Annual hype-fest later this month will demonstrate which vendors "get it" and which are posers. Just 3 weeks until the annual RSA Security Conference geek-fest in San Francisco. Should be a good one since the economy is doing okay, VCs are throwing money around and organizations are increasing security budgets. Oh, and let’s not forget that the NY Times and Wall Street Journal just reported major security breaches.I’ve attended the RSA show for the last dozen years or so. Over that time period, the show has morphed from a down-in-the-packets security technology expo to a run-of-the-mill industry trade show chock full of hype and cluelessness. Heck, vendors and PR pros provide their marketing collateral by distributing USB thumb drives throughout the Moscone Center! That’s like handing out packs of Marlboros at an Oncology convention.So the RSA Security Conference isn’t Black Hat or Defcon, but it is an opportunity to talk with security vendors about security products, trends, requirements, and innovation. Of course, these discussions can also be filled with nothing but buzz words. With that, here are some of the “big topics” I expect to hear about at RSA and my humble analysis of each.1. Mobile security. The good news: This discussion is very timely as many organizations are struggling with mobile policies, security controls, and monitoring of mobile devices. The bad news: Much of the mobile security discussion will focus on basic stuff like anti-virus, network access, and remote wiping of devices. Important but boring. IMHO, the security industry should be having a bigger discussion. How do you secure the new applications and business processes popping up because of mobile devices? Are mobile application developers writing secure code? Is anyone testing this? How does mobile computing security integrate or change existing security processes and best practices? The security industry must be part of a broader discussion on mobile computing rather than figuring out how existing controls work in a mobile world. 2. Big data security analytics. Recent announcements by IBM and RSA are a great start but I’m finding that the security community at large really doesn’t understand what’s going on here. Rather than throw around big data buzz words like Hadoop, MapReduce, and Pig, I hope that the industry will focus on user education. In other words, answer the following question: What problem does big data security analytics address and how? 3. Next-generation firewall. With all due respect to Palo Alto Networks, next-generation firewall discussions are really about product features and packet processing rather than any radical departure from the status quo. Yes, PAN nailed a requirement, executed well, and deserves its success but the real discussion should be about next-generation enterprise network security rather than a gateway appliance. To me, this is where everything comes together: network security policy, context, enforcement, network behavior monitoring, PCAP, etc. I’m hoping to have this discussion with PAN as well as Cisco, Check Point, Fortinet, Juniper, McAfee, Sourcefire, etc.4. Advanced Malware Detection/Prevention (AMD/P). Another extremely worthwhile topic. My guess is that a multitude of vendors will announce AMD/P gateways to compete with FireEye. Okay but AMD/P discussions should extend beyond blocking/prevention and highlight security intelligence, analytics, incident detection/response, and lessons learned.In 2005, it was cool to talk about the hot threat management point tool Du Jour. In 2013, these discussions make you look like a newb. Vendors should ask themselves one question before deciding what to underscore at RSA: What do CISOs care about? Hint: They care about the whole enchilada not just the salsa. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe