{"id":1331,"date":"2013-02-27T10:43:42","date_gmt":"2013-02-27T15:43:42","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1331"},"modified":"2013-02-27T12:56:00","modified_gmt":"2013-02-27T17:56:00","slug":"rsa-2013-conference-trends","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/rsa-2013-conference-trends\/1331\/","title":{"rendered":"When&#8217;s the Next Apocalypse? RSA 2013 Conference Trends"},"content":{"rendered":"<p>RSA is like the Hogwarts of Security, the annual reunion for cyber jedi masters or the secret fight club for private security companies, governmental agencies and international organizations. We\u2019ve got an exclusive pass to all of the sessions and sideline discussions. Here is what this year\u2019s buzz is all about with everything you need to know about RSA 2013:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/02\/05114308\/rsa2013_sandbox.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1332\" alt=\"rsa2013_sandbox\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/02\/05114308\/rsa2013_sandbox.jpeg\" width=\"638\" height=\"587\"><\/a><\/p>\n<p><strong>1) We (as a planet) are in deep s%$t cyber-security wise<\/strong><br>\nThe reasons are very simple \u2013 the internet was designed and built without any security-concerns in mind. Additionally, the most common trend pointed out by almost all the attendants \u2013 attackers are getting organized as if they were banks or special task forces. Seriously, cybercriminals are not crazy cowboys with keyboards fighting for freedom of information anymore. They are businesses based around data and money stealing with structures, business planning, HR\u2019s, CEO\u2019s, CTO\u2019s, Margins, and ROI\u2019s. Cybercrime has become an industry, similar to drug cartels or shadow weapons shipments, and in order to fight it we need to be strong and organized.<\/p>\n<p><strong>2) Most security companies are \u201ctoo big to be good\u201d<\/strong><br>\nNew types of threats are born everyday. When you are a big company with 50k employees, you are bad at pivoting the curves \u2013 by the time you start a new business process fighting a new threat \u2013 the ecosystem changes and your efforts have become obsolete. This is why security-wise this is the time of Kaspersky-type players \u2013 those who are very fit, effective and dynamic with the best research expertise. Not to brag about it, but those are the words of market players, not ours.<\/p>\n<p><strong>3) There is a great need to teach people about the seriousness of threats<\/strong><br>\nIt\u2019s not about IP\u2019s, firewalls, ports and protocols anymore. Yes, protections such as building secure perimeters and adding corporate policies and certificates are great, but they are starting to become rather useless. Almost all of us have our own devices \u2013 smartphones, tablets and laptops \u2013 and WE USE THEM everyday for both private and corporate tasks. Additionally, people use social media accounts and cloud services (like dropbox) that cannot be controlled by any CIO or corporate policy. That\u2019s why today is a true paradise for attackers and concerns have largely increased\u00a0for security companies. In order to fight the threats efficiently, we have to work with social engineering, device management and virtualization.<\/p>\n<p><strong>4) Personal defence is the key to corporate defense<\/strong><br>\nFunny story, sometimes the private security of a common user which he has been using on his personal devices is better than any corporate solutions.<\/p>\n<div class=\"pullquote\">Today is a true paradise for attackers and concerns have largely increased for security companies. In order to fight the threats efficiently, we have to work with social engineering, device management and virtualization.<\/div>\n<p><strong>5) Petabytes of free data are out there<\/strong><br>\nSocial media and open analytics (such as traffic data) are available to attackers. \u00a0It is insanely easy to gather information about a person or a business and build effective scam themes to penetrate corporate security perimeters just by using the human factor.<\/p>\n<p><strong>6) Attackers do not need permission<\/strong><br>\nWe do. Legislation has to be changed to give private security companies a chance to contribute to law enforcement organizations globally such as Interpol.<\/p>\n<p><strong>7) 30% of all new malware submissions are mobile<\/strong><br>\nHow can you fight mobile malware if people and manufacturers of the phones do not let security companies\u2019 installing agents access to the hardware? Another major pain is patch management \u2013 Android is the most vulnerable mobile OS because manufacturers of these smartphones are not in charge of creating and delivering new OS updates to users.<\/p>\n<p><strong>8) There is a tremendous lack of security awareness with general audiences and everybody is interested in cutting this lag<\/strong><br>\nSo, when we are telling you that we are using this blog to save the world \u2013 it\u2019s not a metaphor \u2013 it\u2019s kind of true.<\/p>\n<p><strong>9) Microsoft\u2019s keynote speech was very optimistic<\/strong><br>\nIt proves how bad the reality is. But to their benefit \u2013 it was a really positive speech with good insights. They see the solution in promoting international cooperation in terms of legislation and regulations as well as developing software and hardware solutions.<\/p>\n<p><strong>10) Dark side of the moon \u2013 espionage<\/strong><br>\nYes, security does bother everybody. Bu there are governments, militaries, intelligence services and global law enforcement agencies that need to do their jobs \u2013 sometimes (and by that I mean everyday) it involves espionage. This means that the goals of a country sometimes conflict with global goals in fighting cyber-warfare. Governments are spying on each other \u2013 they were, they are and would do their best to gather information, steal secrets and get ready to attack\/defend against any threat, including cyber-types. It makes all negotiations very complicated.<\/p>\n<p>But here is a good adrenaline shot so you don\u2019t feel that we are doomed forever:<\/p>\n<p>1) There are a lot of good security startups out there (stay tuned for updates \u2013 we\u2019ll post detailed info on the best of those soon).<br>\n2) The security industry is very aware of what is going on and even the bitter rivals do their best to communicate with each other and make this world a safer place.<br>\n3) Governments have started to get a clue about what is happening. Everyone at\u00a0RSA 2013 is talking a lot about Obama\u2019s executive act \u2013 in a good way.<br>\n4) Kaspersky Lab\u2019s vision and technologies rock. If you\u2019re using our products \u2013 you are in good hands, folks \u2013 as we are on the frontline of this war and not a single byte escapes our attention.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RSA is like the Hogwarts of Security, the annual reunion for cyber jedi masters or the secret fight club for private security companies, governmental agencies and international organizations. We\u2019ve got<\/p>\n","protected":false},"author":38,"featured_media":1333,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,324],"class_list":{"0":"post-1331","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-rsa-2013"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rsa-2013-conference-trends\/1331\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rsa-2013-conference-trends\/1331\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rsa-2013-conference-trends\/1331\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rsa-2013-conference-trends\/1331\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rsa-2013-conference-trends\/1331\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rsa-2013-conference-trends\/548\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rsa-2013-conference-trends\/1331\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rsa-2013-conference-trends\/1331\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1331"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1331\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1333"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}