Security themes uncovered at RSA 2019

IT-security-team

This year is pivotal for our industry with most organizations focused on securing the digital enterprise with cloud computing, mobility and AI. Businesses are more connected now than ever before. Their “edges” have been redefined and expanded, making them more vulnerable as well.

Success in today’s environment means understanding the impact of digital transformation on the business and what that means for securing the extended enterprise, from IoT systems on the edge to external partner platforms.

Last month, I had the pleasure of attending the RSA 2019 conference in San Francisco, one of the world’s largest security conferences, with about 50,000 industry professionals and 1,900 vendors. In speaking with both clients and partners, it was apparent that the impact of digital transformation on security teams is a front-of-mind issue for our industry.

Our theme for RSA was “See beyond the edge,” and one of the fundamental aspects of that approach is identity and access management. The edge has become so blurred now that we need to be able to see which users are accessing what data from where.

Managing digital identities

Employees are working all over the world remotely, customers want to be able to access information with whatever device they happen to be using, including that mobile phone.  So as a company, how do you manage it? You’ve got to protect your perimeter, but what is your perimeter now?

Since applications and data mostly live in the cloud, it’s no longer a network perimeter to protect. Instead, that need for protection could include a mix of on premises and cloud-based information, and organizations must control access across people, bots and IoT-connected systems. Managing digital identities is truly at the heart of every business.

Automating security operations

Another key area of focus at RSA was security operations. Security Operations Centers or SOCs are critical to daily monitoring as well as the incident and vulnerability management of an enterprise. However, security organizations are facing hard decisions about how to cost-effectively manage operations.

Many organizations lack a robust security platform to centrally manage all of the data and automate workflows across a growing number of connected networks and devices.

Recent advances in security operations management are changing the game in terms of running an SOC in-house, outsourcing it or doing a combination of both. To create successful programs, enterprises must assess the opportunities for choosing the best model for their security operations.

In 2019, security is right at the heart of digital transformation. It’s imperative that security is considered at the outset and that it is an ongoing part of the process. In addition, our industry’s response to attacks is getting better. Automation is now a key part of both incident response and remediation, and we see that continuing to improve in the future, and that’s a really exciting prospect.


Mark Hughes headshotMark Hughes is DXC Technology’s senior vice president and general manager of Security. He is responsible for the company’s global security organization and offerings, including advisory services, managed security services, identity management and monitoring, and information assurance.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: