• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

CTOvision.com

Context for the CTO, CIO, CISO and Data Scientist

  • About
    • Company
    • CTO
    • Events
    • Entertainment
    • Government
    • News
    • Tech Advice
    • Tech Careers
    • The Boardroom
    • Training and Education
    • Quotes
    • Members Only
      • Sign in
  • Tech Guide
    • CTOvision Guide To Technology
    • CTOvision Guide To The Cybersecurity Technology Marketplace
    • National Security Technology
    • Cloud Computing
    • Artificial Intelligence
    • Mobile
    • Blockchain and Cryptocurrency
    • Robots
    • Internet of Things
    • Cyber War
  • Contact Us
  • Newsletters
  • OODA LLC
Home » Cyber War » Cyber Security » Maximize The Value Of Your 2018 RSA Show Visit

Maximize The Value Of Your 2018 RSA Show Visit

Junaid Islam April 2, 2018

Planning, deploying and operating a cybersecurity architecture is difficult because it requires understanding of different disciplines. The key to having a functional security architecture is integrating identity, access control, endpoint protection and file encryption systems together (across data center and cloud environments). The importance of getting everything right is even more critical with the growing threat of state-sponsored cyberattacks.

Fortunately the RSA show is one of the few events with technical personnel in attendance. The key to getting full value from your trip is fighting the urge to look at flashy displays and instead interacting with subject matter experts. Here is a simple 5-step process you should consider to maximize the value of your 2018 RSA show visit:

1 Know your cybersecurity priorities. The first step to a successful visit is having a clear understanding of your cybersecurity priorities. Create a list that groups priorities into compliance, transformational and countermeasure categories. Send an email to yourself so that you don’t miss any important details when talking to people.

2 Take time to talk to experts once you’ve found one. Once you’ve identified a person with the expertise you seek, share your priority list with them. Take the time to understand their approach to solving your problems. Ask to walk thru the software architecture of their solution to ensure you’ve not missed any important details.

3 How well does the product integrate with your environment. Cybersecurity products that don’t integrate with others are useless. Now that you’ve found a valuable product and a person who is knowledgeable, work out an integration strategy with the solution being offered and others in your environment.

4 What is the user experience and benefit. New cybersecurity products have to provide a tangible benefit to users or there will be resistance. Identify a win for the user to make the new product more appealing. Request a demo from the end user’s perspective and try it yourself.

5 Does the product protect against state-sponsored cyberattacks. Russian self-propagating malware and Chinese data exfiltration represent the biggest cybersecurity threat facing America today. Thus ask how their product helps your company protect against state-sponsored cyberattacks.

Even if you find only 2 or 3 subject matter experts to review your priority list, the trip will pay for itself. If you run out of time at the show offer to buy them dinner in exchange for their expertise – it’ll be way cheaper than hiring a consultant.

Related Reading

Like Kip in Napoleon Dynamite, We love Technology

How Far? The Line Between Compassionate Care and Ruthless Efficiency

Bryson Bort of Scythe Discusses IoT Vulnerabilities and Threat Trends To Date

Transition for One of The Nation’s Greatest Enterprise CTOs: Dave Mihelcic Retires From DISA

Miracle on Ice: Business, Technology and National Security Leadership Lessons from the 1980 Olympics USA Hockey Team

Happy New Year: Here Are Five Suggestions To Reduce Your Digital Risk

The First Quantum Revolution: Foundational information for the enterprise CTO

  • About
  • Latest Posts
Junaid Islam
Member at OODA
OODA is an organization of technology experts who have supported US national security missions.
Latest posts by Junaid Islam (see all)
  • The Internet Has A New Problem: Repeating Random Numbers! - February 18, 2019
  • AWS Snowball Edge And Hyper Converged Infrastructure Will Revolutionize Global Enterprises - August 1, 2018
  • Smart Cities Cybersecurity Challenge - July 17, 2018

Share this:

  • LinkedIn
  • Facebook
  • Twitter
  • Reddit
  • Email

Related

Filed Under: Cyber Security

Gain Decision Advantage With Innovative Enterprise Software

It is a Meme World: Bitcoin and Ethereum ‘seem high’, says Elon Musk after his ‘less dumb form of cash’ tweet drives up rates

Quantum Physics Enables the Next Cryptographic Keys

From CIO Spotlight: Eddie Garcia of Cloudera

Costly Meme: Elon Musk Loses World’s Richest Tag As One Tweet Costs Him $15 Billion

DeFi Tips: Investing In The Graph (GRT) – Everything You Need to Know

Making a Difference: Balbix Lauded by Frost & Sullivan for Automated Cybersecurity Posture Management for Enterprises

Update: Defending against cyberattacks with actionable Threat Intelligence

Helpful: Top 5 SIEM trends of 2021 and how Elastic Security solves them

Automating Key Business Functions: Big data firm Palantir partners with Akin Gump on new compliance tool

Continued Progress: Chainlink integrates with Danal Fintech to support retail Bitcoin payments

About Junaid Islam

OODA is an organization of technology experts who have supported US national security missions.

Primary Sidebar

Search

Hot News

It is a Meme World: Bitcoin and Ethereum ‘seem high’, says Elon Musk after his ‘less dumb form of cash’ tweet drives up rates

Quantum Physics Enables the Next Cryptographic Keys

From CIO Spotlight: Eddie Garcia of Cloudera

Costly Meme: Elon Musk Loses World’s Richest Tag As One Tweet Costs Him $15 Billion

DeFi Tips: Investing In The Graph (GRT) – Everything You Need to Know

Making a Difference: Balbix Lauded by Frost & Sullivan for Automated Cybersecurity Posture Management for Enterprises

Update: Defending against cyberattacks with actionable Threat Intelligence


OODAcast OODA cast

OODA

Disruptive IT finder

CTOevents

Featured Content

CTO Guide To The Business of the Internet of Things

CTO Guide To The Business of Robotics

CTO Guide To The Business of Bigdata

CTO Guide To The Business of Mobility

Learn things your competitors wish you did not know

CTO Guide To The Business of Cloud Computing

CTO Guide To The Business of Cybersecurity

CTO Guide to the Business of Artificial Intelligence

RSS CTO Events

  • An error has occurred, which probably means the feed is down. Try again later.

Footer

Free Newsletters and Tech Reports

CTOs on Facebook
CTOs on LinkedIn

CTO Events
Tech Guide

OODA LLC Technology Due Diligence
OODAloop.com

CTOVision Pro: Exclusive Content

Reports
Crucial Point LLC

Copyright © 2021 CTOvision.com·

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.