CSID at SXSW 2017

By | February 24th, 2017|Uncategorized|

CSIDEvery year, hundreds of thousands of people come to Austin to attend South by Southwest. This technology, film, and music conference and festival brings together some of the brightest minds in innovation from around the world. We’re looking forward to another opportunity to weigh in to the conversation and will be participating in a range of security-focused sessions at this year’s event, which kicks off March 10.

CSID will be hosting a workshop and a solo session at the conference to share our expertise on two topics that have become increasingly prevalent in today’s cybersecurity climate. CSID’s very own Joel Lang will be co-hosting a breach response workshop and giving participants the hands-on opportunity to learn best practices in risk mitigation and breach response through a live simulation. This interactive workshop will take place at 9:30am on March 11 at the Westin Austin Downtown in Continental 2. Don’t forget to RSVP to this workshop. To RSVP, you must sign into your SXSW account and have your badge linked to your account on social.

Additionally, our Chief Innovation Officer, Adam Tyler, will be speaking about the new face of cyber crime, showcasing through a live demonstration how younger individuals get involved in cyber crime, and how consumers can help defend against growing threats. You can catch Adam’s session at 3:30pm on March 15 at the JW Marriott in Salon 7.

If you’re attending SXSW, we’d love to see you at our sessions. Check out some of our other top picks below that are sure to offer unique insights into the latest threats and opportunities in the security landscape. Unable to attend this year’s conference? You can join the conversation at @csidentity where we’ll be on-site and live tweeting from our panels and other sessions throughout SXSW.

The Future of You: Identity Tomorrow
Saturday, March 11, 11:00 am, JW Marriott, Salon 8
In the future, your digital ID may replace all your current forms of identification. These ID experts discuss the current state of web identity from business to consumer, and dig into the important advancements that are being made to build your future identity. Who will own your ID in the future? Why will it become so important for your future digital existence? Is the future of ID centralized and managed by governments, or distributed and trust-less like block chain? What do you need to know to protect yourself in this new digital Domain?

A New Normal: User Security in an Insecure World
Monday, March 13, 3:30 pm, JW Marriott, Salon D
Online security is becoming a game of Whack-a-Mole, where one threat is contained while another emerges; where a credential dump of millions of users is yet another note in a chorus of breaches. Today, complete security is somewhat of a pipe dream. Given this new normal, how do we keep our information as secure as possible? This diverse panel will navigate the evolving challenges to online security and question conventional wisdom around security across industry and sector–to understand the economics of a seemingly chaotic online world and to illuminate unexpected trends.

Connected Cities, Hackable Streets
Tuesday, March 14, 12:30 pm, JW Marriott, Salon 6
In cities around the world, street lights, public transit systems, and electric meters are already connected to the Internet. Soon, smartphone controlled, self-driving cars will roam cities and every part of the urban fabric could be Wi-Fi enabled. While tomorrow’s smart cities will usher in efficiencies and convenience, they’ll also bring about security threats and vulnerabilities. Hackers have already demonstrated they can remotely take over cars and switch off traffic lights. So, how can urban planners and engineers build cities of the future that are resilient enough to guard against cunning criminal hackers who may want to bring Singapore or San Francisco to a grinding halt?

Biotechnology Needs a Security Update
Wednesday, March 15, 12:30 pm, JW Marriott, Salon 6
Great leaps forward in biotechnology have made the IT-based manipulation of life increasingly easy. To many, biotech offers unparalleled opportunities to reshape our world and ourselves. To others, it poses significant threats. As human systems are better understood and life becomes more programmable with CRISPR and other technologies, governments need to prepare for a new age of biosecurity. Join experts from industry, FBI, and academia who work with hackers, sociologists and politicians to tackle the security challenges of the emerging bioeconomy. Explore real opportunities and threat profiles of modern and future biotech, and why life on earth may soon need a security update.

SXSW 2017 is sure to be full of enlightening conversations and ideas. In our new Firewall Chats bonus episode, we take a deep dive into a handful of SXSW sessions and their application in the current cybersecurity landscape. As always, feel free to join the conversation on Facebook, Twitter, or LinkedIn.

