Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Demonstrating the value of security: an interview with HP’s Jim Tiller

Lock1.pngJim Tiller, Director of Security Consulting, joined HP Enterprise Security Services two years ago. In this short extract of an in-depth interview, he tells us why he came to HP and some of the guiding principles of effective enterprise security.

 

To read the entire interview, check out the latest issue of HP INFORM, an HP Enterprise Security Services eBook.

The HP World Tour docks in Sydney August 28

worldtour.jpgThe sails are up, the course is set, and the HP World Tour docks next in Sydney on August 28. The fantastic journey—sailing through Mexico City, Toronto, Sao Paulo, Tokyo, Singapore and Mumbai—continues to the Australian Technology Park in Eveleigh, Sydney.

 

Read just a few of the highlights.

 

Managing cybersecurity risks in an increasingly connected business environment

9600P_S3V1_Slate_092 copy.jpg“BYOD” or “Use-Any-Device” trends are driving change at an enterprise IT level – affecting the consumerisation of IT and the blurring of the lines between the use of personal and work devices. Set against the context of these trends there remains an over-riding requirement to protect corporate IP, without impacting on functionality or how employees can go about their roles.

 

Fundamentally, when it comes to cyber security, the problem to solve is the problem of complexity. HP New Zealand Chief Technology Officer, David Eaton, shares his views on how to manage cyber security risks in an increasingly connected enterprise environment.

Have cybersecurity questions? Art Wong, SVP, has answers.

art.JPG56 percent of companies have been the target of a cyber-attack and on average, it takes 243 days before a company even realizes their systems have been breached.

 

Please join Art Wong, Senior Vice President and General Manager of HP Enterprise Security Services on Wednesday, July 23, 2014, 11:00 AM PT / 2:00 PM ET to discuss how cyber criminals are gaining data to your virtual assets and how to catch them before they get away. During this free, online event, you can ask Art your most pressing security-related questions in real time!

The Changing Role of the CISO: Risks, Trends, and Disrupters

CISO report.JPGRecent research by HP states in 2013 data breaches increased 30 percent year-over-year—and 80 percent of applications reviewed showed compromises due to avoidable misconfigurations. Despite improvements, this latest data suggests that applications continue to be a vulnerability point for organizations worldwide.

 

Read to gain practical insight from thought leaders on best practices for security management, as well as strategic tactics and measurements for delivering intelligent security and agility.

Search
Showing results for 
Search instead for 
Do you mean 
Follow Us


About the Author(s)
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation