Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

In the world of information security, “breach” is a four letter word

As we all know, technology has changed the way we work and communicate.   In fact, as I’m writing this post, I am sitting in a coffee shop enjoying a warm mocha on a cold day in Texas. 


Looking around the shop, I see a host of potential issues that illustrate some of our challenges.


security breach management laptop coffee shopThere’s the guy that just left his laptop open (and logged in!) while he stepped outside to take a call on his mobile. There’s the  “mysterious gent” in the back corner that just seems to be ‘observing’ everyone in the shop.  Not to be disparaging, but he’s giving me the creeps. And, there’s the young lady next to me chatting with her friend about how “awesome” it is that you can just jump on free wi-fi “just about anywhere!”  “So cool”, her friend replies, “but I hate it when you have to log in!”


Oh, those pesky passwords. 


But, I have to admit…it is kind of cool.  But, for those of us in the industry, it’s terrifying as well. 


The potential for proprietary information to end up with the wrong people is increasing minute to minute.  New devices, new networks, new attackers, new employees…you know the situation.  IT departments everywhere are adapting to keep up.  But, as you adapt, more vulnerabilities are exposed, and potentially exploited. 


Today’s reality is this:  It’s no longer a question of ‘if’ you’ll experience a data breach, but ‘when’.  How you respond could be a defining moment for your organization. 


In an effort to help organizations respond effectively, HP just launched a new solution set that will help get you started.  The HP Security Breach Management Solution identifies a set of services that will help you address a breach in progress (and resolve it quickly), manage the impact, and build an ongoing strategy to get out ahead of the next one. 


Take a look at some of the resources for the new solution:


Solution Overview Brochure

HP Forensic Readiness Services factsheet

Breach Management Live Webinar

Harlan Carvey(anon) | ‎04-11-2013 07:24 PM

How you respond could be a defining moment for your organization.


Exactly!  As an incident responder, I have seen this in action time and time again.


Consider PCI forensic assessments, for example.  When I would show up to assist organizations with these breaches, I often saw panic and disarray.  More often than not, these breaches were expensive in a number of ways...overtime for employees, additional time for consultants/responders, notification costs, fines from compliance/regulatory bodies, etc.  For organizations that took incident preparedness seriously, these costs were significantly reduced.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
About the Author
About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.

Follow Us