Carl Bradley – U.S. Navy (Ret.), Information Assurance & IT Security Advisor Consulting & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Bradley discusses the full breadth and depth of the HP Enterprise Security Consulting portfolio of services which affords federal clients with customized consulting services designed to assess, advise, transform and manage their enterprise IT security programs. Through the use of experienced IT consultants, clients can leverage the right technology and services to improve their current and future risk posture, minimize complexity and apply a more proactive approach to enterprise security.
Mr. Fred Duball, Data Center Practice Principal, Workload and Cloud Solutions, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Duball told us, “Many of our clients know that HP has a strong legacy of IT infrastructure support; we have more than 80 data centers worldwide supporting more than 1,300 customers. But here’s what makes the Mid-Atlantic Data Center (MDC) different—we have enhanced our security and compliance posture to accommodate and support the critical needs of the U.S. Federal Government, as well as commercial companies requiring stronger measures. The HP Mid-Atlantic Data Center has been designed to provide customers with high levels of security, reliability, compliance and cost effectiveness. In fact, the U.S. government has designated this facility as being a part of our nation’s critical infrastructure, guaranteeing priority restoral of services in the event of a natural or manmade disaster.
Stu Hammer – USPS Application Services Practice Leader , HP Enterprise Services, U.S. Public Sector. In this article, Mr. Hammer discusses how application modernization has become imperative to enterprise IT as the maintenance of “mature” applications has increased and consumes a disproportionate share of resources. He walks through how to align critical applications and infrastructure to your overall modernization program to help you address risk, optimize benefits, and prioritize the business needs of your applications.
John Diamant – Secure Product Development & Application Security Strategist, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Diamant discusses how software isn’t just in computers anymore, but also within the Internet of Things such as credit cards, phones, door locks, sensors, and more. The article addresses how to create resilient software as today more than ever, enterprises must build security into every phase of the Software Development Life Cycle (SDLC) to ensure the proper security levels to withstand cyber-attacks.
Diana Zavala – Director, Analytics and Data Management, HP Enterprise Services, U.S. Public Sector.
In this article, Ms. Zavala discusses how we live in a new era of accelerated innovation. With the rise of new technologies and platforms such as social media, cloud and mobility, governments and citizens are engaging in new ways, utilizing new types of data. The ability to harness this information and extract insight from it, remains key to enhancing enterprise-wide operational efficiency and making actionable decisions to better serve citizens and constituents.
George Romas – Technical Director, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Romas discusses how the automation of daily tasks – both personal and business - impact the enterprise-wide cybersecurity environment. With processors and sensors everywhere that can pinpoint your location, behavior, preferences, schedule, etc., the article touches on the additional considerations needed to protect the enterprise.
Mr. John Felker
Director, Cyber & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector.
In this article, Mr. Felker discusses the mandates critical infrastructure owners are under to meet reliability and performance goals while successfully addressing the myriad of today’s cyber threats. As the threat landscape continues to evolve, so too will the need for increased dialogue between cyber and physical security practitioners, in order to enhance cyber awareness and the ability to respond to issues faster.
Mr. Rob Wigley
Director, Cybersecurity Consulting Services, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Wigley discusses organizational needs for an effective risk management program supported by senior management, with a strong governance structure, integrated across all business processes, in order to avoid costly risks that could impact agency mission and goals.
Mr. Bryan Coapstick – Director, Mobile Innovations, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Coapstick discusses the increasing business need to develop and implement a secure mobile strategy to enhance the delivery of goods and services through an optimized user experience.
Mr. Anil Katarki – Chief Information Security Officer (CISO), HP Enterprise Services, U.S. Public Sector. In this article, Mr. Katarki discusses today’s cybersecurity trends and challenges facing enterprise organizations and how government agencies can better leverage their IT expenditures to effectively manage risk and vulnerabilities.
Ed Keegan – Director, Cybersecurity Strategies & Portfolio, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Keegan discusses Continuous Monitoring and how it represents the maturation of information technology and how the automated, continuous auditing of the cyber environment can help ensure proper security control configuration and proactive IT monitoring for threats and vulnerabilities.
Steve Lazerowich – Director, Cybersecurity Solutioning, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Lazerowich discusses securing the enterprise organization from inside out “defense in depth” – a multi-layered approach to protecting beyond the security perimeter.
John Diamant – Secure Product Development Strategist & U.S. Public Sector Application Secure Strategist, HP Enterprise Services. In this article, Mr. Diamant discusses the growing business need to architect and design security in up front during the application development process in order to avoid costly application security vulnerabilities and weak enterprise security links.
Scott Gaydos – Chief Technologist, Federal Healthcare, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Gaydos discusses the use of Real-Time Location System (RTLS) solutions aimed at improving clinical and administrative workflows, reduce expenses and improve efficiencies. He also addresses concerns regarding the protection of sensitive data, information and systems in the pursuit of reducing financial theft and fraud.
Todd Musselman – Senior Manager, Global Identity Practice, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Musselman discusses the increasing need for Identity and Access Management controls to mitigate risk, reduce fraud and defend against internal and external security threats.
Navy Rear Adm. (Retired) Betsy Hight – Vice President, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector. In this article, retired Navy Rear Adm. Hight, discusses the breadth and depth of HP’s cybersecurity portfolio as it aligns to our customers business and mission objectives, along with the company’s service excellence and overall security methodology.