Are you given a hard ‘No’ on implementing new technologies? Do you end up circling back and addressing security concerns after implementation? Do you see significant annual savings in moving to open-source technology, but worry about the security risks? Regardless of your challenges, this session will show you a path to moving forward. There exists a method by which any IT Security organization, regardless of size, can develop compliant patterns for modern technologies. We’ll discuss the overall strategy and walk through 3 real-world examples where teams worked this strategy, overcame various challenges, and delivered repeatable solutions.
- Adoption is key - this is NOT Field of Dreams
- There's no hope in poorly defined scope
- Shoot for the same direction - the right direction doesn't exist
About Stephen Podobinski
Stephen is a business-minded security professional adept at designing and delivering secure solutions to a wide range of complex business problems. An accomplished leader across numerous technical and business functions, he is dedicated to leading delivery of results aimed toward maximizing the benefit to the enterprise as a whole. Diverse experiences in all aspects of information security—from encryption-solution implementation to compliant technology-pattern design and development—give Stephen the perspective to set strategic goals and help teams realize success. As the Business Information Security Officer over all of a Fortune 50’s data he specializes in effort prioritization, securing support & resources, and ensuring challenges are met with long-term solutions.