Welcome!

Microservices Expo Authors: AppNeta Blog, Elizabeth White, Gopala Krishna Behara, Sridhar Chalasani, Tirumala Khandrika

News Feed Item

RSA® Conference 2013 Analyst Teleconference to Discuss Top Cybersecurity Trends

RSA Conference:

What:

 

RSA® Conference, the world’s leading information security conferences and expositions, will conduct its annual teleconference featuring three of today’s leading security analysts from Gartner, 451 Research and Forrester. The teleconference will discuss top cybersecurity trends including mobile and big data security, as well as preview upcoming sessions at RSA Conference 2013, being held on February 25 – March 1 at Moscone Center in San Francisco.

 
The teleconference will feature research and commentary from Ramon Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of Forrester. Hugh Thompson, Program Chair of RSA Conference, will act as the moderator.
 
There will be a 15-minute Q&A prior to the conclusion of the call.
 

When:

Wednesday, February 13 at 2:00 PM ET/11:00 AM PT
 

Where:

Please click this link to register: https://rsaconference.webex.com/rsaconference/onstage/g.php?t=a&d=669144152

 

Who:

Ramon Krikken, Gartner

Ramon Krikken is a Research Vice President within Gartner's Risk Management Strategies team. He covers software/application security; mobile application security and service-oriented architecture (SOA) security; structured and unstructured data security management, including data masking, redaction and tokenization; cryptography, key management and PKI; security monitoring and security analytics; security metrics; and virtualization and cloud computing security as it pertains to the other categories. In addition to his participation in this teleconference, Krikken will participate in the following RSA Conference 2013 session: “Software Security: A Waste of Time,” on Wednesday, February 27 at 9:20 AM.

 

Wendy Nather, 451 Research

Wendy Nather is Research Director, Security, within 451 Research's Enterprise Security Program, providing analysis on the current state of security from the perspective of a veteran CISO. Nather’s primary areas of coverage are application security, identity and access management, threat intelligence, and security services. She is co-author of the book, ‘The Cloud Security Rules,’ and was named one of Tripwire's "Top 25 Influencers in Security You Should Be Following." In addition to her participation in this teleconference, Nather will participate in the following RSA Conference 2013 sessions, “Psychographics of the CISO,” on Wednesday, February 27 at 9:20 AM, and “Living Below the Security Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.

 

Chenxi Wang, Forrester

Chenxi Wang is Vice President and Principal Analyst at Forrester serving Security and Risk Professionals. She is a leading expert on mobile security, endpoint security, application security, and cloud security. Wang leads the effort at Forrester to build the research portfolio that addresses how enterprise mobility, consumerization, and emerging threats affect security strategy, policy, architecture, application development, and operations. She has also written extensively about global data privacy laws and the China technology market and closely follows the technology adoption trends in that market. In addition to her participation in this teleconference, Wang will participate in the following RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a VDI Desktop More Secure Than a Standard Desktop,” on Thursday, February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT and Risk Footprint,” on Thursday, February 28 at 1:40 PM.

 

Moderator: Dr. Herbert “Hugh” Thompson, Program Chair of RSA Conferences

Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more than 80 academic and industrial publications on security. In 2006, Thompson was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine and has been interviewed by top news organizations including the BBC, CNN, MSNBC, Financial Times, Washington Post and others. He has been an adjunct professor at Columbia University in New York for the past few years where he taught courses on computer security. In addition to his participation in this teleconference, Thompson will be one of the speakers at the day-long Security Basics seminar at RSA Conference 2013 on Monday, February 25 beginning at 8:30 AM. He will also be keynoting on Friday at 1:00 PM with special guests.

 

About RSA Conference
RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at www.rsaconference.com.

RSA and the RSA Conference logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@MicroservicesExpo Stories
Lots of cloud technology predictions and analysis are still dealing with future spending and planning, but there are plenty of real-world cloud use cases and implementations happening now. One approach, taken by stalwart GE, is to use SaaS applications for non-differentiated uses. For them, that means moving functions like HR, finance, taxes and scheduling to SaaS, while spending their software development time and resources on the core apps that make GE better, such as inventory, planning and s...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In his Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will explore t...
The IT industry is undergoing a significant evolution to keep up with cloud application demand. We see this happening as a mindset shift, from traditional IT teams to more well-rounded, cloud-focused job roles. The IT industry has become so cloud-minded that Gartner predicts that by 2020, this cloud shift will impact more than $1 trillion of global IT spending. This shift, however, has left some IT professionals feeling a little anxious about what lies ahead. The good news is that cloud computin...
As Enterprise business moves from Monoliths to Microservices, adoption and successful implementations of Microservices become more evident. The goal of Microservices is to improve software delivery speed and increase system safety as scale increases. Documenting hurdles and problems for the use of Microservices will help consultants, architects and specialists to avoid repeating the same mistakes and learn how and when to use (or not use) Microservices at the enterprise level. The circumstance w...
SYS-CON Events announced today that Auditwerx will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Auditwerx specializes in SOC 1, SOC 2, and SOC 3 attestation services throughout the U.S. and Canada. As a division of Carr, Riggs & Ingram (CRI), one of the top 20 largest CPA firms nationally, you can expect the resources, skills, and experience of a much larger firm combined with the accessibility and attent...
SYS-CON Events announced today that HTBase will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. HTBase (Gartner 2016 Cool Vendor) delivers a Composable IT infrastructure solution architected for agility and increased efficiency. It turns compute, storage, and fabric into fluid pools of resources that are easily composed and re-composed to meet each application’s needs. With HTBase, companies can quickly prov...
Everyone wants to use containers, but monitoring containers is hard. New ephemeral architecture introduces new challenges in how monitoring tools need to monitor and visualize containers, so your team can make sense of everything. In his session at @DevOpsSummit, David Gildeh, co-founder and CEO of Outlyer, will go through the challenges and show there is light at the end of the tunnel if you use the right tools and understand what you need to be monitoring to successfully use containers in your...
What if you could build a web application that could support true web-scale traffic without having to ever provision or manage a single server? Sounds magical, and it is! In his session at 20th Cloud Expo, Chris Munns, Senior Developer Advocate for Serverless Applications at Amazon Web Services, will show how to build a serverless website that scales automatically using services like AWS Lambda, Amazon API Gateway, and Amazon S3. We will review several frameworks that can help you build serverle...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
By now, every company in the world is on the lookout for the digital disruption that will threaten their existence. In study after study, executives believe that technology has either already disrupted their industry, is in the process of disrupting it or will disrupt it in the near future. As a result, every organization is taking steps to prepare for or mitigate unforeseen disruptions. Yet in almost every industry, the disruption trend continues unabated.
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, will discuss how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He will discuss how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transi...
Thanks to Docker and the DevOps revolution, microservices have emerged as the new way to build and deploy applications — and there are plenty of great reasons to embrace the microservices trend. If you are going to adopt microservices, you also have to understand that microservice architectures have many moving parts. When it comes to incident management, this presents an important difference between microservices and monolithic architectures. More moving parts mean more complexity to monitor an...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.