Head to the Polls: SXSW 2017 PanelPicker Voting is Now Open

By | August 8th, 2016|Industry News|

CSIDIt’s that time of year again, South by Southwest’s 2017 PanelPicker voting platform is now live! Every year, people around the world vote through PanelPicker to help bring their favorite sessions to SXSW Interactive, the internationally recognized event that draws thousands of tech enthusiasts to Austin, TX every March.

We’ve participated in SXSW Interactive for the last few years and we’re once again hoping to bring our cyber security expertise to the stage, but we need your help to get us there. SXSW’s PanelPicker is a simple, two-step online process that allows the SXSW community to have a significant voice in shaping the programming. Your vote shows the organizers that our panels are a good fit for 2017’s event.

Check out our submissions below. If you want to see the panel at SXSW next March, follow the PanelPicker link and give it a “thumbs up.” All you need is an email address to vote.

The Creation Of A Hacker
Younger, less technical individuals are the new face of cyber crime. Through a live demonstration, this session will dive into the relatively unexplored world of gaming and showcase the growing role it is playing in luring younger individuals to get involved in cyber crime as a service. We’ll explore the emerging business models within the dark web and the consequences for the misrepresentation of hackers in mainstream media. Recent case studies will shine light on the evolving cyber criminal identity and participants will walk away from the session with new, critical insights to mitigate risk at the individual and organizational levels.

Vote here: http://panelpicker.sxsw.com/vote/60437

Target on Their Back: Small Businesses Under Attack
Cyber criminals have their eyes on small businesses more than ever before. In fact, more than half of phishing attacks were targeted towards small businesses last year. Why? They have fewer resources to defend themselves than large enterprises but still store data criminals consider valuable and attractive for commerce across the dark web. The consequences of a breach can be critical – sometimes even forcing a small business to close up shop. With attacks on small businesses showing no sign of slowing, how can this group stay one step ahead of cyber threats? Join this dual session for a conversation around the latest threats and walk away with proactive steps to defend against attacks.

Vote here: http://panelpicker.sxsw.com/vote/65846

The Domino Effect of Flawed Breach Response
The unthinkable happens – your company has been breached. How has this happened? What are the first steps you take? Are you prepared? In this interactive session you’ll gain insight into the breach response process, uncover best and worst practices, and experience the long-term domino effects inherent with each. Attendees will form small groups to role-play the wide variety of responses at each stage, and uncover the potential long-term effects of actions. By learning best practices through seeing the effect of worst practices, you’ll walk away with unique insight into the breach response process that will help you prepare your company.

Vote here: http://panelpicker.sxsw.com/vote/61885

You have until September 2 to cast your vote and leave any comments or questions for our panelists.  We appreciate your support! Keep up with our SXSW involvement and other company happenings on Facebook, Twitter, and LinkedIn.

Cybersecurity Took Center Stage at SXSW 2016

By | March 24th, 2016|Industry News|

SXSWWe’re just about a quarter of the way through 2016, and we’ve already seen some cybersecurity trends taking shape. We presented at South by Southwest Interactive earlier this month, participating in and engaging with some of the biggest technology conversations from around the world. If you missed any of our panels, be sure to check out our recent recap.

While we were excited to present, we were just as excited to attend some of the other sessions diving into the latest in this space at SXSW. The conference further stressed what we already know: There are plenty of things to keep an eye out for as we continue into 2016 and beyond.

The Balance of National Security and Consumer Privacy
Apple made headlines earlier this year in the wake of the San Bernardino tragedy, declining to build a new, custom version of its iOS to help unlock one of the shooters’ phones. This triggered a debate on consumer privacy in the name of national security, and during his SXSW Interactive keynote speech, President Barack Obama addressed the fine line between the two.

He wasn’t the only one. Passcode participated in a number of panels on the subject. In fact, cryptologist Matt Blaze suggested it’s a lot more complex than just security versus privacy. Encryption simply isn’t widespread enough – and isn’t 100 percent foolproof – to ensure complete consumer privacy. “We are in what can only be described charitably as a cybersecurity crisis,” Blaze said, stating that his field still has a long way to go.

