Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

Board level security concerns need proactive risk management

Corporate America says data security is now the main concern in the boardroom when it comes to legal considerations, says Antony Savvas in this ComputerworldUK article, titled US boardrooms wake up to data security. This position is based on a survey of 11,000 public company directors and 2000 general counsels who rank data security as their top corporate fear. "We would better get security right," says HP Security Strategist Mary Ann Mezzapelle in her keynote at the recently held Open Group Conference at Newport Beach, CA. Mezzapelle asserts that proactive risk management is the approach that most effectively combats the rising concerns across various dimensions of security. But how proactive can enterprises be?

Are your frameworks secure enough to combat criminal minds?

Enterprises view the adoption of standardized security frameworks as a panacea, addressing the challenges posed by our adversaries in the world of security. But are these security frameworks adequate? Do they inherently combat innovative criminal minds, which are constantly at work planning the next wave of attacks? Art Gilliland, Senior Vice President, and General Manager, HP Software Enterprise Security Products, says these frameworks are not only inadequate, but also set a low bar for enterprises, giving the enterprise a false sense of security. This message comes across loud and clear in Gilliland’s preview of his session on "Criminal Education: Lessons from the Criminals and their Methods" at the 2013 RSA Conference.

The current and future state of security at the 2013 RSA Conference

The annual RSA Conference brings together a wide array of perspectives from industry leaders in security. As such, it functions as a bellwether for all things security. Like other conferences, the keynote abstracts characterize the major themes in the conference providing, us valuable insight into the current and future state of security.

Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.