RSA in 120 Secs: In Case You Missed Us at the Show...

RSA in 120 Secs.jpg

It’s back to business after returning from the annual RSA Conference last week, where enSilo joined the record-breaking crowd of 43,000 security professionals to connect with faces old and new. If we didn’t have the chance to see you at the show, here’s a couple of highlights.

Beyond Stuxnet: State of the Art in Cyberwarfare and Weapons

For an early 8 a.m. conference session, the topic of cyberweapons drew a huge crowd. That’s where our CEO and co-founder Roy Katmor joined a panel discussion alongside Gary Brown, professor of cybersecurity at Marine Corps University, and Oren Falkowitz, CEO and co-founder of Area 1 Security.


When Stuxnet was discovered in 2010, it was considered state-of-the-art warfare. But just seven years later, Roy and his fellow panelists concluded that even though effective, it’s already considered by many to be obsolete. Digital weapons have the ability to be even more powerful and stealthy than Stuxnet was, and there are already samples of malware in the wild that hint at the direction they are headed. Moderated by Kim Zetter (veteran security reporter and author of a book on Stuxnet), the panel explored the current state of the art, and future, of digital weaponry. The panelists discussed the ideal characteristics of a digital weapon, the difficult and overlapping efforts between policymakers and technologists to progress efforts in understanding cyberwar and the activities that constitute it, as well as how different nations compare in their efforts.


You can hear an audio recording of the session online here, and get the take of Threatpost writer Tom Spring through his article on the panel, “Setting Expectations Between States On Cyberwar”.


The Night of the Living XP: Attacks on Legacy and Embedded Systems 

It’s been nearly three years since Microsoft ended support for Windows XP, but the headaches live on, according to Udi Yavo, enSilo’s co-founder and CTO, who spoke on the topic during day 3 of the show.


It’s no surprise to our industry that a lot of critical infrastructure, manufacturing tech and medical devices today run legacy XP. However, what is surprising to many IT pros is that a single legacy system can potentially compromise the entire organization, even if it is equipped with all the new Windows 10 improvements.


What can we do about it? According to Udi’s talk, the first step is to recognize that this is indeed a problem that must be solved. The next step is to build a plan to address the problem and, if possible, the end goal should be phasing out XP machines. And while Microsoft doesn’t support XP anymore, Udi notes there are security vendors (like enSilo) that fully support XP. If phasing them out is not an option then increasing their protection is mandatory.


Udi’s presentation slides are here. Similar to the remaining XP vulnerabilities, you can also read more about impending end-of-life support for Windows 7, which Udi just wrote about in Dark Reading here.


Any reactions to our sessions?  Tweet to us at @enSiloSec


Related Blog Posts