Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Buzzworthy Takeaways from the 2022 RSA Conference

Back in person after a two-year break due to the pandemic, the RSA Conference welcomed back cybersecurity professionals to San Francisco. In an energetic and enthusiastic environment, the insights shared among practitioners and leaders were of immense value to an industry tackling the latest security risks and concerns.

Here are the top three themes that stood out:

Zero Trust Movement Emerges 

“Trust, but verify” has been replaced by “verify, then trust.” There is no implicit trust in any entity. This bold statement was front and center at the RSA Conference. Cloud Security Alliance shared new findings at the show, learning that 80% of C-level executives consider zero trust to be a top priority. Executives are worried that the need to implement this approach will fall short with existing institutional ethos hindering behaviors. Concerns around talent were also discussed.

Beware of Insider Threats 

Joe Payne, CEO of Code42, and his presentation created a buzz with his insights about the enemies within. Payne spoke about how internal threats inside the organization, particularly with the “great resignation,” are on the rise. Increased employee turnover and collaboration using cloud-based technologies are causing vulnerabilities. Payne stressed the need to reduce data leakage and the implementation of stricter internal protocols. The presentation concluded with a discussion on how companies must implement offboarding procedures to make former employees safely detached from company databases and networks.

contentThe Need for Talent 

Vasu Jakkal, Corporate Vice President of Microsoft Security, Compliance, and Identity, shared her views on challenges and opportunities facing the industry in her presentation on how to attract and retain talent. Jakkal noted that 1 in 3 security jobs in the US are vacant and only 24% of the global cybersecurity workforce is made up of women. The presentation highlighted the need for increased collaboration globally between education providers, governments, and private sector companies. This collaboration would improve the employee attraction rate by showcasing great career opportunities in cybersecurity for professionals of varied backgrounds. Jakkal also stated that the industry must do more to make the field more approachable and easier for unrepresented individuals to enter.

Conclusion

Besides these three takeaways, there were many more trends and insights shared. I am already looking forward to next year’s gathering. In the meantime, I welcome the opportunity to continue these thought-provoking conversations with leaders that I met during the week as well as sharing the solutions we can offer to assist an industry that is growing and evolving.

Karen Healy
Karen Healy
Karen Healy is vice president of technology and business services at IDA Ireland, the Irish government agency responsible for the attraction and retention of inward foreign direct investment into Ireland. Based in Chicago, Karen Healy is responsible for promoting Ireland as an investment location in Europe to multinational companies in the Midwest.

Related Posts

How to Secure Machine Learning Data

Data security is paramount in machine learning, where knowledge drives innovation and decision-making. Th...
Zac Amos Mar 12, 2024 11:10:47 AM

Fortifying Your Security Arsenal: A Strategic Approach to Safeguarding OT Security Assets from Adversarial Threats

Introduction Despite investing significant budgets and resources in security products and services. The c...
Mohannad AlRasan Mar 5, 2024 9:17:57 AM

Why Collaboration Is Essential for Cybersecurity Teams

Today’s cybersecurity workforce faces seemingly insurmountable workloads and increasing pressure to manag...
Zac Amos Feb 27, 2024 10:40:13 AM