Channels ▼
RSS

"Inventive Collaboration" for Fighting Cybercrime


During the opening keynote at RSA Conference 2009 in San Francisco, Art Coviello, president of RSA, the security division of EMC, cautioned that the global cyber-threat continues to escalate and online fraudsters are more organized, collaborative, and effective than ever. He addressed major forces such as the economy and emerging technologies that are driving the information security industry to evolve and adapt -- and how these forces provide an opportunity for "inventive collaboration" to effectively restructure the information infrastructure. Coviello also provided examples on how RSA is working to foster inventive collaboration around key practices.

"To combat the cybercriminals requires far more purposeful collaboration on the part of the industry and a strong security ecosystem built around a common development process focused on risk," said Coviello. "Today's security technologies are applied as independent applications cluttering the information landscape and leaving perilous gaps of risk."

Coviello cited three major forces driving the information security industry to evolve and adapt, including: the challenge posed by the criminal threat; the demand upon enterprises and governments to achieve unprecedented levels of productivity to restore value to the faltering economy; and the opportunity to rethink the approach to security based upon emerging technologies and trends such as virtualization, cloud computing and social networking. He argued that these three forces have placed the industry at a critical inflection point by providing the opportunity to restructure the information infrastructure almost from the ground up -- and warned that the industry must avoid repeating past mistakes.

According to Coviello, "We must embrace a common development process that allows us to create a more secure infrastructure today. Then, with an eye on the future, we can ensure that the new technical infrastructure is designed around that process, rather than forcing a process around a collection of technologies."

Coviello urged the industry to foster inventive collaboration around three key practices and provided examples of how RSA is pursuing them:

  • Collaborate on standards such as the Key Management Infrastructure (KMI) standard led by RSA, HP, and IBM.
  • Practice technology sharing. The RSA Share Project, which provides the leading RSA BSAFE encryption software developer toolkits at no cost, is a good example of this practice.
  • Integrate technologies and embed controls directly into the infrastructure itself. Examples of these integration points were discussed onstage between Coviello, Brett Galloway, Senior Vice President, Wireless and Security Technology at Cisco and Scott Charney, Corporate Vice President of Trustworthy Computing at Microsoft.

"We must develop a stronger and healthier ecosystem than the fraudsters and ensure the fluid and frictionless exchange of information on which our global economy depends. It's not about changing the game, it's about winning the game," Coviello said.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.
 

Video