Professional threat actors are sophisticated and organized. They collaborate and they have extensive information sharing networks. What are you as a defender doing?

On May 1 – 4, the sunny and sometimes rainy South Beach in Miami, FL hosted the 2016 FS-ISAC Annual Summit: “Strength in Sharing: Expanding the Trust.” Kurt Roemer and I had the pleasure of joining over a thousand security practitioners in attending a packed agenda dealing with all facets of cybersecurity including my favorites cyber fraud, blockchain, and ransomware.

The FS-ISAC stands for Financial Services Information Sharing and Analysis Center (FS-ISAC), an industry forum for collaboration on critical security threats facing the global financial services sector. Its mission is to ensure members worldwide “receive timely notification and authoritative information specifically designed to help protect critical systems and assets from physical and cyber security threats.” The annual summit is a gathering of these members for a face-to-face networking and sharing of best practices, information, discussions, and knowledge.

At the event, we spoke to IT systems and operation managers, infosec analysts, security engineers and CISOs from the top financial organizations in North America. Many are our long time customers and they agree that:


  1. XenApp and XenDesktop are used to virtualize and centralize applications and desktops in the datacenter keeping confidential data off of endpoints. Companies realize the full value of their security investments in place at the data center.
  2. NetScaler secures remote access allowing branch employees, partners, vendors and consultants to work with company applications and data.
  3. XenMobile containerizes apps and data allowing IT to better manage confidential company information on mobile devices.
  4. ShareFile controls and audits file sharing, removing the need for consumer grade file sharing.

In our conversations it was clear that our customers agree with @conniebarrera1, that “Citrix provides an ideal solution for enabling organizations to establish a locked-down secure infrastructure that at the same time enable users by providing more freedom than ever before.”

More and more organizations are looking to the cloud to realize higher efficiency but are taking the time to understand the requirements to secure the environment and protect the users and their data from malicious activity, loss and misuse. Forbes finds that 62% of respondents indicated that security concerns are the biggest barrier to more fully embracing cloud.

If you missed us at the summit and would like to learn more about Citrix at an event, join us at Synergy 2016 May 24 through 26 in Las Vegas. It’s still not too late to register now. Or learn more about Citrix solutions and use cases at and

Also, watch our on-demand webinar on how Citrix can strengthen your security position and help with FFIEC compliance process: REGISTER 

Synergy Banner