Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Archive for the ‘Security’ Category

The Changing Mobile Worker: Balancing Productivity and Security

Ken Stambaugh

Ken Stambaugh

Director, Global Client Computing, EMC IT
Ken Stambaugh
Ken Stambaugh

Latest posts by Ken Stambaugh (see all)

As an IT veteran, I have observed and helped drive tremendous change, not just in the technologies we use but how we use them. Among the more dramatic shifts has been the definition of being a mobile worker.

When I was a mainframe programmer in the late 80’s, being “highly mobile” meant I could log in at any mainframe terminal in the office, do my programming, submit my jobs to the queue and do my (internal only) email. Later, I had two desks in two different buildings and mobility became driving between them multiple times each day.  Virtual Private Network (VPN) technologies allowed me to be on call and dial in (literally via a phone-line) from home rather than having to get to the office.

The Internet made mobile work more bearable, but it still required a laptop or desktop.  By plugging my blackberry into my PC as a modem, I could work on the train to my office in Boston.

What really transformed mobility (or the trend of more employees working out of the office using mobile devices) for me was the iPhone (followed by the iPad and Android devices.) Not only was I in touch as frequently as I wanted to be via email capabilities, but the enormous ecosystem of apps allowed me to be productive in the ways that fit me best.  I was – and am – able to define how I work and where I work.  “Work” has stopped being the place I went to and instead became what I did.

(more…)

The CIO and the CISO: Evolving Security Together

EMC IT Proven

EMC IT Proven

EMC IT
IT Proven allows you to leverage EMC IT’s first-hand knowledge and best practices to accelerate your own IT transformation journeys, transforming operations and delivering IT as a Service through the power of cloud computing. IT Proven highlights how EMC IT transformed into an agile, innovative, and competitive service provider.

ccthumbnail2In an ongoing video series, EMC Chief Information Officer Vic Bhagat and EMC leaders discuss the changing landscape of IT. From maturing partnerships with the business to redefining IT to be more contemporary, Vic and his guests explore how the industry is evolving to maximize agility and improve responsive times to business demands.

The latest edition of the Coffee in the Café with Vic Bhagat featuresDave-Martin---Headshot2 EMC Chief Information Security Officer Dave Martin, who offers a look into how EMC is taking a new approach to data protection — leveraging the latest in analytics and other predictive tools – while maintaining a positive, more functional user experience.

(more…)

Electric Gadgets, Space Junk and Cyber Security: Purging Obsolete IT Controls

As we in IT security scramble to put more and better controls in place to combat a changing array of cyber threats, we as an industry are facing an interesting dilemma: How do we assess the usefulness and value of all the controls we have deployed over the years and continue to have in place?

After all, as I talk to people across the cyber security industry, I almost never encounter anyone who can tell me a story about having turned off a security control once they turned it on.  Yet, with the changing threat landscape, we clearly need to be adding new security technologies and processes to our already substantial arsenal.
(more…)

Building the Security Team of Today and Tomorrow

Dave Martin

Dave Martin

Vice President and Chief Security Officer at EMC

Technologies such as mobile, social networking, analytics and cloud computing are changing the security landscape, and security technologies are rapidly evolving to address that change.

It’s not just the technology that needs to change, however: security teams need to change as well.

EMC has evolved and must continue to evolve our security team to effectively combat the threats of today and tomorrow. The core skills essential to expand include business engagement and awareness; a consultative approach; the ability to sell or “market” security; and creative control design for the mobile and cloud-enabled world of tomorrow.

(more…)

Changing Security Behaviors: How Marketing Savvy Can Break Patterns

Data-hacking hound dogs beware. EMC recently got a little help from Elvis in battling cyber criminals.

The “King” was at the center of an integrated marketing campaign our Global Security Operations ran this spring to encourage IT users to avoid clicking on suspicious email links that could lead to phishing attacks on our company’s data.

The several-week advertising effort featured a videotaped parody of the Elvis Presley song “Suspicious Minds,” in which ITers acted out why users shouldn’t click on “Suspicious Links,” It also featured a security awareness contest.

The campaign resulted in more than double the number of users reporting phishing attempts via suspicious emails. It also substantially increased the number of users going to our security awareness site, which we call FirstLine in recognition of the fact that the actions of IT users are the first line of defense against cyber-attacks.

