DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Data Engineering
  3. Big Data
  4. RSA 2017: A Sea of Solutions Needing Big Data

RSA 2017: A Sea of Solutions Needing Big Data

The discrepancy between what the security professionals were talking about and asking for and what was being shown on the expo floor at RSA couldn’t be any wider.

Michael Schiebel user avatar by
Michael Schiebel
·
Feb. 28, 17 · Opinion
Like (4)
Save
Tweet
Share
2.46K Views

Join the DZone community and get the full member experience.

Join For Free

I decided to take a break from my Cybersecurity Architecture series and CISO’s View series to give my thoughts on this year’s RSA conference while things are still fresh. First off, I enjoyed meeting with old colleagues and many security people that I respect which justified the trip as far as I’m concerned. I’m really amazed by some of the out-of-the-box thinking and frankly transformative approach many companies are taking to address their core cyber security problems. Clearly, the cybersecurity industry is clearly vibrant and growing, with a record attendance of 43,000, two main exhibit halls and an expo showcase for young infosec companies. (This is actually a theme at every RSA  – Just when you think it couldn’t get any bigger it seems to double in size.)

RSA: A Sea of Booths and Product Offerings

I stepped into the expo hall and spent a good chunk of two days looking at the sea of booths and product offerings. If Juvenal was alive today and attending RSA, I think he’d repurpose his saying “…everything now restrains itself and anxiously hopes for just two things: bread and circuses” because, honestly, if the RSA expo hall this year had a theme, it would be hype and cheap gimmicks set to max, hiding any actual details on products. Carnival tricks? Check. In-booth movie theater? Check. Solutions to actual problems...

What Security Professionals Need

The discrepancy between what the security professionals were talking about and asking for and what was being shown on the expo floor couldn’t be any wider. Companies are trying to solve hard business problems:

  • How do we address the critical shortage of talent?
  • How do we make our security processes more efficient since we have a talent shortage?
  • How do we transform our security program in lock step to the IT transformation taking plan in our companies?

At the same time, the expo floor was filled with magic black boxes that can slice, dice, julienne, and solve all the world’s ills — just don’t ask what’s inside the box.

Security as a Platform

I’m not the only one, or even the first, to point out this discrepancy. I hope everyone saw Mark McLaughlin’s keynote talk “The Coming Disruption in Security,” where it went at length at this core issue plaguing our industry and what he believes the solution is. Listening to Mark talk was an affirmation of the last four years of my life. The Security as a Platform concept Mark describes is what I and others have been living over the last four years culminating in the open-source platform Apache Metron.

Apache Metron

Every wish list item Mark describes aligns to our core design principles. From the high-level requirements of visibility, analysis, and enforcement to the design architecture of sensors, users, Big Data, and Machine Learning, Mark was essentially describing Apache Metron. Even Mark’s wish for security researchers to rapidly develop new capability by writing against the security platform’s API were requirements we addressed with the Stellar scripting language and for rapid plug and play analytical model extensibility.

Big data

Published at DZone with permission of Michael Schiebel, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • How to Configure AWS Glue Job Using Python-Based AWS CDK
  • Distributed Stateful Edge Platforms
  • How To Create a Stub in 5 Minutes
  • The Enterprise, the Database, the Problem, and the Solution

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: