This post originally appeared on SafeNet’s The Art of Data Protection blog – now part of the Gemalto Digital Security blog.
A lot can change in a year… and should. Unfortunately, since RSA Conference 2014, there have been over 2.13 billion data records lost or stolen according to the Breach Level Index. Only 4% of those were “secure breaches” – breaches in which encryption was used and able to render the stolen data useless. Obviously the way many organizations are approaching data security is one of the things that needs to change.
It’s fitting than that the theme of RSA Conference 2015 is “Change: Challenge today’s security thinking.” For data security, real change requires a re-evaluation of organizations’ security foundations and philosophies; and while that kind of change is difficult, it’s time to stop putting it off because emerging technologies and more sophisticated threats are here… and more are on the horizon. That’s something many will be discussing at this year’s RSA, and SafeNet is proud to have our security experts on hand at the event to contribute to the conversation.
If you’ll be at RSA this year from April 20-24, stop by the SafeNet booth, #3329, in the North Expo Hall to learn about Secure the Breach – the security foundation we advocate that combines strong authentication, encryption, and crypto management – and see our info-tainers.
We’ll also be playing the Safe Game. Put your security expertise to the test to see if you can unlock our safe and walk away with an American Express gift card, this year’s conference T-shirt, or other great prizes.
Finally, include the SafeNet Speaking Sessions on your RSA Conference 2015 itinerary to hear from our strategists and learn how to step up your security game.
Hope to see you in San Francisco!
SAFENET SESSIONS AT RSA:
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control (Session Code: CSV-W02)
Presented by David Etue, VP, Corporate Development Strategy, SafeNet
Forget the geeky analysis of cloud security – risk is driven by the organizations involved and the approach to adoption. This session will tackle the complex issues of data ownership and control in the hands of customers, providers, law enforcement, intelligence agencies and a pantheon of adversaries. If data is destiny, then too many people currently impact your fate. Here is how to get it back.
Time & Place: April 22, 9:10 a.m. – 10:00 a.m. | Room 2014
The Encryption Games: Going from Encryption to Crypto Management (Session Code: BC-W5N)
Presented by Tsion Gonen, CVP Chief Strategy Officer, Identity & Data Protection, SafeNet
If 2014 was the year of encryption, 2015 will be the year of crypto management. As companies encrypt more data in the cloud and data center, managing encryption will become more complex. This presentation will review how companies can apply strong crypto management practices to simplify their encryption strategies.
Time & Place: April 22, 1:30 p.m. – 2:00 p.m. | Expo Briefing Center
SECURE THE BREACH INTRO: