Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Learn more about lowering your security risk at HP Discover - 5 simple steps

HP Discover kicks off in Las Vegas on Tuesday and there’s a huge amount of exciting and insightful information on offer for those interested in Security & Risk Management. To make your life easier, I thought I’d compile a list of the top 5 things to do if you want to learn how HP can help lower your risk and increase your security posture.


CT_RESEARCHLAB_0111_R2-small.jpg1. Attend Art Wong’s session on ‘Get aligned or left behind: drive innovation and growth through security’ at 3:00pm on Wednesday June 12th – BB3407. Art is SVP Enterprise Security Services at HP.


2. Listen to a case study presentation from GE’s very own Jason Georgi, IT Leader – Networking Services titled ‘Global web security for a connected enterprise’. The session starts on Wednesday at 1:30pm (BB4197) where Jason will discuss the provision of internet access to employees and partners anytime, anywhere and on any device.


3. Visit us in the Security & Risk Management Discover Zone on the show floor to see a Security Operation Center in action! With real world scenarios this will be an eye opener on how HP monitors and responds to security incidents for hundreds of clients around the world.


4.  Sign up for our Security Discovery Workshop taster session where you can learn what information security risk means to your organization. The workshops involve:

  • Rapidly developing a heat map showing where your information security issues lie.
  • Reaching a consensus on how to deal with those issues.
  • Putting together a time-defined plan for strategic action to deal with issues.

5.   Speak with an expert! We have a number of subject matter experts for security available for 1:1 meetings. Stop by our Security & Risk Management booth to schedule a meeting.


If you’re attending HP Discover and interested in Security, these are the key things you don’t want to miss. Enjoy the show!


Check out these resources for more HP Discover details: 

Follow HP Discover at: 



Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
About the Author
About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.

Follow Us