The World Beyond the Sandbox: Closing Outlook for RSAC20 in 2020 (Dry Cargo Download)
Discover, mine, recommend, and disseminate excellent security technologies and products, enhance the value of the security industry in the entire industry, understand the security needs of organizations and enterprises, and a professional consulting agency that truly understands security, we are security cows!
Click on the blue words to follow our activities last weekend. In the panic atmosphere of the new crown epidemic, RSAC2020 successfully operated and ended safely. The theme of this conference, "Human Factor", is highly consistent and predictable with the current situation, whether inside or outside the stadium. In the wave of globalization, the pace of threatening globalization is actually accelerating. In the past, we laughed at ransomware not writing Chinese fishing software. Today, attackers are not only fluent in 10 languages, but also familiar with industry knowledge and regional culture. In the past, we laughed at artificial intelligence just as a joke. Now, we are just a joke in the face of artificial intelligence attacks. In the past, we thought that security was driven by technology. Now we find that (especially after the micro-alliance deletes the library) security is operation-driven. In the past, we thought of security as the protection of others. Now we find that security is actually the core business of everyone (business). Yes, most of us and businesses are born to avoid guns. Whether it is a new crown virus, a crying virus, a biological virus, or a hacker worm, they all have trillions of dollars in destructive power, affecting election results, "freezing" a country, or triggering global panic. This is why RSAC2020 is a borderless cybersecurity event, because no matter where we come from, we are born with zero-day vulnerabilities. In the face of threats, all people are equal. In the past week, there have been many topics and reports about RSAC2020. The "RSA2020 Conference Content Guide" previously released by security cows has sorted out some of the top 10 lists to quickly find hot spots. Today, we mainly give back to readers in two ways: one is to organize and provide meeting materials (PPT, voice and video) for summary and download, convenient for professional readers to refer to and refer to; and then, we will be at the 2020 RSAC20 conference Make a brief inventory and memorandum of relevant information on the global network security market structure, trends and technology investment hotspots in the next decade (especially innovation outside the top ten capital-constrained innovation sandboxes). RSAC2020 theme material download speech PPT full version download (Please WeChat background information "RSAC2020" for all speech PPT). The highest chart of the conference's popular vocabulary statistics comes from articles submitted in the core shield era. The safety cattle survey statistics are shown in the following figure: The horizontal axis is the cattle survey score, the vertical axis is the ESG investor report score, and the oval area corresponds to the RSA2020 word frequency score. Top 10 innovation sandboxes (the champion is Securiti. Artificial Intelligence) Top 10 innovation sandbox reviews: https://www.aqniu.com/homenews/63788.html Five generations of security innovation worthy of attention in the first generation: next-generation systems on chip The core requirement is to form an efficient "symphony orchestra" composed of TI threat intelligence, UEBA (Entity Behavior Analysis), SIEM and analyst workflow. Devo Security Operations is a representative solution to this trend, integrating SIEM software, threat intelligence platforms, case management solutions, UEBA and other common functions, and integrates with analyst workflows into one solution. Building on a data analysis platform, Devo Security Operation provides automated enrichment of data, threat intelligence, community collaboration, and a central evidence database to help analysts more effectively identify and prevent threats. 2Zimperium's mobile threat advisory service provides measurable visibility into an organization's mobile risk profile; practical advice from experts to gain insight into key and critical areas that can enhance an organization's capabilities; access to ready-made reports for supervisors and security operations; reviews And compare the state of mobile security between you and businesses worldwide; assess trends in best practices. In addition to developing and discussing custom intelligence reports, Zimperium will also provide consulting services on the latest vulnerabilities and exploits. 