Risksense: 7 Experts on Threat and Vulnerability Management
The book includes insights from the following experts: Nick Green, Senior Director Information Security for EMEA/APAC, Ticketmaster, In a Large Organization, Know the Risk Owners and Adapt to Their Needs >> Pieter VanIperen, Senior...
Workfront: 11 Marketing Technologists on Digital Transformation
The book includes insights from the following experts: Jennifer Adams, Director, Worldwide Marketing Operations, Bristol-Myers Squibb, Take a Full End to End View to Create True Digital Transformation >> Tracy Kapteyn, Vice President,...
Ismael Valenzuela: Move Beyond Vulnerability Detection And Mitigation To Actively Hunt Threats
Baselining networks and identifying vulnerabilities are important tasks, but organizations need to move toward more aggressive threat identification as soon as possible. Organizations must use technology to automate as many tasks as possible, but you also need that...
Josh Canary: Focus on the Future to Achieve CDM Success
The noise generated during the rollout of CDM can be overwhelming. Success results from ignoring that noise and applying solid project management skills to each CDM phase. CDM is a long-term project, and viewing the activities, processes and strategies for achieving...
Twistlock: 7 Experts on Cloud-Native Security
The book includes insights from the following experts: Daniel Newsome, Senior Web Architect, Zonar Systems, Work Incrementally, and Take Full Advantage of Cloud-Native Tools >> Dan Bowden, VP & CISO, Sentara Healthcare, Bake as Much into the DevOps Process...
Michele Thomas: Foresight and Information Sharing – The Keys to CDM Success
Think ahead, and share information with agencies that have already been through what you’re facing to find creative, effective ways to prepare for and manage the tasks ahead. Plan for each phase as if it were the initial rollout of any technology or capability. That...
Jim Piche: CDM Implementations Work Best With Strong Agency – Integrator Partnership
The goal is to establish a solid relationship between an agency and a CDM service provider, and then let them decide on the technology together, downstream of the initial contract award. An agency ultimately needs to have control over its cyber defense posture to meet...
Steven Hernandez: Manage For Security Now – And In The Future
When reviewing new applications, be sure that the services shown are the services that will be delivered without additional cost. Ensure your infrastructure is sufficient for whatever technologies you plan to implement. The responsibility for improving infrastructure...
Jeremiah Clifton: Emphasizing Risk Over Compliance Is A Challenging But Necessary Change
One great challenge for many organizations now implementing CDM is changing their security culture from a compliance focus to a risk-management focus. With CDM, risk management is a business problem, not just an IT security problem. "I believe we’re at CDM Phase 1....
Brian Zeitz: Scale Makes A Difference in CDM Implementations
VA’s biggest challenge has been the sheer size of the agency. VA’s Phase 1 implementation will be complete when administrators can look at something on the network and quickly see whether it’s normal or not. "I believe we’re at CDM Phase 1. We’re finding out...