Skip to main content

An Insider’s Perspective on McAfee FOCUS ‘12

October 25, 2012

I recently had the pleasure of attending my third McAfee security conference, Focus 12. Accuvant participates in this annual event because we are a McAfee partner, but also because of the quality sessions and discussions. I’d like to share a few observations that made the 2012 event particularly interesting for me.

Overall, attendees this year seemed more engaged with exhibitors and even each other compared to past FOCUS events or other industry conferences. Many of our partners agreed with our observation that there were long lines surrounding many booths and our feeling of an increased level of interest in security issues and trends.

When speaking with attendees at FOCUS 12, they discussed security challenges that many of our clients approach us about on a regular basis. Mobile security and Bring Your Own Device (BYOD) continue to be the hot trends that organizations large and small are facing. Connectivity and interoperability were common themes of the executive keynotes as well as a topic we heard from partners and clients. The security options to address these issues are always evolving, and the need for cutting-edge solutions to interact with existing investments is the stark reality.

However, we also heard at the event that the foundations of cyber security still stand strong—reaffirming what we believe to be true from our own experience and expertise. Intrusion prevention/detection, risk and compliance, proactive and reactive systems, reporting and analysis, and assessment and remediation continue to be recurring themes year after year and still require specific expertise to address. While the scope is typically dynamic (i.e., cloud, clientless devices, etc.), the needs and concerns still resonate the same.

One unique aspect of this year’s FOCUS event for our team was receiving an increased request for managed services. More attendees than ever approached our security experts for details on how we can help them manage their environments. Perhaps this a sign of an increasing trend toward organizations realizing the value of having a dedicated security partner to help them ensure their IT networks and confidential data are secure. Only time will tell.

One last observation I made at FOCUS 12 was that many of the attendees seemed to share my sentiment on President George W. Bush’s keynote presentation – that it was a fun and unforgettable experience. While at a security conference, I usually expect keynotes to be canned speeches about the threats we face and the role that security professionals play in addressing them. I have heard several speeches from current and past government officials that took this tone, and I was prepared for the same from President Bush. Instead, we were presented with a very candid, relaxed, non-political, humorous, and touching conversation with the former president. With a pending election and the polarizing tone party politics usually takes, that direction was largely left out, and when included, was far from judgmental. And if there was one clear message from the former president to us as security professionals, it was that WE are the experts, and that the politicians of the world should be listening to us and not vice-versa.

Related Blogs

May 05, 2011

Mobile Security Universal Issues | Optiv

It seems everywhere I go I’m having interesting conversations with senior level government officials regarding mobile security.  A lot of these conver...

See Details

April 24, 2013

Cyber Security Flaws We All Know and Love

Joseph Belans provided an excellent presentation at BSides titled "Hacking like it's 1999: Security Flaws We All Know and Love." Below is a video rec...

See Details

March 07, 2014

Behind the Curtains of New War: Bringing Cyber War to the Crimean Peninsula

Gone are the days where military conflict was contained within geographical boundaries limited to the range of the physical machines of war on the bat...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Related Insights

February 22, 2016

Mobile Application Company Solves Complex Security Challenges

Read how Optiv helped a mobile application company secure their game.

See Details

April 02, 2014

An Update on Mobile OS Updates

Many of the customers I meet with most often ask for a recommendation or guidelines on the application of mobile OS updates (Android, iOS, etc.). For ...

See Details

December 10, 2012

Mobile Security UK Webinar | Optiv

Enterprise users are using multiple devices to tap into the corporate network. Connectivity, portability and productivity are the “three legs” of mobi...

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.