3 keep. The artificial intelligence blackmail cryptographic response (CRR) and cryptocurrency threat intelligence service CRR service can track the entire life cycle of an attacker's digital implementation, block attack attempts, identify attack vectors, and minimize financial losses. Features: Easy to integrate and use, users only need to submit the ransomware encryption wallet address. Automatic event management: Track and monitor the flow of ransom funds, analyze implementation methods and methods, and freeze or withdraw ransoms in encrypted currency exchange. Legal and compliance support: Professionals provide corporate compliance and deployment support. The core requirement of the next-generation system-on-chip is to form an efficient "symphony band" composed of TI threat intelligence, UEBA (Entity Behavior Analysis), SIEM and analyst workflow. Devo Security Operations is a representative solution for this trend, integrating SIEM software, threat intelligence platforms, case management solutions, UEBA and other common functions, and integrating with analyst workflow into one solution. Building on a data analysis platform, Devo Security Operation provides automated enrichment of data, threat intelligence, community collaboration, and a central evidence database to help analysts more effectively identify and prevent threats. 2Zimperium's mobile threat advisory service provides measurable visibility into an organization's mobile risk profile; practical advice from experts to gain insight into key and critical areas that can enhance an organization's capabilities; access to ready-made reports for supervisors and security operations; reviews And compare the state of mobile security between you and businesses worldwide; assess trends in best practices. In addition to developing and discussing custom intelligence reports, Zimperium will also provide consulting services on the latest vulnerabilities and exploits. 3 keep. The artificial intelligence blackmail cryptographic response (CRR) and cryptocurrency threat intelligence service CRR service can track the entire life cycle of an attacker's digital implementation, block attack attempts, identify attack vectors, and minimize financial losses. Features: Easy to integrate and use, users only need to submit the ransomware encryption wallet address. Automatic event management: Track and monitor the flow of ransom funds, analyze implementation methods and methods, and freeze or withdraw ransoms in encrypted currency exchange. Legal and compliance support: Professionals provide corporate compliance and deployment support. The core requirement of the next-generation system-on-chip is to form an efficient "symphony band" composed of TI threat intelligence, UEBA (Entity Behavior Analysis), SIEM and analyst workflow. Devo Security Operations is a representative solution to this trend, integrating SIEM software, threat intelligence platforms, case management solutions, UEBA and other common functions, and integrates with analyst workflows into one solution. Based on a data analysis platform, Devo Security Operation provides automatic enrichment of data, threat intelligence, community collaboration, and a central evidence database to help analysts more effectively identify and prevent threats. 2Zimperium's mobile threat advisory service provides measurable visibility into an organization's mobile risk profile; practical advice from experts to gain insight into key and critical areas that can enhance an organization's capabilities; get ready-made reports for supervisors and security operations; review And compare the state of mobile security between you and businesses worldwide; assess trends in best practices. In addition to developing and discussing custom intelligence reports, Zimperium will also provide consulting services on the latest vulnerabilities and exploits. 3 keep. The artificial intelligence blackmail cryptographic response (CRR) and cryptocurrency threat intelligence service CRR service can track the entire life cycle of an attacker's digital implementation, block attack attempts, identify attack vectors, and minimize financial losses. Features: Easy to integrate and use, users only need to submit the ransomware encryption wallet address. Automatic event management: Track and monitor the flow of ransom funds, analyze implementation methods and methods, and freeze or withdraw ransoms in encrypted currency exchange. Legal and compliance support: Professionals provide corporate compliance and deployment support.