(more…)

Balancing Privacy and Productivity

Vic Bhagat

Vic Bhagat

Executive Vice President, Enterprise Business Solutions and CIO at EMC Corporation
Vic Bhagat

As if we didn’t have enough examples this year, the “Corporate Boards Race to Shore Up Cybersecurity” article in The Wall Street Journal reinforced one of our greatest challenges as CIOs and CISOs. How can we enable our business to be more agile and successful, while minimizing risks and protecting our company, intellectual property and customers?

Previously, everyone used the same kind of computers on the same corporate network in the same offices. Alas, those days are gone. Today, we aren’t just defending against denial of service attacks – we are vigilantly protecting our companies from more organized, persistent threats to infiltrate our environment and exfiltrate our intellectual property. On the flipside, we must mitigate risks with a more mobile, global and social workforce that expects their IT capabilities at work to mirror the IT experience they have in their personal lives.

(more…)

How To Increase Confidence in IT? Foster Better Communication with the Business

EMC IT Proven

EMC IT Proven

EMC IT
IT Proven allows you to leverage EMC IT’s first-hand knowledge and best practices to accelerate your own IT transformation journeys, transforming operations and delivering IT as a Service through the power of cloud computing. IT Proven highlights how EMC IT transformed into an agile, innovative, and competitive service provider.

Today, enterprises are facing more cybersecurity threats and risks than ever before, demanding more resources from both IT organizations and their associated businesses. Yet, the confluence of decision making from the business and the financial, technological and security requirements from IT remain a source of conflict for many organizations. They key to reaching a resolution? Communication, says Dave Martin, EMC’s Chief Security Officer, who offered five tips to getting started in his recent blog for Forbes Magazine.

The 2013 Global IT Trust Curve Survey, published by EMC and RSA, dives deeper into the hurdles facing IT and business leaders.  Also check out a previous blog from Doug Graham, Senior Director, Global Security Office – Risk Management at EMC, who discussed Communicating Risk Management in the Face of Constant Threats.

Securing the Cloud: Work With Users to Build Best Practices

Steen Christensen

Steen Christensen

Director, Information Security, Global Services at EMC
Steen Christensen

Latest posts by Steen Christensen (see all)

In today’s rapidly changing IT world, business users in your organization are going to seek the agility and increased capabilities of the cloud whether or not your IT operation sanctions it. So your efforts to provide IT security in the cloud need to start with embracing that fact and working to build secure practices from there.

In EMC’s Global Security Organization, we found that the best way to secure the cloud is to actually become a part of it rather than trying to fight it. As a part of the solution, you can build better, secure offerings that will allow you to protect your data and get a better experience for the user.

For the past nine months, GSO has been identifying shadow IT applications (or business-managed IT) in the cloud using a security monitoring appliance, RSA NetWitness, in conjunction with increased security analytics.  This gives us a comprehensive view of our network traffic, including shadow IT.  And rather than blocking those shadow users from continuing their cloud-based operations, we work with them to provide IT-controlled solutions that will still serve their business needs in a secure way.

(more…)

Striving To Be Less Necessary: Developing Future Security Leaders Is Crucial

I would no doubt turn a few heads if I said, “I’m trying really hard to get to the point where I make no decisions and do no work.” But the fact is, if I ever got to that point as Senior Director for EMC’s Global Security Office, I would be an extremely effective leader by developing my team to lead without me.

I don’t expect to get to that state of leadership obsolescence any time soon. However, I know that a crucial part of being a leader in today’s new Information Security paradigm is working to develop future leaders in our organizations. And one of the hardest things about leading is developing leadership skills in others because as you do, you frankly become less necessary.

Those are some of the points I explored in a workshop about Developing Cross Functional Leadership Skills at the 2014 RSA Conference in San Francisco.

While I am sure that many of the conference attendees will be there to learn new technical skills to be better leaders, these skills are only one of many ways leaders gain power and influence in their organizations.

(more…)

2013 Global IT Trust Curve Survey: The Impact On Today’s IT Decision Makers

EMC IT Proven

EMC IT Proven

EMC IT
IT Proven allows you to leverage EMC IT’s first-hand knowledge and best practices to accelerate your own IT transformation journeys, transforming operations and delivering IT as a Service through the power of cloud computing. IT Proven highlights how EMC IT transformed into an agile, innovative, and competitive service provider.

TrustIT

 

 

 

 

 

 

Today, EMC and RSA announced the results of the first-ever Global IT Trust Curve Survey. Through a survey of 3,200 IT and business decision-makers in 16 different countries and 10 industry sectors, EMC took the pulse of C-suite audiences and their awareness and opinions of EMC Trust IT — Advanced Security, Continuous Availability and Backup & Recovery.

(more…)