A Virtual Information Security Officer (VISO) can help make your IT dollars more effective.Typically, we’re starting with the Scoreboard because we want to measure twice and only cut once. It’s important to ask these key questions:
One of the A-caliber CIOs I know recently asked me this amazing question::
Bill, do you realize how much it is costing me to secure my systems?
I decided to ask this question during my interview with Raj Samani, Chief Scientist and McAfee Fellow at McAfee. How DO YOU scale your security defenses when it is very difficult to get people to scale?
In this week’s interview Raj shares his passion for the Security Industry and his ways of diving deep into his craft. We talk about the power of learning and the need for an IT leader to be an articulate communicator. LIsten to Raj and I discuss how we can solve Enterprise Security challenges across the globe. Continue reading →
My guest this week is Jeff Williams, co-founder and Chief Technology Officer at Contrast Security.
The reason that I wanted Jeff on the program is that his technology was massively interesting to me, given that application attacks are the single biggest vector for security breaches. In 2017 There will be 111 billion new lines of code produced resulting in endless complexity.
His product was an Innovation Sandbox Finalist at RSA this year. So I wanted to understand more.
I have tried to integrate application level firewalls and experienced working through real & hard human challenges of coders and network security people trying to defend and deploy at the same time I wanted to understand his technology better AND because iterative application development is going to be even more important for companies for their security to move at the pace of the business innovation and applications development and testing becoming more and more iterative and agile. So how do we do this? Continue reading →
My guest this week is Jim Linn, Managing Director of Information Technology of American Gas Association. In an association, this simply means he is the “top dog” with IT.
What is fascinating about my guest today is that he built his own ISAC (information Sharing and Analysis Center) from scratch to service his industry – Natural Gas, which is part of the critical infrastructure of the US. He is the Executive Director for the Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC).
By Far Jim has the most industry certification I have ever seen:
B.S. degree in Computer Systems Management from Drexel University and an M.B.A. from Drexel University
He is a Certified Chief Information Security Officer
Certified Information Systems Security Professional
Certified Association Executive
Certified Information Systems Auditor.
Jim is quiet spoken but as I talked with him the word WISDOM kept popping up for me. Continue reading →