Defining a Company’s Role in Society
While most tech enthusiasts applauded Apple for their steadfast stance, not everyone felt they were completely innocent. Stewart Baker, former general counsel for the National Security Agency, believes Apple “isn’t being socially responsible” on the subject of encryption. He went so far as to suggest that if a company is profiting from the privacy benefits it offers, then it should have to take on a portion of the costs in fighting crimes.

“How about letting victims of crimes that have not been solved because of encryption sue Apple for damages?” Baker said.

Blaze added that weakening encryption systems will actually hurt the government’s ability to pursue criminals. “It’s a fundamental problem of computing,” he said. “If those systems aren’t as strong, they’re easier to infiltrate.”

Companies nowhere near the size of Apple can still create a better security culture. “You can’t iterate the trust your users have in you,” said Heather West, senior policy manager at Mozilla during a SXSW talk. In essence, consumers are happy to give up more data if they feel secure in your presence, but if that trust ever disappears, it’s nearly impossible to get it back.

Staying Secure Among Robots and the Internet of Things
Writer Kevin Kelly spoke at a panel about the trends in software, robotics and data. While there’s certainly some concern in the general public about robots taking over, Kelly urged us to focus on using robotics for good, as in the case of self-driving cars whose only knowledge is how to get passengers to their destinations safe and sound.

With wearables and the IoT continuing to expand, we’re seeing progress in a number of fields that can enhance our quality of life: IEEE Spectrum has done research into brain prosthetics to help restore memory, and graphene wristbands that not only monitor blood sugar levels, but also correct them.

At one panel, Intel’s vice president of law and policy Ruby Zefo said she recently was notified that her home’s temperature could be adjusted based on who was currently inside of it. The technology would determine the home’s occupants via location services in their mobile devices. Sure, it’s convenient, and could even save money by turning off the heat and air conditioning when no one was home. But Zefo opted not to give up that personal data, and suggested everyone at least consider what information they provide. “You’ve got to be a wise consumer,” she said. “If you have zero privacy, you should get over it, because you did it to yourself.”

SXSW was full of great conversations, and it’s interesting to see where things are headed in the coming months and years. We’ll be weighing in on these trends and more this year, be sure to follow us on Facebook, Twitter and LinkedIn.

And We’re Off! SXSW PanelPicker Voting Starts Today

By | August 10th, 2015|Uncategorized|

TSXSWTens of thousands of people descend upon Austin every March for SXSW Interactive – an annual gathering of some of the world’s most passionate techies, new-gadget enthusiasts, and creative problem-solvers. We’ve taken part in the conference for the past several years and are once again hoping to bring our cyber security insight to the stage, but we need your help! Read up on our submissions below. If you want to see the panel at SXSW next March, follow the PanelPicker link and give it the “thumbs up.” All you need is an email address to vote.

Cybersecurity Mythbusting: What’s the Real Deal?
In recent years, the general public opened their eyes to security breaches and privacy concerns as Target and Snowden made headlines for months on end. People are scared and confused and rightfully so. Much of the breach coverage fails to provide consumers with any truly useful information on what to do next to protect their digital identities, stirring panic without resolution. This session will tell you what to really worry about, debunking common cybersecurity myths, and shed light on the tangible steps you can take to keep your identity safe.

Vote here:  http://panelpicker.sxsw.com/vote/51521

Digital Identites: Modern Underground Currencies
How much is a Social Security number worth on the dark web? What about a driver’s license, a credit card number or a health record? Every day, hackers are buying and selling consumers’ stolen data and engaging in a whole world of commerce unseen by those outside of the dark web. They’re raking in hundreds, even thousands of dollars with each transaction. This session will dive into the digital currencies of this underground marketplace and provide an inside look at how transactions take place between cybercriminals through a live demonstration. Our very own Adam Tyler, CIO at CSID, will show how these cybercriminals collaborate and exchange ideas with each other to steal data, and also offer tips for consumers to keep their data safe.

Vote here: http://panelpicker.sxsw.com/vote/50621

Breach Aftermath: Cleaning Up the Mess
There’s a lot of cyber security doom-and-gloom going around these days. In the last few years major corporations and government organizations have suffered from breaches resulting in lost jobs, lost business and a frenzy of activity. For every bit of activity you see in a headline, there is an equal amount of work and response going on behind the scenes. This panel of experts will provide a behind-the-scenes look what happens when a company finds out it’s been breached, from patching up security to making sure those affected are protected. In addition to some interesting insight, attendees will come away with best practices when responding to a breach.

