GPSG’s cyber team had a lot of fun at RSA 2020! We learned about the latest cybersecurity solutions and endpoint security solutions, such as rogue device mitigation. We also caught up with existing partners and made new ones, including growing our networks with women in cyber and security leadership worldwide.
Endpoint Security Options Protecting Against Malicious Hardware Attacks
Endpoint and network security was a key topic at RSA this year. A few highlights include the latest capabilities for providing new types of protection, including managed detection and response capabilities, decoy endpoints, and data collection abilities supporting documentation verification against known threat profiles.
One unique endpoint risk management approach that stood out was rogue device mitigation, or protecting against malicious hardware attacks. This approach goes beyond allowing your IT and security teams to be able to identify how many and what type of endpoints are attached to your networks.
One example is Sepio Systems’ capability to identify rogue tools used for hardware attacks by providing security teams with full visibility into hardware assets and behavior in real time. The solution identifies rogue, or false flag, endpoint devices based on their unique physical layer attributes (e.g., voltage) when they connect to your network and begins responding to the threat or breach attempt by disconnecting the transmitting device. Sepio is currently the only product on the U.S. Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) Approved Product List (APL) that provides rogue device mitigation capabilities.
Rogue device mitigation solutions will likely grow as they can help address risks from your hardware supply chain, insiders, remote workforce issues, and more.

RSA Advancing Diversity in Cyber
A highlight of the conference for me was the She Speaks Security Session. Dr. Reem Al-Shammari, CISO, Kuwait Oil Company shared her journey to cybersecurity as a woman in the Middle East. She reminded us that every woman is special, has something unique to offer, and deserves a chance, support, and encouragement to discover and accomplish their goals.
Female cyber leaders and practitioners from around the world shared their ideas for overcoming workforce diversity challenges in the cyber field. We discussed ideas for how to approach difficult conversations in the workplace and grow our professional networks by connecting with organizations such as the Executive Women’s Forum, The Diana Initiative, Women’s Society of Cyberjutsu, and Women in Cybersecurity.
I also had the pleasure of attending the Center for Innovative Technology’s Women of Cyber Influence event. This was a fun-filled evening of networking and collaboration on all things cyber with leaders from multiple industries and academia. I look forward to next year’s event already!
Contact GPSG at cyberteam@gpsg.co for a free consultation on the latest trends in endpoint protection security and developing, or enhancing, your cyber strategy or systems engineering solution.
Disclaimer: This website provides ever changing content, conversations, and insights on cyber threats and trending solutions that is accurate to the best of our knowledge. Although we are cybersecurity experts, we provide information which we hope is helpful, and do not endorse any specific products, tools, or solutions referenced herein. Consult with your cybersecurity team before taking any action.
