Today’s top innovations are on the schedule for RSA Conference 2021. While you’re attending the virtual conference, what should be on the top of your list? Here are eight trends shaping our industry that’ll be getting some airtime, from artificial intelligence (AI) to zero trust.

Trend No. 1: The IT-OT Convergence

Organizations are connecting their operational technology (OT) to the web as part of their digital transformation, but remote access to OT increases risk. Luckily, there is a way for OT personnel to get along with IT teams. Both teams can then respond to events in a converged IT-OT universe.

Trend No. 2: Adversarial Machine Learning

Adversarial machine learning (ML) is a rising threat. That’s why IBM and 11 other groups came together to design Adversarial ML Threat Matrix. Think of it as ATT&CK for adversarial ML. This matrix has the potential to help defend against attackers using adversarial ML.

Trend No. 3: Protecting AI Applications

Digital attackers are using all types of tools to tamper with the ML models that power AI. Luckily, defenders can hold the line against these evasion, poisoning, extraction and inference techniques. All they need are the right tools to asses and protect against these attacks.

Trend No. 4: Zero Trust

Zero trust architecture can transform security programs. But it needs to be done right. To be specific, it needs to move security closer to the target by providing trusted user experiences. This ensures that zero trust efforts will put privacy first, secure development efforts and overall reshape digital protection to power business growth.

Trend No. 5: Open XDR

The traditional network perimeter is gone. In its place is a mix of hybrid infrastructure that may or may not include more than one cloud deployment. This means it’s vital to move beyond endpoints in threat detection and response efforts. Embrace open extended detection and response (XDR), a new type of solution which integrates SIEMs and other products.

Trend No. 6: Encryption in the Hybrid Cloud

Speaking of hybrid cloud environments, encryption can help protect the data stored in them. But not every solution will work. You need encryption in the hybrid cloud that will protect sensitive business data from even privileged users. This requires an approach that’s taken certain design aspects, constraints and risks in stride.

Trend No. 7: Threat Hunting

Threat hunting lets defenders find and isolate threat actors before they have a chance to do any damage. The only problem is that certain approaches to threat hunting can weigh down the process with tedious tasks. Luckily, it’s possible to put the fun back in threat hunting.

Trend No. 8: Finding Fraud

Digital attackers seized on the events of 2020 to create new fraud operations that targeted users’ personal and financial data. Keeping in mind that many of these campaigns bypassed older anti-fraud techniques, it’s important that security teams rethink how they can uncover large-scale fraud operations. Key to this effort is knowing what types of fraud tactics to look out for.

Tip of the Iceberg

The innovations discussed above are just some of the cutting-edge tools and processes that will take center stage at RSA Conference 2021. To explore more, check out the conference’s website.

More from Zero Trust

SOAR, SIEM, SASE and Zero Trust: How They All Fit Together

Cybersecurity in today’s climate is not a linear process. Organizations can’t simply implement a single tool or strategy to be protected from all threats and challenges. Instead, they must implement the right strategies and technologies for the organization’s specific needs and level of accepted risks. However, once the dive into today’s best practices and strategies begins, it’s easy to quickly become overwhelmed with SOAR, SIEM, SASE and Zero Trust —  especially since they almost all start with the letter S.…

Contain Breaches and Gain Visibility With Microsegmentation

Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have especially manifested in more significant security threats to expanding IT attack surfaces. Breach containment is essential, and zero trust security principles can be applied to curtail attacks across IT environments, minimizing business disruption proactively. Microsegmentation has emerged as a viable solution through its continuous visualization of workload and device communications…

Why Zero Trust Works When Everything Else Doesn’t

The zero trust security model is proving to be one of the most effective cybersecurity approaches ever conceived. Zero trust — also called zero trust architecture (ZTA), zero trust network architecture (ZTNA) and perimeter-less security — takes a "default deny" security posture. All people and devices must prove explicit permission to use each network resource each time they use that resource. Using microsegmentation and least privileged access principles, zero trust not only prevents breaches but also stymies lateral movement should a breach…

What to Know About the Pentagon’s New Push for Zero Trust

The Pentagon is taking cybersecurity to the next level — and they’re helping organizations of all kinds do the same. Here’s how the U.S. Department of Defense is implementing zero trust and why this matters to all businesses and organizations. But first, let’s review this zero trust business. What is Zero Trust? Zero trust is the most important cybersecurity idea in a generation. But “zero trust” is itself a bit of a misnomer. It’s not about whether a person or…