When first reading this article, the thought of, “Well it’s about time, identity has a place at RSA” quickly came to mind. Even if you don’t agree with everything listed, some items mentioned are mere table stakes for a new way of thinking about identity and security together. In all, it’s refreshing to see someone recognize the need for RSA to have a better identity presence. If the past three years are any indication, given the tagline soup we have seen from “Identity is the new Perimeter,” “Identity is Security,” “Identity & Security,” “Identity Empowers Security,” “Identity Defined Security” - it’s a wonder why RSA took so long.
RSA is notoriously a security conference that centers around data security and end point solutions. However, as the article says we are seeing IT and security teams own less of the underlying infrastructure. This leads us to seek the new perimeters for security, data security, and identity. Why wouldn’t the conference cover all of these topics?
What to be on the lookout for:
- Why identity is taking over. As we said before, the IT and security teams are owning less of the IT infrastructure, however, since most identity initiatives focus around data security, this is an obvious partnership for identity and security to come together. (P.S. You can learn more about Identity Security Automation, stop by our booth #1001 for a demonstration.)
- Who owns identity? This question seems to vary by organization and for good reason. Identity security touches multiple, if not all, teams across the company so everyone feels like they have a piece of ownership. However, this reminds me of the, “If everything is a priority, then nothing can be the priority.” speech my old boss used to give me. Identity is important and is becoming more entrenched in all of our day to day lives. It deserves a team that is dedicated to its success. Make sure you are asking vendors how they could help there.
- Identity Governance for Compliance – How are these solutions really helping you? It is one thing to put in a solution that can tell you who has access to what, but what about the policies and practices that are unique to your organization that need to be followed. Look for a solution that helps you govern access and make certification decisions based on data that follows your rules and not some arbitrary, out-of-the-box thinking.
RSA, better late than never. But at Core Security we have been passionate about the identity side of security for over 20 years. So if you’re a security expert who wants to learn more about the value of identity or if you are an identity expert looking to understand how you can be more valuable to the security team in your organization, Core Security is the place for you.
Come by our booth (#1001) while you’re at the show, or join us for our party April 16th, and learn how to effectively manage both identity and security and see how they work together to significantly reduce dwell time for attackers and create greater transparency and the ability to take action for Compliance and the SOC.