Vote here: http://panelpicker.sxsw.com/vote/51539

Don’t Tweet That! Managing Your Digital Footprint
With each tweet, like, and live stream, we are revealing information about our interests, location, and activities. This is how the world communicates. But are we putting ourselves at risk for identity theft (and more) with every post, share, and like? This engaging session will provide an in-depth analysis of our social media habits and what we share with an audience much larger than our “friends.” After all, 82 percent of the world’s population is online. This session will explore the data we share, security risks, and what consumers can do to help protect and control their digital identities.

Vote here: http://panelpicker.sxsw.com/vote/55907

You have until September 4 to cast your vote and leave any comments or questions for our panelists.  We appreciate your support! Keep up with our SXSW involvement and other company happenings on Facebook, LinkedIn and Twitter.

March Recap: SXSW Comes to a Close, CSID Employees Give Back

By | April 8th, 2015|Uncategorized|

Cyber SecurityIt was a busy month for CSID! After months of prepping for SXSW, we were excited to see the fruits of our labor come together. Between all of the SX madness, we were also happy to spend some time unwinding and giving back to the community. Check out our March recap below.

Wellness Week: Unwinding and Recharging
We kicked off March with Wellness Week: an opportunity for our employees to participate in everything from meditation classes to presentations on sleep and boosting your health with music. We rounded out the week with Fun Friday, where employees battled it out to create the healthiest dishes at our potluck and showed their skills at Giant Jenga.

Another Successful SXSW For the Books
It’s hard to believe another SXSW has come and gone. We enjoyed participating this year, (joining 50,000 of our closest friends), and speaking on panels including “Wi-Fi Privacy: When Sniffing Becomes Snooping,” and “Hacker to InfoSec Pro: New Rock Star Generation.” We were also loco for Jomoco in our session, “Follow the Money: Cyber Crime and the Black Market.” CSID CIO Adam Tyler also participated in the Christian Science Monitor-organized event, “Steak, Eggs and Cybersecurity: A Passcode Conversation.”

For all the details on CSID at SXSW, check out this blog post.

CSID Talks Women in Tech
We were proud to be featured in the March issue of Velma magazine last month. Our own HR recruiters, Melissa Smith and Loren Zeid, shared insights with the magazine on how we hire and retain talented women in tech and what perks and benefits we offer as an organization to attract female talent, including our promotion of a strong work-life balance, regardless of gender. Be sure to check out the issue, where we are featured beginning on page 15.

In addition, our own CFO, Amanda Nevins, represented CSID in the Austin Business Journal’s Bizwomen Mentoring Monday event.

CSID’s Joel Lang Speaks at IAPP KnowledgeNet
CSID’s Joel Lang enjoyed participating in the IAPP KnowledgeNet event in Austin. Joel shared insights on the session, “Setting the Table: An Information Security Incident Response Demo,” alongside Christopher Field, CIPM, CIPP/US, Corporate Privacy Director, Harte-Hanks.

Digging In And Giving Back
At CSID, we believe in the importance of taking time to give back to the community. We closed out March by volunteering for the Sustainable Food Center’s Grow Local Program, which offers central Texas residents the knowledge and resources necessary to grow their own food. We had a blast getting our hands dirty and spending time together as a team outside of the office.

Check out what else we were up to in March on Facebook, Twitter and LinkedIn.

CSID at SXSW 2015

By | March 12th, 2015|Uncategorized|

Cyber SecurityTomorrow, March 13 marks the first day of the SXSW Interactive conference. Over the next five days more than 50,000 of tech and digital’s best and brightest will converge on Austin and talk about emerging technology, digital creativity and all things inherent with the two.

Cyber security promises to be a key issue this year, especially with the growing number of high profile breaches and the security uncertainties that the Internet of Things and growth of mobile technologies are introducing to the market.

