to have let a lot of air out of the sails of threat intel. But at least one person I spoke with thought this might be a good thing for threat intelligence as a whole. According to her, the recent events will put vendors on notice that their threat intelligence products need to deliver on their promises. I guess time will tell.

Phishing

More than one vendor on the RSA show floor was promoting solutions for phishing. Considering how effective phishing is for attackers, that makes perfect sense. Solutions for access control, application code reviews, and incident response also seem to have their fair share of vendors promoting single point solutions.

Hardware

One thing I saw more of than I expected was hardware—and quite a bit of it: everything from two factor authentication tokens to rack equipment locks to physical hard drive destruction. Of course, there were quite a few secure networking products as well. There is usually at least some hardware at RSA, but this year I saw more than usual.

Internet of Things

Despite all the hype around Internet of Things security, there was a severe lack of companies promoting solutions in this space

Despite all the recent hype around Internet of Things security, there seemed a severe lack of any companies promoting solutions in this space at RSA this year. The few companies I did notice doing IoT security were all involved in the auto industry—which arguably needs all the help it can get.

Government

Several US government agencies had booths on the show floor this year. That in and of itself isn't a new thing; the FBI, for one, has maintained a presence on the floor for at least the last five years. But this year, we also saw the NSA and DHS as well as NIST, the Federal Reserve and even the Office of the Comptroller of the Currency. It is good to see government agencies with a strong interest in security expending some budget to have a presence at RSA.

The RSA 2017 call for papers will be here in just a few short months and then we will all make our annual pilgrimage to the Moscone Center to see what new and exciting buzzwords will arise next year.

Tenable

Tenable introduced several new solutions at RSA 2016. Check out our new whitepaper and solution stories:

Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.