RSA Conference Announces Recipients of 15th Annual Award Program

RSA Conference, the world’s leading information security conferences and expositions, recently announced the honorees of its 15th annual awards program. Award applicants were judged in the fields of mathematics, public policy and security practices. Also presented this year was a lifetime achievement award given out to an individual who has made a big impact in information security over the last 21 years. This year’s recipients were revealed yesterday at RSA Conference 2012 in San Francisco.

The recipients of this year’s RSA Conference Awards are as follows:

Excellence in the Field of Mathematics Award

Eli Biham, Professor, Technion-Israel Institute of Technology, Computer Science

Dr. Mitsuru Matsui, Senior Researcher, Mitsubishi Electric Corporation

Professor Eli Biham and Dr. Mitsuru Matsui have both contributed groundbreaking work on the cryptanalysis of symmetric-key ciphers. Biham, a professor and dean of the Computer Science department at the Technion-Israeli Institute of Technology, co-discovered the technique of differential cryptanalysis with Adi Shamir in the late 1980’s. Dr. Matsui, inspired by Biham and Shamir’s work, discovered the technique of linear cryptanalysis in 1993. The following year, he was the first to publicly report an experimental cryptanalysis of DES.

Excellence in the Field of Public Policy Award

Congressman Mac Thornberry (R-TX), Chair of the House Republican Task Force on Cyber Security

Mac Thornberry, a lifelong resident of the 13th District of Texas, has established himself as a leader in national security, an area in which he continues to be given new responsibilities and opportunities to help advance the security of our nation. In early 2011, Thornberry was tapped by the Speaker of the House and Majority Leader to spearhead a Cyber Security Task Force to guide House legislative action on the growing national security and economic threat. Charged with making recommendations in a number of areas including protecting critical infrastructure and sharing cyber security information, the Task Force released its recommendations on October 5, 2011 to favorable response from both sides of the House and the Senate, as well as the White House, private businesses and other outside organizations.

Excellence in the Field of Security Practices Award

Phil Agcaoili, Chief Information Security Officer, Cox Communications, Inc. and Cyber Security Committee Co-Chair of the FCC CSRIC

Phil Agcaoili has been a change agent and transformation leader in the Technology and Information Security industries for over 20 years and is the Chief Information Security Officer at Cox Communications. He has helped shape the direction of cyber security for US Telecoms through his appointment as the committee co-chair of the FCC CSRIC, and is helping to shape cyber security as a founding member of the NCTA Cyber Security Work Group. He is also guiding the direction of cloud computing as a founding member of the Cloud Security Alliance and as a co-inventor and co-author of the CSA Cloud Controls Matrix (CCM), GRC Stack, and STAR (Cloud Security Registry), and provides privacy and trust guidance as a Ponemon Institute Distinguished Fellow. Mr.Agcaoili has led security teams and has represented GE, VeriSign, Alcatel, Scientific-Atlanta, Cisco, Dell and Cox Communications in their respective Corporate Security, Privacy, Governance, Risk, and Compliance (GRC) Councils and Committees, co-founded several companies and sold them during the Dot-Com era, secured many of the largest global companies, safely connected them at the start of the Internet era, and safeguarded the privacy for hundreds of millions of customers worldwide. He is an entrepreneur and investor, serves on the boards of several companies, and many of his protegés lead other global security teams or started their own companies.

Lifetime Achievement Award

Martin E. Hellman, Professor Emeritus of Electrical Engineering, Stanford University

Martin E. Hellman, Professor Emeritus at Stanford, is best known for his invention, with Diffie and Merkle, of public key cryptography. In addition to many other uses, this technology forms the basis for secure transactions on the Internet. He has also been a long-time contributor to the computer privacy debate, starting with the issue of DES key size in 1975 and culminating with service (1994-96) on the National Research Council's Committee to Study National Cryptographic Policy, whose main recommendations have since been implemented. Prior to joining Stanford’s faculty in 1971, Hellman was at IBM’s Watson Research Center and served as an Assistant Professor of EE at MIT. Hellman received his B.E. from New York University in 1966, and his M.S. and Ph.D. from Stanford University in 1967 and 1969, all in Electrical Engineering.

“This year’s RSA Conference Awards winners have shown what it takes to be true leaders and role models in mathematics, public policy and security,” said Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conference. “As pioneers in their field that have contributed lasting value to their organizations, these recipients have helped drive the information security agenda. We are thankful to this year’s winners and hope many follow in their footsteps.”

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3