CSID is partaking in this conversation and will be participating in a number of security-focused sessions at this year’s conference. If you are attending SXSW, feel free to stop by the sessions. If you are not at this year’s conference but want to follow along with the conversation and conference, we will be live tweeting our panels and other security news at @csidentity.

Check in later next week for a recap of the security issues and themes prevalent at SXSW.

Wi-Fi Privacy: When Sniffing Becomes Snooping
Friday, March 13, 5:30 pm, Austin Convention Center Ballroom C
Image that your daily activities are being recorded and collected: your early morning jog in the park, your daily trip to the local coffee shop, your commute to work. No, we’re not referencing the NSA. We are referring to an emerging class of location-based marketing companies that sniff out signals emitted from Wi-Fi-enabled smartphones (Wi-Fi sniffing) to better understand your habits based off of your location – where you go, how often, how long you stay there, what time you generally visit, and more! All this information is being used to construct a profile that businesses are using for marketing purposes. CSID’s CIO, Adam Tyler will be leading a discussion on the security and privacy issues involved we can expect from Wi-Fi sniffing technology.

Hacker to InfoSec Pro: New Rock Star Generation
Sunday, March 15, 11 am, JW Marriott Salon 8
Malicious hackers tend to be smart, young – many are only teenagers – and they seek respect, power and financial gain. Many of them perceive hacking like being a rock star – they jump into the action and start reaping the rewards. But what if we could help young malicious hackers understand the damage they are doing, the legal ramifications of their actions, and how these actions could hamper their future? What if we could reshape their mindsets and encourage them to channel their work into something more productive – like Information Security, white hat hacking or even working with the government? It’s a wonder that the InfoSec and IT industries have a shortage of talent when salaries are rising and work is comparable to that of hackers, but they are doing it for good. It’s time we turn InfoSec and IT professionals into the new rock stars, the new hot ticket future for the hacker generation. Kent Bloomstrand, CTO at CSID, Tiffany Rad, manager of operational security, embedded technologies at Cisco, and Tom Edwards, Resident Agent in Charge with the United States Secret Service will address why and what we need to do, and how to start making changes.

Steak, Eggs, and Cybersecurity: A Passcode Conversation
Monday, March 16, 8:30 am, Fogo De Chao
Adam Tyler, CSID CIO, will be joining some of the sharpest practitioners and researchers for a discussion about cyber security innovation and trends. Adam will be joining Daniel Weitzner, head of the new MIT Cybersecurity Policy Initiative; John Dickson, principal of the Denim Group, and Stephen Coty, chief security evangelist at AlertLogic for this conversation. Register for this event at Passcode’s website.

Follow the Money: Cyber Crime and the Black Market
Tuesday, March 17, 12:30 pm, JW Marriott Salon 4
What exactly happens when a cyber criminal steals your credit card number? Believe it or not, in a matter of a couple hours your personal information could have taken a trip to multiple countries before being sold on the Black Market. When it comes to cyber crime, the Internet is a global ecosystem and hackers know no borders. Come take a behind-the-scenes look as we follow a stolen credential’s international journey through the Black Market. See for yourself how cyber crime isn’t a single issue impacting one country, but rather a global issue impacting consumers, corporations and governments around the world. In what country will our stolen credential end up? Join CSID’s development director Joel Lang and IDT911 editor-in-chief Byron Acohido, to find out.

January Recap: Ramping Up For The New Year

By | February 6th, 2015|Uncategorized|

Cyber Security Took Center Stage in the State of the Union Address
On January 20, President Obama delivered his annual State of the Union Address and this year cyber security was a major focus. President Obama detailed his plans for increasing online security, electronic privacy and the prevention of identity theft for the American people. Check out our blog post on the topic.

Data Privacy Day
On January 28, companies and organizations around the world celebrated the eighth annual Data Privacy Day – an initiative to help spread best practices from the National Cyber Security Alliance and StaySafeOnline.org. The day was filled with engaging Twitter chats, webinars and live events that dove into the biggest trends and challenges in cyber security today, providing interesting online conversations throughout the entire week.

Identity Theft Awareness Week
The last week of January was a busy one with Identity Theft Awareness Week, sponsored by the FTC. During the week, we joined in on the #IDTheftChat, where users shared tips on how to safeguard their information from some of the most common forms of identity theft.

