Tag Archives: IT

IT Security Will Become a Human Imune System | Defense Innovation


IT Security Will Become a Human Immune System:

• Over the next several years the vision of IT security will morph towards automation and self-orchestration.
• The healing process will become automated. Humans still need to remediate and think.
• This feeds from key vendors and public and private sectors that will share information reliably.

Learn more in this short clip from a past CIO Innovation Insider lunch.
To learn more about innovative defense strategies email defenseinnovation@redzonetech.net

How Do You Decrypt 29,000+ Computers? – with Raj Samani

This episode is sponsored by the CIO Innovation Insider Offense and Defense Community.

One of the A-caliber CIOs I know recently asked me this amazing question::

Bill, do you realize how much it is costing me to secure my systems?  

I decided to ask this question during my interview with Raj Samani, Chief Scientist and McAfee Fellow at McAfee.  How DO YOU scale your security defenses when it is very difficult to get people to scale?

In this week’s interview Raj shares his passion for the Security Industry and his ways of diving deep into his craft. We talk about the power of learning and the need for an IT leader to be an articulate communicator. LIsten to Raj and I discuss how we can solve Enterprise Security challenges across the globe. Continue reading

How to Get Your Team’s Big Data Design & Visualization Skills to a World Class Level? Tactics+Tools to Get You There – with Seth Familian

This episode is sponsored by the CIO Scoreboard

My guest this week is Seth Familian, who specializes in connecting powerful web-based tools and services to create highly customized marketing + analytics experiences for product and content marketing teams. He is the founder and principal of Familian&1, a visual insights and automation consultancy whose work has benefitted companies including Cisco, RingCentral, Adorama and Cloud9. Seth is also an avid educator with experience teaching over 800 students in 40+ workshops on Visual Design with Data, Working with Big Data, Digital Tools for Business and Affordable Web Design. He has lectured at General Assembly, Galvanize, Impact HUB SF, Presidio Graduate School, the Haas School of Business and KQED.  Continue reading

Does the Security of Your Applications Respond at the Pace of Your Business? – with Jeff Williams

This episode is sponsored by the CIO Scoreboard

My guest this week is Jeff Williams, co-founder and Chief Technology Officer at Contrast Security.

The reason that I wanted Jeff on the program is that his technology was massively interesting to me, given that application attacks are the single biggest vector for security breaches. In 2017 There will be 111 billion new lines of code produced resulting in endless complexity.

His product was an Innovation Sandbox Finalist at RSA this year. So I wanted to understand more.

I have tried to integrate application level firewalls and experienced working through real & hard human challenges of coders and network security people trying to defend and deploy at the same time I wanted to understand his technology better AND because iterative application development is going to be even more important for companies for their security to move at the pace of the business innovation and applications development and testing becoming more and more iterative and agile. So how do we do this? Continue reading

Critical Infrastructure Protection – with Jim Linn, Managing IT Director of American Gas Association

This episode is sponsored by the CIO Scoreboard

My guest this week is Jim Linn, Managing Director of Information Technology of American Gas Association. In an association, this simply means he is the “top dog” with IT.

What is fascinating about my guest today is that he built his own ISAC (information Sharing and Analysis Center) from scratch to service his industry – Natural Gas, which is part of the critical infrastructure of the US. He is the Executive Director for the Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC).

By Far Jim has the most industry certification I have ever seen:

  • B.S. degree in Computer Systems Management from Drexel University and an M.B.A. from Drexel University
  • He is a Certified Chief Information Security Officer
  • Certified Information Systems Security Professional
  • Certified Association Executive
  •  Certified Information Systems Auditor.

Jim is quiet spoken but as I talked with him the word WISDOM kept popping up for me. Continue reading