Next-Generation Technologies & Secure Development , Training & Security Leadership

Cybersecurity Trends: An In-Depth Analysis

RSA Conference Chair Hugh Thompson Offers an Update
Dr. Hugh Thompson, program committee chair, RSA Conference

How are emerging technologies, such as quantum computing and Secure Access Server Edge, or SASE, shaking up cybersecurity? And how are cyber adversaries adapting to the changing times? Dr. Hugh Thompson, program committee chair for the RSA Conference, offers an analysis of trends.

See Also: 'Deepfake' Technology: Assessing the Emerging Threat

Thompson was a keynote speaker at the RSA APJ virtual conference.

In this video interview with Information Security Media Group, Thompson discusses:

  • The first virtual RSA conference program;
  • The constants in cybersecurity;
  • The outlook for the future of cybersecurity.

As RSA Conference program committee chair, Thompson is responsible for identifying domestic and global trends to help set the agenda for the event. The security expert and former adjunct professor at Columbia University has a Ph.D. in applied mathematics. He has co-authored four books and more than 100 publications on security and has testified before Congress on cybersecurity.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.