Countdown to SXSW Interactive
It’s hard to believe SXSW is just around the corner! And, we have been busy ramping up for our three sessions. Below you will find more information on where you can find each of CSID’s sessions at SXSW:

SXSWiHacker to InfoSec Pro: New Rock Star Generation
Sunday, March 15
11:00am – 12:00pm
JW Marriot
Salon 8
110 E 2nd St

Follow the Money: Cyber Crime and the Black Market
Tuesday, March 17
12:30pm – 1:30pm
JW Marriot
Salon 4
110 E 2nd St

Wi-Fi Privacy: When Sniffing Becomes Snooping
Friday, March 13
5:30pm – 5:45pm
Austin Convention Center
Ballroom C
500 E Cesar Chavez St.

Joe Ross’s column on Huffington Post
Massive point-of-sale breaches seemed to dominate the news in 2014. CSID’s president Joe Ross weighed in with his insights on what new EMV legislation may mean for the security of merchants and consumers in his latest article on the Huffington Post: “POS Breaches in 2015: The Good, the Bad and the Ugly.”

With so many exciting initiatives this past month on increasing cyber security awareness and education, we look forward to what the rest of 2015 will bring. What do you think will be the biggest areas of focus this year? Share your answers with us on Facebook, Twitter and LinkedIn.

December Recap: A Time to Celebrate

By | January 7th, 2015|Uncategorized|

Christmas SweaterThe end of 2014 called for a bit of holiday cheer at CSID – a time to celebrate the number of people we served and recognize the hard work our team gives day in and day out. We got into the holiday spirit while keeping the CSID train on track in December. Take a look at all the activities we did last month:

One more for SXSWi!
Earlier in the year, CSID had two panels accepted for next year’s South By Southwest Interactive conference – Hacker to InfoSec Pro: New Rock Star Generation and Follow the Money: Cyber Crime and the Black Market – we received word that our third session was accepted as well! In March, you’ll be able to catch CSID’s Chief Innovation Officer Adam Tyler’s Future15 session, Wi-Fi Privacy: When Sniffing becomes Snooping. Stay tuned for more details on when and where all of our SXSWi panels will be held. The conference takes place March 13 through 17 in Austin, Texas.

Joe Ross posts more on Huffington Post and Security Today
December proved to be a month of data breaches. CSID’s president Joe Ross put together a December Breach Round Up and posted it on his monthly Huffington Post column. Following our webinar on medical identity theft, Joe shared his two cents on how data breaches are affecting the healthcare industry in Security Today Magazine. Check out his latest article: The Healthcare Industry: 2014’s Biggest Data Breach Victim.

Reindeer Games
The CSID crew is always ready to celebrate the holidays. This year, each department got together to create snow globes and we held our very popular annual ugly Christmas sweater contest. Larry walked away with first place for the second year in a row! You can see pictures of his ugly Christmas sweater – as well as the runners-up – on Facebook.

Families in Need
In addition to volunteering at Austin Operation Blue Santa, CSID adopted two local families in need this holiday season. CSID team members pitched in by donating toys, clothing, bedding and grocery store gift cards. A huge thanks to our team members who wrapped and delivered gifts!

Looking Ahead to 2015
We know 2015 is going to be a memorable year, so let’s kick off January by making some smart security resolutions. We recommend signing up for a password manager, turning on two-factor authentication where possible and signing up for an identity monitoring service. Let us know what your New Year’s security resolutions are on Facebook, Twitter or LinkedIn and be sure to keep up with our Tumblr for up-to-date security new stories.

Security Trends: A Look Back at 2014 and Ahead to 2015

By | December 11th, 2014|Uncategorized|

Security Trends2014 was a busy year for the security industry, with an unprecedented number of breaches, malware strains and POS hacks. With cybercrime becoming an unfortunate but increasingly common consequence of seemingly benign Internet activities, business and consumers alike will have to up the ante on the measures they use to protect themselves. Here’s a round up of some of 2014’s most talked about security problems and some measures that can help mitigate their prevalence in the new year.

Medical Identity Theft
Looking Back: As CSID President Joe Ross discussed in his Huffington Post column, medical identity theft has become an easy and lucrative target for criminals.

