{"id":24351,"date":"2018-04-27T07:00:43","date_gmt":"2018-04-27T13:00:43","guid":{"rendered":"https://www.webroot.com/blog/?p=24351"},"modified":"2018-05-18T00:23:02","modified_gmt":"2018-05-18T06:23:02","slug":"rsac-2018-clearing-path-conversation-context","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/04\/27\/rsac-2018-clearing-path-conversation-context\/","title":{"rendered":"RSAC 2018: \u201cClearing A Path for More Conversation and Context\u201d"},"content":{"rendered":"<p>Two big trends stood out at RSAC 2018. Many organizations that once thought all threat intelligence was created equal have gained appreciation for quality data feeds that deliver real-time information vs. crowdsourced or static lists. Endless alerts and flashy numbers are no longer enough. Companies want to know the \u201cwhy?\u201d and \u201cwhat actions they can take?\u201d<\/p>\n<p>\u201cWhat this tells me is that Webroot is in the right place at the right time with the best solution, and that is a great place to be,\u201d said Michael Neiswender, vice president, embedded security sales.<\/p>\n<p>The subtle messages of small-to-medium businesses (SMBs) and managed service providers (MSPs) demanding a certain focus didn\u2019t fall on deaf ears. The question asked over and over was \u201chow do you get into the SMB space?\u201d There was a clear understanding that it\u2019s a hot market, hard to penetrate, and has specific needs. SMBs require solutions architected from the ground up for multitenancy, high efficiency, and ease of use\u2014customer experience cannot be neglected.<\/p>\n<p>David Dufour, vice president, engineering said, \u201cMSPs are a big business. A lot of people are aware of it, but they don\u2019t know how to attract that market. We\u2019re in a really good position as a company because we understand them.\u201d<\/p>\n<h2>Big Conversations<\/h2>\n<p>As Webroot spoke with industry peers during the four-day cybersecurity conference, the conversations led to a few more themes.<\/p>\n<h3>Real Threat Intelligence is King<\/h3>\n<p>Security professionals have a desire for real-time, quality threat intelligence. They are looking for insights that draw from multi-geo, -device, and -businesses. How the updates are delivered to the customer is also of importance. The reality is the scale of threats and the associated risks facing organizations is increasing at a rate companies are finding difficult to manage.<\/p>\n<h3>Security is Everyone\u2019s Responsibility<\/h3>\n<p>The idea of inherent security will become more mainstream. All companies will have to start thinking and acting like security companies, putting user education first. Loosely handling personal data is no longer an option. GDPR will make sure of that. Simple: your weakest link can be your strongest defense if properly trained.<\/p>\n<h3>Getting Back to Basics<\/h3>\n<p>Fundamental concepts of cybersecurity are as relevant as ever. The basics at their core address security as a requirement for businesses today in our connected environment. To be effective using cybersecurity start by following the basic fundamental concepts of protect, detect, respond, recover, and user training.<\/p>\n<h3>Into the Future<\/h3>\n<p>Threat intelligence will continue to offer a powerful position for those who choose to listen to the industry. As Webroot prepares for greater growth in the coming months and years, we are uniquely positioned for the future. You can expect more threat intelligence insights via our Annual Threat Report and Quarterly Threat Trends; continued investigation into our partners\u2019 needs; and solutions that will meet partners where they are.<\/p>\n<p>More companies will realize their customers want them to look at them in a new light. They will also begin to ask the right questions to provide solutions that uniquely address the concerns security professionals have when building their own internal security programs.<\/p>\n<p>\u201cThere were companies that I could tell had methodically built out platforms to address specific threats,\u201d said Gary Hayslip, chief information security officer. \u201cThese vendors differed from their competitors, because they knew what issues to solve and their technologies were uniquely focused on providing value by integrating with broader platforms to manage risk.\u201d<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/3qhV_J5GO50\" width=\"800\" height=\"400\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two big trends stood out at RSAC 2018. Many organizations that once thought all threat intelligence was created equal have gained appreciation for quality data feeds that deliver real-time information vs. crowdsourced or static lists. Endless alerts and flashy numbers are no longer enough. Companies want to know the \u201cwhy?\u201d and \u201cwhat actions they can [&hellip;]<\/p>\n","protected":false},"author":71,"featured_media":24337,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4133,4119,4273,3631,3769,22167,3557,3817,7123,14737,18449,21959,3479,4751,17771,3569,3789,10879,22165,3525],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24351"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=24351"}],"version-history":[{"count":5,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24351\/revisions"}],"predecessor-version":[{"id":24361,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24351\/revisions\/24361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/24337"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=24351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=24351"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=24351"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=24351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}