Sihai network

Rsa2018 security conference opening live broadcast and highlights

4hw.com.cn: from April 16 to 20, Eastern time of the United States, RSA conference 2018 (rsac2018 or rsa2018 Conference) is about to kick off in San Francisco. As the annual grand meeting of the security industry, the theme of this year's RSA conference is "now matters" (now it's very important, which implies & lsquo; take action & rsquo;). This is not only a strong call to the participants, but also a call to the whole security industry to declare war on all cyber security threats.

Now nearly half of the world's population is on the Internet, and information and data are spreading at a rapid speed. Like it or not, people's lives are beginning to change to digital. Because of this, the network threat seems to be more fierce than before. The corresponding network security solutions can no longer wait, people need to find them and arm them now. Then it's time for people to see the security threat situation and take action by attending and understanding the rsa2018 conference.

According to statistics, there are more than 45000 participants every year, making RSA conference one of the hottest information security conferences in the world. However, the real value of RSA does not come from the scale of the conference, but from its high-value content output, as well as the exploration of security attack and defense technology and the exploration of defense strategy evolution.

So what are the highlights of this year's RSA conference?

1. Network security strategy big PK

Since the opening of the first RSA conference in 1995, this it security event has ushered in its 23rd year. Every RSA conference will discuss information security issues involving individuals, businesses, society and other aspects. With the increasing importance and influence of IT security, RSA also attracts top information security enterprises, it decision makers, senior security experts and academic leaders from all over the world.

Although the black hat conference and def con hacking conference are also well-known, RSA conference with more academic and industrial flavor seems to be more popular with global security manufacturers and enterprise CIOs. For security vendors, they are more keen to show how to use their own security products, services and technologies to deal with network threats at RSA conference. For purchasers, they can choose corresponding network security devices or solutions according to their own needs, so as to alleviate the changing threat environment.

2. Listen to the voice of China network security! 360 with core technology

It is reported that 360 security enterprises from China will present at the conference with "secret weapons". For example, 360qvm engine, the world's first anti-virus engine with artificial intelligence and machine learning technology independently developed by 360, has been put into practical use in July 2010 and is the main engine for 360 client security. In addition, 360qvm engine also realizes the first large-scale commercial use of artificial intelligence and machine learning in the field of computer security.

360qex non PE engine belongs to the traditional engine for non PE files. Based on file format analysis, it uses dynamic and static feature matching and dynamic and static heuristic detection algorithm to effectively and accurately identify malicious files in script, document and other formats.

In addition, there is 360ave virus killing engine, which is a powerful innovation based on the traditional anti-virus feature engine, realizes the complex broad-spectrum killing ability and flexible logic control ability, and adds a comprehensive repair function, which can effectively deal with various deformation Trojans and infectious viruses.

3. More female speakers

For a professional network security conference, the relatively boring content makes previous RSA conferences mostly male speakers, and the diversity of network security in rsac2018 has become an important topic this year.

When the conference speakers were first announced in early March, 19 of the 20 speakers were male, and only one female speaker talked about online bullying on rsac2018.

This gender difference has virtually inspired the birth of another cybersecurity conference called our security advocate (oursa), which is characterized by the diversity of speakers' gender, because most of them are women. It is reported that the meeting will be held on April 17 for one day.

Since then, the rsac2018 organizers have expanded the list of keynote speakers to invite more female speakers. So far, RSAC has 29 keynote speakers, seven of whom are women.

4. Various booth marketing activities

At the RSA conference, security vendors from all over the world exhausted their brains and budgets to get the best booth location. However, since RSAC has issued a notice to all exhibitors forbidding the models on the exhibition stand with exposed clothes, the manufacturers can only attract participants through more interesting activities.

Therefore, at this RSA conference, you may see a variety of stand lights, lovely robots, funny car home exhibits, generous coffee stands or the temptation of goods from the black market, etc. This requires it decision makers to be able to identify gimmicks such as' machine learning ',' artificial intelligence 'or' blockchain 'at any time, and recognize the real ability of security vendors.

5. Four safety issues are most concerned

As the business executive team's understanding of network risk related issues continues to deepen, CISO (chief security officer) next needs to learn more about network attackers and report the conclusions to the corporate board of directors. It should be emphasized that CIOs are not focused on IOC, exploits or malware variants. On the contrary, they pay more attention to who is launching the attack and for what purpose, and collect the tactics, techniques and procedures (TTP) adopted by the attackers, and finally deliver the results to the senior management team.

In fact, this work has gone out of the scope of basic network attacks. Cisos would like to know more about four major issues: dark web dynamics, fraudulent websites, credential theft and third-party risk management, which will have a significant impact on the organization. Therefore, cisos may pay attention to bitsight, digital shadows, Flashpoint and other manufacturers at this RSA conference. Of course, crowdstroke, fireeye, Webroot and other manufacturers are sure to prepare a speech worth listening to on relevant issues.

Nowadays, all kinds of threats in network security challenge people's cognition, technology and ability. The network security industry is also developing rapidly. At the same time, it also opens up infinite imagination space and innovation space to all industries.