Looking Forward: Our recent webinar highlighted a number of effective best practices to reduce the opportunities for medical identity theft. We suggest auditing third party vendors who can access patient credentials and implementing a robust authentication system across all business platforms. With medical identity theft likely to increase in the new year, businesses must continue to practice diligent monitoring and alert techniques to circumvent the problem.

Recruiting Top IT Talent
Looking Back: Over the past few years we have seen a shortage in cyber security and IT talent, and this has become even more difficult as demand continues to surpass supply.

Looking Forward: While there is no overnight resolution to the talent deficit, talent advisory company CEB has identified two significant shifts that can help the industry expand the number of potential candidates:

  1. Look to other IT hubs – Silicon Valley has long been the center of IT activity, but looking beyond to incubator cities like Denver, Phoenix and CSID’s hometown Austin can help expand the pool of potential candidates.
  2. Changing the competency evaluation model – While traditional skills are still necessary, looking for individuals who can learn and adapt quickly to IT needs can help businesses change with the pace of the industry.

Additionally, look out for information on our upcoming SXSW Interactive panel where we will discuss ways to recruit talent and encourage malicious hackers to move away from dark web practices and use their skills and expertise for good.

Tackling Global Identity Theft And Data Breaches
Looking Back: Identity theft – as well as that which occurs through data breaches – is an increasingly global issue, particularly as we all become more connected and dependent on the digital world.

Looking Ahead: The first step towards confronting identity theft with viable solutions is to recognize that the problem requires global collaboration and strategies. While tools like our comprehensive Global Protector can help protect businesses and consumers against breach on a global scale, government initiatives and global agendas must also be implemented to confront the issue. We will discuss solutions and a comprehensive global approach to the problem in our panel at the 2015 SXSW Interactive conference.

What do you think will be our biggest security challenge in 2015? Tell us your predictions on Twitter, Facebook or LinkedIn.

November Recap: Giving Thanks at CSID

By | December 2nd, 2014|Uncategorized|

November was a time to give thanks at CSID. We gathered our best secure shopping tips for Black Friday and Cyber Monday, prepped for SXSW 2015, attended The Texas Conference for Women and had a good, old-fashioned Thanksgiving feast at our office. Here’s a recap of what we were up to in November:

Prepping for SXSWi!
CSID had two panels accepted for next year’s South By Southwest Interactive conference. We are already prepping for our panels! Here’s a look at our accepted panels: Hacker to InfoSec Pro: New Rock Star Generation and Follow the Money: Cyber Crime and the Black Market. Stay tuned for more details on when and where our SXSWi panels will be held. The conference takes place March 13 through 17 in Austin, Texas.

Black Friday + Cyber Monday Tips
In light of last year’s retail breaches, we prepared a few key Cyber Monday shopping tips to help online buyers make smart, secure decisions. These tips can help keep you secure all the way through the holidays, so be sure to check them out.

Joe Ross shares more on Huffington Post and IAPP
After our recent medical identity theft webinar, Joe Ross shared additional insight on the topic in his latest articles. Check out his piece in The Huffington Post to find out how you can protect your personal medical identity. For the security professionals out there, be sure to check out Joe’s article on how you can best protect patient data on IAPP’s The Privacy Advisor.

Texas Conference for WomenTexas Conference for Women
Last year, a group of CSID team members attended The Texas Conference for Women, an event dedicated to sharing and inspiring women entrepreneurs and women in technology. The group found the conference to be extremely useful and inspiring in 2013, so CSID attended the conference again this year. To find out more about the conference, its speakers and topics, check out TXConferenceForWomen.Org.

Thanksgiving Feast at CSID
Prior to heading home for the holidays, we got together to give thanks with our work family. CSID had a Texas-style feast with la Barbecue and other Thanksgiving goodies at our Austin HQ.

Coming Up in December
We want to pause in December to reflect on 2014 and take a look forward at what’s to come in 2015. Stay tuned for security predictions to keep an eye on in the coming year!

How was your November? What are you looking forward to in December? Let us know on Facebook, Twitter or LinkedIn and be sure to keep up with our Tumblr for up-to-date security news stories.

Load More Posts