RSA: IT sec experts facing unprecedented complexity
Every year, IT security teams are facing increasingly complex environments, RSA president says.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
IT security experts are facing increasing complexity year by year and businesses need better systems to cope.
So says Art Coviello Jr, president of RSA and executive vice president of EMC, who claimed the environment has become increasingly complicated in line with the rising number of threats emanating from both cyber criminals and nation states.
"Every year I ask, could our jobs get any more complicated?' Every year I say yes'," he told delegates at the RSA Europe Conference taking place in London today.
He offered a range of solutions for firms to deal with the rising complexity in IT security, placing them under the umbrella of a holistic "security management system."
Companies will need to cover a variety of areas with such a system, including the establishment of an enterprise controls framework, streamlining and automation of compliance processes as well as the unification of compliance and business agendas, according to Coviello.
He also stressed the need for firms to educate and influence regulators and standards bodies to ensure best practice is more widespread.
Tom Heiser, chief operating office at RSA, noted IT departments are also having to cope with an "overabundance" of products from varying vendors, again making matters more complicated.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"That's the situation and it's not pretty," he said.
"There is a dangerous lack of visibility leaving organisations open to attacks."
The overarching concept in a management system should ensure "the right people have access to the right information over a trusted infrastructure," he explained.
"The challenge remains the same. Our current approaches are flawed at best, but there is a better way."
Heiser called for companies to adopt a system that enables them to close gaps, while centralising management to cover products from all vendors.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Tomorrow's fraud techniquesITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
Met Office hails huge efficiency gains in first year of cloud supercomputing with Microsoft AzureNews In moving to the cloud, the Met Office has bolstered operational resilience and helped to deliver more accurate forecasts
-
Kyndryl wants to help enterprises keep AI agents in line – and avoid costly compliance blundersNews Controls become machine‑readable policies that AI agents can read and must obey
-
How AI, agentic and otherwise, broke big at RSAC 2025Sponsored Content Artificial intelligence (AI) just got a massive welcome party from the security industry
-
“Public trust has become the new currency for AI innovation”: Why SAS is ringing the alarm bell on AI governance for enterprisesNews Demonstrating responsible stewardship of AI could be the key differentiator for success with the technology, rather than simply speed of adoption
-
“Governance is an irreplaceable role”: Microsoft Security VP on why diversity and sector expertise will keep security workers relevant in the age of agentic AINews Improved AI skills and a greater focus on ensuring agents are secure at point of deployment will be key for staying ahead of attackers
-
The CEO's guide to generative AI: Be a creator, not a consumerWhitepaper Innovate your business model with modern IT architecture, and the principles of trustworthy AI
-
Digitization solves manufacturing’s five toughest challengesWhitepaper Discover the technology trends that overcome manufacturing’s challenges, from cyber resilience to breaking free from legacy technology
-
Building a strong business case for GRC automationwhitepaper Successfully implement an innovative governance, risk & compliance management platform
-
Three ways risk managers can integrate real-time controls to futurize operations at the bankWhitepaper Defining success in your risk management and regulatory compliance
