So I hope Art’s blog made since – it is my first attempt at live blogging. Note you can also follow me on twitter for photos of RSA if you are interested. Next up is Scott Charney Corporate VP of TwC (trustworthy computing) from Microsoft – Making a case for securit optimization.
He is speaking to slides (once I get them I will post them here) – typical common areas around security and cloud secuirty. The diagram really does a good job of summarizing the key controls like identity management, scaling, and operational security. Big focus on the operational security. Example with PKI – attacks on certificates – the attackers are going after certificates – operations has to be ready for it.
Model of Internet Health: – modeled after normal health care. ISP voluntary code of conduct as an example. A step in the right direction.
Optimization is a future state – He isn’t trying to say they/us are there now. I agree, we are working on getting there but not there yet.