Welcome!

News Feed Item

RSA's Art Coviello Calls for Increased International Cooperation and Governance Among Nations and Security Industry

Addresses Cyber War, Surveillance, Privacy and Trust in Remarks to Record RSA Conference Crowd

SAN FRANCISCO, Feb. 25, 2014 /PRNewswire/ -- RSA CONFERENCE 2014 --

News Summary:

  • Addressing a record number of attendees at RSA® Conference 2014, RSA Executive Chairman Art Coviello called for increased cooperation and governance among nations and the security industry regarding a range of pressing issues, such as cyber war, government surveillance, privacy and trust on the Internet.  Coviello also:
    • Called for the adoption of four guiding principles to help maintain a more trusted digital world.
    • Proposed a path for security practitioners to adopt intelligence-driven technologies, processes and tools to help ensure the defense of increasingly complex technology environments against cyber risks.
  • Video of the keynote and a copy of Coviello's remarks can be found at: http://www.emc.com/emc-plus/rsa-thought-leadership/art-coviello.htm

Full Story:

Art Coviello, Executive Vice President of EMC Corporation and Executive Chairman of RSA, The Security Division of EMC (NYSE: EMC), delivered his opening keynote to a record crowd at RSA Conference 2014, calling for international government and industry cooperation on major issues including cyber war, surveillance, privacy and trust on the Internet.

"The tension between and among the competing interests of governments, business, and individuals in the digital world should not be surprising. Information has become more easily accessible, and more valuable," Coviello said. "We are in the midst of a fundamental and historic shift in the use of Information Technology, a shift that is already having monumental implications for the future of our society and culture. The rapid expansion and democratization of technology has brought the agendas of disparate groups crashing together with unpredictable consequences."

Coviello articulated four guiding principles to encourage debate and action by all parties with a common vested interest in ensuring a safer Internet:

  1. Renounce the use of cyber weapons, and the use of the Internet for waging war.
    "We must have the same abhorrence to cyber war as we do nuclear and chemical war."
  2. Cooperate in the investigation, apprehension and prosecution of cyber criminals.
    "The only ones deriving advantage from governments trying to gain advantage over one another on the Internet are the criminals. Our lack of immediate, consistent and sustained cooperation, globally, gives them the equivalent of safe havens."
  3. Ensure that economic activity on the Internet can proceed unfettered and that intellectual property rights are respected.
    "The benefits to all of us from the improvements of productivity in commerce, research, and communication are too valuable to not achieve agreement. Rule of law must rule!"
  4. Respect and ensure the privacy of all individuals.
    "Our personal information has become the true currency of the digital age. While it is important that we are not exploited, it is even more important that our fundamental freedoms are protected. But with our personal freedom comes responsibility. Governments have a duty to create and enforce a balance… a balance based on a fair governance model and transparency."

Coviello also argued for changes at the NSA and intelligence organizations around the world to adopt a governance model that more clearly separates their defensive and intelligence gathering roles.

Coviello noted that digital technology, Big Data and the emergence of the Internet of Things are key elements of what he referred to as a "historic shift in the use of information technology."  He added that the digital capabilities of today have the power to solve many of our societal ills but they also have the power to destroy and must have agreed-upon norms for their acceptable use. "We must bring together the vested interests so that an environment of positive dialogue is built," he said.

"We urgently need these systems to be intelligent and integrated enough to automate responses that isolate compromised elements and prevent harm, not only in today's hardware-defined infrastructures, but also in the new generation of software-defined networks and infrastructures," he said.

In an age of user-defined IT, Coviello explained the need for a more intelligence-based approach to identity systems that enable security teams to balance the needs of users and IT departments while still being able to enforce policy over user devices.  He went on to clarify that identity governance must be managed in both mobile and cloud environments, recognizing that new solutions are needed to "...adapt to the evolution of identity in the user-defined age of IT."

Coviello concluded by reiterating his call to governments to adopt the four principles and encouraged the security industry to do its part to create secure frameworks and technology needed to help ensure a safer and more trusted digital world.

Additional Resources

About RSA

RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance-management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.

Combining business-critical controls in Identity Assurance, Encryption and Key Management, Security Analytics, Data Loss Prevention, and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.EMC.com/RSA.

 

EMC and RSA are registered trademarks of EMC Corporation in the United States and other countries. All other products and/or services referenced are trademarks of their respective companies.

This release contains "forward-looking statements" as defined under the Federal Securities Laws.  Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings of EMC Corporation, the parent company of RSA, with the U.S. Securities and Exchange Commission.  EMC and RSA disclaim any obligation to update any such forward-looking statements after the date of this release.

SOURCE RSA

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).