TECH BUYER Mar 2019 - IDC Perspective - Doc # US44938819
RSA Security Conference 2019: Enterprise CISOs Seek Relief from Complexities Prompted by Emerging DX Risks
By: Frank DicksonProgram Vice President, Cybersecurity Products, Robert WesterveltResearch Director, Security Products, Jay BretzmannProgram Director, Security Products, Pete LindstromVice President of Research, Enterprise / NextGen Security, Martha VazquezSenior Research Analyst, Infrastructure Services, Dominic TrottResearch Director, European Security & Privacy, Christopher RodriguezResearch Manager, Cybersecurity Products, Konstantin RychkovSenior Research Analyst, Software, Western Europe, Curtis PriceProgram Vice President, Infrastructure Services, Ryan O’LearySenior Research Analyst, Legal, Risk, & Compliance
This IDC Perspective provides a commentary on the RSA Security Conference and inferences from the conference as it applies to the security industry overall. Security professionals attending RSA Security Conference 2019 sought solutions that could ease the growing complexity associated with rapidly evolving enterprise digital transformation (DX) initiatives. The already onerous task of mitigating risks across multiple cloud environments and on-premises resources, advanced analytics repositories, and a mobile workforce is compounded by regulatory compliance obligations and the specter of new security and privacy rules in the United States.
"The RSA Security Conference 2019 points to a future in which cybersecurity is coalescing around four central control points as network- and perimeter-centric security measures become more permeable. Identities, data, applications, and endpoints will drive future requirements for cybersecurity defensive offerings," according to Frank Dickson, research vice president, Endpoint Security.
CIO and Technology Professionals Agenda , Data Security , Endpoint Security , European Security Strategies , Identity and Access Management, Digital Trust and Safety , Legal, Risk and Compliance Solutions , Network Security Products and Strategies , Security Analytics, Intelligence, Response, and Orchestration , Security Services , Security Solutions: Security in the Cloud
Analytic applications, Cognitive/artificial intelligence, Digital transformation, Digital transformation strategies, Encryption toolkits, Endpoint security, Enterprise, next-gen security, Information protection and control, Security management, Technology buyer