4Echosec: Deep forgery of company executives, whale fishing attacks, BEC commercial email attacks, mobile surveillance attacks, ransomware, social worker attacks (such as watering hole attacks) and other "beheading" executive information security services It is not uncommon for company executives' personal security services to become a hot topic in the field of cyber security. Echosec's services include: social media threats; monitoring data leakage; and travel risk management. Although Vulcan's automated vulnerability management failed to win the championship of the innovation sandbox, Vulcan Cyber has been well received by senior executives of domestic security companies, including Qian Xin, 360 and Lu Meng Technology. It also unanimously expressed optimism about the prospect of the product concept in the domestic market. It is generally believed that this product is not only perceptual (SOAR landing), but also practical, which solves the security pain points of enterprises. Focus on two frameworks: CMMC and Zero Trust Framework RSAC2020. Two important security frameworks were released or updated in the first quarter, CMMC and Zero Trust Framework. The importance of zero trust needless to say, but for the newly released CMMC (version 1.0), Security Bull predicted in the article "Ten Major Trends in Cyber Security 2020" 10 years ago that it will become a more important than ISO27001 Popular standards. 1cmmc version 1. 0 Retired four-star U.S. Navy officer James Stavridis (2009-2013, he was the highest Allied commander of the NATO alliance, responsible for cyber security in Afghanistan, Libya, the Balkans, Syria and other regions) in A keynote speech on CMMC was presented at the RSAC 2020 conference, and CMMC (Cyber Security Integrity Model Certification) was considered a key plan to strengthen cyber security for the US Defense Industry Base (DIB). CMMC introduced new network security standards on the basis of existing network security standards and divided them into five network security levels. Each level has a clear set of practical requirements that all defense contractors must adhere to. For example, a company that handles controlled non-confidential information (CUI) needs to be at least CMMC3. CUIs stored on digital media such as servers, phones, and laptops must be protected by encryption not only during transport or use, but also during breaks. All backups of CUI from any storage location also need to be protected. 2 "Zero Trust Architecture" Draft Standard Second Edition NIST (National Institute of Standards and Technology) released the second version of the "Zero Trust Architecture" draft standard in February 2020, marking that the standardization process of the Zero Trust Architecture is accelerating. Compared with the first draft, NIST made a lot of detailed revisions and amendments in the second draft, and expanded and added some chapters based on the original. This shows that NIST attaches great importance to the "Zero Trust Architecture" standard and is accelerating its progress. It is worth noting that the history of zero trust in Draft 2 can be traced back to the "black core" project announced by the Defense Information Systems Administration (DISA) and the Department of Defense (Defense). By associating the Zero Trust Standard with the US Department of Defense, it can be inferred that the US Department of Defense also participated in and influenced the work of the draft standard, and in a sense was also a strong driving force for the accelerated development of the Zero Trust Standard. Internet security market scan of five global hotspots outside China and the U.S. (this part is provided by Chi Anxin): According to the 2019 CyberGuard data reported by Silicon Valley think tank CB Insights, the United States accounts for 64.3 of global Internet security transactions %, Followed by Israel (6.7%) and the UK (6.5%), while China ranked fourth with 5.6%. 1 Israel: Cybersecurity in the Middle East Silicon Valley According to CB Insights data, from 2014 to 2019, Israel has more than 400 cybersecurity companies and more than 50 multinational company R & D centers (data as of March 21, 2019). As the most security-intensive startup in Silicon Valley in the Middle East, Israel has always maintained a strong lineup at RSAC2020. The 18 companies, including the former Innovation Sandbox Champion BigID, each have their own characteristics and deserve recognition. 2Netherlands: Awareness awareness and technological innovation are placed on the map of the global cybersecurity market. Western Europe is second only to North America. In Western Europe, the Netherlands has always been one of the world's leading high-tech industries in terms of innovation. RSAC 2020 has 8 Dutch companies participating.
In fact, in addition to innovation, the Netherlands also attaches great importance to the promotion and popularization of cybersecurity. Especially in the coastal city of The Hague, which has many international organizations, there is also an annual "cybersecurity awareness week", similar to the event held in the country, inviting international organizations and cybersecurity professionals from many European countries to discuss professional issues behind closed doors. . In addition, corporate users can participate in paid training to master cyber attack prevention, identification, and response skills. Innovative and entrepreneurial talents can participate in matchmaking meetings and meet face-to-face with government officials and investors. Ordinary people can participate in knowledge-based lectures and seminars; children can join "little hacking labs" to learn how computers can be attacked and protected by hackers. Technology enthusiasts can play their part in events such as the Global Internet Olympics. 