• Over the next several years the vision of IT security will morph towards automation and self-orchestration.
• The healing process will become automated. Humans still need to remediate and think.
• This feeds from key vendors and public and private sectors that will share information reliably.
Learn more in this short clip from a past CIO Innovation Insider lunch.
To learn more about innovative defense strategies email email@example.com
One of the A-caliber CIOs I know recently asked me this amazing question::
Bill, do you realize how much it is costing me to secure my systems?
I decided to ask this question during my interview with Raj Samani, Chief Scientist and McAfee Fellow at McAfee. How DO YOU scale your security defenses when it is very difficult to get people to scale?
In this week’s interview Raj shares his passion for the Security Industry and his ways of diving deep into his craft. We talk about the power of learning and the need for an IT leader to be an articulate communicator. LIsten to Raj and I discuss how we can solve Enterprise Security challenges across the globe. Continue reading →
My guest this week is Seth Familian, who specializes in connecting powerful web-based tools and services to create highly customized marketing + analytics experiences for product and content marketing teams. He is the founder and principal of Familian&1, a visual insights and automation consultancy whose work has benefitted companies including Cisco, RingCentral, Adorama and Cloud9. Seth is also an avid educator with experience teaching over 800 students in 40+ workshops on Visual Design with Data, Working with Big Data, Digital Tools for Business and Affordable Web Design. He has lectured at General Assembly, Galvanize, Impact HUB SF, Presidio Graduate School, the Haas School of Business and KQED. Continue reading →
My guest this week is Jeff Williams, co-founder and Chief Technology Officer at Contrast Security.
The reason that I wanted Jeff on the program is that his technology was massively interesting to me, given that application attacks are the single biggest vector for security breaches. In 2017 There will be 111 billion new lines of code produced resulting in endless complexity.
His product was an Innovation Sandbox Finalist at RSA this year. So I wanted to understand more.
I have tried to integrate application level firewalls and experienced working through real & hard human challenges of coders and network security people trying to defend and deploy at the same time I wanted to understand his technology better AND because iterative application development is going to be even more important for companies for their security to move at the pace of the business innovation and applications development and testing becoming more and more iterative and agile. So how do we do this? Continue reading →
My guest this week is Jim Linn, Managing Director of Information Technology of American Gas Association. In an association, this simply means he is the “top dog” with IT.
What is fascinating about my guest today is that he built his own ISAC (information Sharing and Analysis Center) from scratch to service his industry – Natural Gas, which is part of the critical infrastructure of the US. He is the Executive Director for the Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC).
By Far Jim has the most industry certification I have ever seen:
B.S. degree in Computer Systems Management from Drexel University and an M.B.A. from Drexel University
He is a Certified Chief Information Security Officer
Certified Information Systems Security Professional
Certified Association Executive
Certified Information Systems Auditor.
Jim is quiet spoken but as I talked with him the word WISDOM kept popping up for me. Continue reading →