Katherine Hallen: Better Collaboration Accelerates Innovation
What drives organizations to initiate workplace transformation projects?Is it financial concerns, a desire to emulate the innovative campuses seen at major tech start-ups, or a mandate to create cultural change within the organization? Under pressure to deliver...
Iron Mountain: 8 Experts on Workplace Transformation
The book includes insights from the following experts: Katherine Hallen, Director, Transformation Initiatives, Modern Workplace, Microsoft, Read the article here >> Erwin Chong, Head of Corporate RealEstate Strategy and Administration, DBSBank, Read the article...
Tony Evans: Optimization of the Security Stack is a Balancing Act
Tony Evans, CIO, Enloe Medical Center"A balance scorecard enables you to weighsecurity costs and business priorities so thatyou can make wise security investments." Securing complex IT environments depends on running a proactive security practice. To do that...
Ted Julian: Define Your Processes Before Trying to Automate Them
Ted Julian, VP Product Management & Cofounder, IBM Resilient"A key consideration when optimizing a security stack is making sure new technologies work with each other and with your existing tools." Security Orchestration and Automation platforms are emerging that...
Rick McElroy: Focus On Detection and Remediation Outcomes
Rick McElroy, Head of Security Strategy, Carbon Black, Inc."One of the best ways to reduce mean time to detect is to correlate all the data sets from security technologiesthroughout the environment, apply behavioral analysis to that correlatd data, and then drive...
Phillip Miller: Open APIs Are the Keys to Orchestration and Automation
Phillip Miller, Head of Infrastructure & CISO, Brooks Brothers"When choosing technologies for your security stack,a fundamental criteria should be the availability ofopen APIs." Effectively collecting and correlating all that data depends on interoperability in...
Joseph Weinberg: Remove Multiple Dashboards Through Better Integration
Joseph Weinberg, Strategy & Architectural Leader—Global Cybersecurity, Luxury Hospitality Company"An effective optimization strategy is to eliminatedashboards and integrate as much as possible." It’s important to integrate data from various tools in the...
James Carder: Automation and Correlation are Key
James Carder, CSO & VP, LogRhythm Labs, LogRhythm"Core security operations include network detection and response, endpoint detection and response, and correlation of data from all the technologies in the security stack." Before building out your security stack,...
Dan Bowden: A Strategy Matrix Helps Set Priorities
Dan Bowden, VP & CISO Sentara Healthcare"To effectively correlate activity and identify events, you need tools with analytics capabilities." Before building out your security stack, understand where you are and where you have to go. Perform a capabilities...
Carbon Black: 8 Experts on Optimizing Your Security Stack
The book includes insights from the following experts: Dan Bowden, VP & CISO, Sentara Healthcare, A Strategy Matrix Helps Set Priorities >> James Carder, CSO & VP, LogRhythm Labs,LogRhythm, Automation and Correlation are Key >> Joseph...