Mostly the same as last year but with more innovation, startups, and excitement It’s the calm before the storm and I’m not talking about the unusual winter weather. Just a few days before the 2014 RSA Security Conference at the Moscone Center in San Francisco.In spite of this year’s controversy over the relationship between the NSA and RSA Security (the company), I expect a tremendous turnout that will likely shatter the attendance records of last year. Cybersecurity issues are just too big to ignore so there will likely be a fair number of first-time attendees. So which areas will be hottest at this year’s event? Well, RSA is really a cybersecurity vendor event so discussions will center on a handful of technology categories. Additionally, much of the buzz will be similar to last year. Here’s what I’m expecting to hear about throughout the week in San Francisco (in no particular order):Advanced malware prevention and detection. Bromium was the Hollywood startup last year, and everyone was anticipating the FireEye IPO. If anything, FireEye’s success and recent acquisition of Mandiant will only fuel this fire. Cylance’s math-based malware detection/prevention will likely get lots of attention as will Bit9’s recent acquisition of Carbon Black. I also foresee a fair amount of “antivirus is dead” hyperbole (which I don’t buy into), as well as advanced malware detection/protection innovation from the old guard (Kaspersky Lab, McAfee, Symantec, Trend Micro, etc.) and assorted newbies (Lumension, Malwarebytes, Triumfant, etc.).Mobile computing security. This theme may be a tad muted since RSA falls at the same time as Mobile World Conference in Barcelona. Nevertheless, mobile computing security remains extremely relevant. According to ESG research, 62% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) say that mobile computing has made security management and operations “much more difficult” or “somewhat more difficult.” This is likely due to issues around mobile computing scale, the presence of consumer devices, and managing/securing cloud services like games and on-line file synch/sharing. I look forward to meeting mobile management and security vendors like Good Technology and MobileIron, but it will also be interesting how everyone else weaves mobile computing into their value proposition.Security analytics. Last year, “big data security analytics” was part of the show floor lexicon but few vendors other than IBM, LogRhythm, RSA, and Splunk had much to talk about. I anticipate a “coming out” party at this year’s event as a plethora of real vendors most security professionals have never heard of like 21CT, Click Security, Cybereason, Hexis Cyber Solutions, Leidos, Narus, and ISC8 have real products to demonstrate. Security professionals interested in this burgeoning area should cast a wide net at RSA and take advantage of all of this cybersecurity mathematics, machine learning, and statistical brain power in one place.Next-generation network security. Everyone was gaga over Palo Alto Networks in 2012 and FireEye in 2013. The question now is how these technologies become the foundation of an integrated end-to-end network security architecture that spans physical, virtual, and cloud-based networks with firewall, IDS/IPS, segmentation, and content security services. Okay, this may be a bit heady for an event more akin to products and cocktail parties, but if you listen closely, you are bound to hear Check Point, Cisco, Fortinet, McAfee, IBM, and Juniper crafting a similar story. This is especially true because of developments like VMware’s NSX, Cisco ACI, and Software-defined networking in general. Cloud security. This was probably the marquis topic at RSA 2011 and it hasn’t lost steam. I look forward to hearing what Amazon and the CSA has to say and yacking with a few intriguing startups like CloudPassage, HyTrust, and SkyHigh Networks. Okay, so this is my list of “hot topics” for RSA 2014. I’ll blog “cold topics” tomorrow. As a preview, these “cold topics” are the cybersecurity issues that should get more attention at RSA, but probably won’t. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe