Speaking at the Westcon – Security and Beyond Conference – Park City, Utah

February 3, 2014 — 3 Comments

skiingIs Security Still an Opportunity in 2014?

This week we’re at the Westcon Security and Beyond Conference in Park City, Utah.  I’ll be speaking first thing Wednesday morning, delivering a keynote session on Moving from Vendor to Adviser, in the world of security.  14 years ago, my then current employer asked me if I thought SECURITY was still an opportunity for technology companies moving into the new millennium.  Not only is it still an opportunity…there’s a lot more out there for companies who understand the growing need and capitalize on it.

Digital Disruption Creates More Need

My session will focus on steps companies need to be taking to move up the ladder, accessing those responsible for the security and protection of company secrets, innovation, customer privacy, and the success of their 2014 initiatives…which will involve new trends in technology.  Expect to see more and more companies moving to the cloud – in a recent WSJ survey, IT people guessed that larger companies were running up to 50 different applications in the cloud.  When the WSJ went to the department level they discovered a much different story.   On average, large companies were running over 350 cloud applications – and IT has no idea where.  This is just one example that completely changes the security model and demands a look at the department level.

If your company engages in assessments, but is not spending a significant amount of time out in the departments, chances are you’re missing some of the biggest gaps.

CiSOs Are Becoming More Business Saavy

By business saavy, I don’t mean that CISOs are going back to school.  I mean the old style CISO is being replaced by business minded security leaders.  In my session we’ll be talking about what that means, and how solution companies should be changing their approach to align with these new business leaders.

Leveraging Assessments and Building Justification

Several related points will be covered – but one that stands out is the need to really understand the justification process.  I just read a post updating the Target credit card thefts this past December.  In it, John Stengel shares that this attack was done through a third party vendor.  No surprise here – but in his post he also notes another company that refused to do an assessment due to cost.  Whether you’re proposing an assessment, or following up with remediation recommendations – companies continue to delay due to budget. Learning how to create this justification is crucial. This is exactly what happened with TJM years ago.  I personally know sales people who tried to warn TJM that their wireless networks were open – it took 100 million credit card loss to wake them up.  The good news is, there are ways to build this justification and I’ll be covering some of them  this week.

For a more detailed look at this process, join us in the SVLC Insider’s Circle and attend my session online on Feb 10th.  For more details – (CLICK).

© 2014, David Stelzl

Advertisements

3 responses to Speaking at the Westcon – Security and Beyond Conference – Park City, Utah

  1. 

    Looking forward to it Dave!

Trackbacks and Pingbacks:

  1. Speaking at the Westcon – Security and Beyond Conference – Park City, Utah | Lou Guiga's Security Underground - February 4, 2014

    […] Speaking at the Westcon – Security and Beyond Conference – Park City, Utah. […]

  2. A Great Day to Kick Off Westcon’s Security and Beyond Conference « Dave Stelzl's Blog - February 4, 2014

    […] I mentioned in yesterday’s post, traditional approaches won’t work.  I wrote back in 2007, in my book, The House & the […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s