3 UK: Europe's leading Internet security innovation leader The UK's Internet security industry is not weak. Silicon Valley think tank CB Insights selected 28 Internet security startups with technological potential, of which 20 are in the United States, 4 in the United Kingdom, and 2 in Israel. According to an announcement by the Ministry of Digital, Culture, Media and Sports in February this year, as of the end of 2019, the total revenue of the British cybersecurity industry was about 8.3 billion pounds (about 75.4 billion yuan). There are more than 1,200 active cybersecurity companies in the UK, and the industry employs approximately 43,000 full-time employees. At the same time, the British government is taking a series of measures to promote growth in this area, including: supporting scholars to commercialize research results, supporting the development of fast-growing companies, and providing training camps to help small and medium enterprises. 4 Japan: Increased pressure on Olympic security According to an assessment released by the Cyber Threat Alliance (CTA) on February 20, national hacking activities will launch a large-scale destructive attack on the Tokyo Olympics. As the host of the Tokyo Olympics, cyber security is facing unprecedented pressure under the triple shadow of the hacker ’s unusually active presidential election year, the new Crown Pneumonia, and the Winter Olympics massive cyber attacks. In addition to the national cybersecurity awareness-raising plan that has been implemented, Japan has also paid more and more attention to cybersecurity construction in recent years. Last year, Japan required infrastructure companies in major industries to store their electronic data on servers in Japan as one of the security measures to deal with future Internet threats. This year, as the host country of the Olympic Games, Japanese officials have previously stated that they will clean up about 200 million Internet security devices across the country before the Olympics. At this year's RSAC 2020, about 15 companies from Japan participated, and some even participated for the first time. Japanese security companies have a learning atmosphere that does not wait for me, and I feel that many network security companies around the world are worth studying. 5 South Korea: As the South Korea most vulnerable to cyber security attacks in Asia Pacific, Smecta also has 8 companies appearing on the RSAC 2020 website. To paraphrase the popular online obstacle "Du Fu is busy" in the past few years, South Korea is very busy at RSAC 2020, with many meetings every day. In fact, in the second half of last year, the Ministry of Science, Technology, Information and Communication of South Korea finalized the "National Cyber Security Basic Plan" to address the national cyber security risks faced by the development of a 5G super-connected society and strengthen the people, government and military. Joint Response System. To support six strategic cybersecurity issues, the government plans to divide each organization's implementation plan into 18 key issues and 100 subdivided issues, and advance the plan in stages by 2022. Related reading hotspots and highlights: RSA2020 conference content guide RSAC2020 Top Ten Popular Open Source Tools RSAC 2020 12 Internet Security Startup RSAC 2020 Theme Interpretation: Building a People-Oriented Security Strategy As South Korea, the most vulnerable to cybersecurity attacks in the Asia-Pacific region, eight companies from Smecta also appeared on the RSAC 2020 website. To paraphrase the popular online obstacle "Du Fu is busy" in the past few years, South Korea is very busy at RSAC 2020, with many meetings every day. In fact, in the second half of last year, the Ministry of Science, Technology, Information and Communication of South Korea finalized the "National Cyber Security Basic Plan" to address the national cyber security risks faced by the development of a 5G super connected society and strengthen the Joint Response System. To support six strategic cybersecurity issues, the government plans to divide each organization's implementation plan into 18 key issues and 100 subdivided issues, and advance the plan in stages by 2022. Related reading hotspots and highlights: RSA2020 conference content guide RSAC2020 Top Ten Popular Open Source Tools RSAC 2020 12 Internet Security Startup RSAC 2020 Theme Interpretation: Building a People-Oriented Security Strategy As South Korea, the most vulnerable to cybersecurity attacks in the Asia-Pacific region, eight companies from Smecta also appeared on the RSAC 2020 website. To paraphrase the popular online obstacle "Du Fu is busy" in the past few years, South Korea is very busy at RSAC 2020, with many meetings every day. In fact, in the second half of last year, the Ministry of Science, Technology, Information and Communication of South Korea finalized the "National Cyber Security Basic Plan" to address the national cyber security risks faced by the development of a 5G super-connected society and strengthen the people, government and military. Joint Response System. To support six strategic cybersecurity issues, the government plans to divide each organization's implementation plan into 18 key issues and 100 subdivided issues, and advance the plan in stages by 2022. Related reading hotspots and highlights: RSA2020 conference content guide RSAC2020 Top Ten Popular Open Source Tools RSAC 2020 12 Internet Security Startup RSAC 2020 Theme Interpretation: Building a People-Oriented Security Strategy
Message