RSA Conference Announces Recipients of 15th Annual Award Program

RSA Conference, the world’s leading information security conferences and expositions, recently announced the honorees of its 15th annual awards program. Award applicants were judged in the fields of mathematics, public policy and security practices. Also presented this year was a lifetime achievement award given out to an individual who has made a big impact in information security over the last 21 years. This year’s recipients were revealed yesterday at RSA Conference 2012 in San Francisco.

The recipients of this year’s RSA Conference Awards are as follows:

Excellence in the Field of Mathematics Award

Eli Biham, Professor, Technion-Israel Institute of Technology, Computer Science

Dr. Mitsuru Matsui, Senior Researcher, Mitsubishi Electric Corporation

Professor Eli Biham and Dr. Mitsuru Matsui have both contributed groundbreaking work on the cryptanalysis of symmetric-key ciphers. Biham, a professor and dean of the Computer Science department at the Technion-Israeli Institute of Technology, co-discovered the technique of differential cryptanalysis with Adi Shamir in the late 1980’s. Dr. Matsui, inspired by Biham and Shamir’s work, discovered the technique of linear cryptanalysis in 1993. The following year, he was the first to publicly report an experimental cryptanalysis of DES.

Excellence in the Field of Public Policy Award

Congressman Mac Thornberry (R-TX), Chair of the House Republican Task Force on Cyber Security

Mac Thornberry, a lifelong resident of the 13th District of Texas, has established himself as a leader in national security, an area in which he continues to be given new responsibilities and opportunities to help advance the security of our nation. In early 2011, Thornberry was tapped by the Speaker of the House and Majority Leader to spearhead a Cyber Security Task Force to guide House legislative action on the growing national security and economic threat. Charged with making recommendations in a number of areas including protecting critical infrastructure and sharing cyber security information, the Task Force released its recommendations on October 5, 2011 to favorable response from both sides of the House and the Senate, as well as the White House, private businesses and other outside organizations.

Excellence in the Field of Security Practices Award

Phil Agcaoili, Chief Information Security Officer, Cox Communications, Inc. and Cyber Security Committee Co-Chair of the FCC CSRIC

Phil Agcaoili has been a change agent and transformation leader in the Technology and Information Security industries for over 20 years and is the Chief Information Security Officer at Cox Communications. He has helped shape the direction of cyber security for US Telecoms through his appointment as the committee co-chair of the FCC CSRIC, and is helping to shape cyber security as a founding member of the NCTA Cyber Security Work Group. He is also guiding the direction of cloud computing as a founding member of the Cloud Security Alliance and as a co-inventor and co-author of the CSA Cloud Controls Matrix (CCM), GRC Stack, and STAR (Cloud Security Registry), and provides privacy and trust guidance as a Ponemon Institute Distinguished Fellow. Mr.Agcaoili has led security teams and has represented GE, VeriSign, Alcatel, Scientific-Atlanta, Cisco, Dell and Cox Communications in their respective Corporate Security, Privacy, Governance, Risk, and Compliance (GRC) Councils and Committees, co-founded several companies and sold them during the Dot-Com era, secured many of the largest global companies, safely connected them at the start of the Internet era, and safeguarded the privacy for hundreds of millions of customers worldwide. He is an entrepreneur and investor, serves on the boards of several companies, and many of his protegés lead other global security teams or started their own companies.

Lifetime Achievement Award

Martin E. Hellman, Professor Emeritus of Electrical Engineering, Stanford University

Martin E. Hellman, Professor Emeritus at Stanford, is best known for his invention, with Diffie and Merkle, of public key cryptography. In addition to many other uses, this technology forms the basis for secure transactions on the Internet. He has also been a long-time contributor to the computer privacy debate, starting with the issue of DES key size in 1975 and culminating with service (1994-96) on the National Research Council's Committee to Study National Cryptographic Policy, whose main recommendations have since been implemented. Prior to joining Stanford’s faculty in 1971, Hellman was at IBM’s Watson Research Center and served as an Assistant Professor of EE at MIT. Hellman received his B.E. from New York University in 1966, and his M.S. and Ph.D. from Stanford University in 1967 and 1969, all in Electrical Engineering.

“This year’s RSA Conference Awards winners have shown what it takes to be true leaders and role models in mathematics, public policy and security,” said Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conference. “As pioneers in their field that have contributed lasting value to their organizations, these recipients have helped drive the information security agenda. We are thankful to this year’s winners and hope many follow in their footsteps.”

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3