George Romas – Technical Director, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Romas discusses how the automation of daily tasks – both personal and business - impact the enterprise-wide cybersecurity environment. With processors and sensors everywhere that can pinpoint your location, behavior, preferences, schedule, etc., the article touches on the additional considerations needed to protect the enterprise.
Mr. John Felker
Director, Cyber & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector.
In this article, Mr. Felker discusses the mandates critical infrastructure owners are under to meet reliability and performance goals while successfully addressing the myriad of today’s cyber threats. As the threat landscape continues to evolve, so too will the need for increased dialogue between cyber and physical security practitioners, in order to enhance cyber awareness and the ability to respond to issues faster.
Mr. Rob Wigley
Director, Cybersecurity Consulting Services, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Wigley discusses organizational needs for an effective risk management program supported by senior management, with a strong governance structure, integrated across all business processes, in order to avoid costly risks that could impact agency mission and goals.
Mr. Bryan Coapstick – Director, Mobile Innovations, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Coapstick discusses the increasing business need to develop and implement a secure mobile strategy to enhance the delivery of goods and services through an optimized user experience.
Mr. Anil Katarki – Chief Information Security Officer (CISO), HP Enterprise Services, U.S. Public Sector. In this article, Mr. Katarki discusses today’s cybersecurity trends and challenges facing enterprise organizations and how government agencies can better leverage their IT expenditures to effectively manage risk and vulnerabilities.
Ed Keegan – Director, Cybersecurity Strategies & Portfolio, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Keegan discusses Continuous Monitoring and how it represents the maturation of information technology and how the automated, continuous auditing of the cyber environment can help ensure proper security control configuration and proactive IT monitoring for threats and vulnerabilities.
Steve Lazerowich – Director, Cybersecurity Solutioning, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Lazerowich discusses securing the enterprise organization from inside out “defense in depth” – a multi-layered approach to protecting beyond the security perimeter.
John Diamant – Secure Product Development Strategist & U.S. Public Sector Application Secure Strategist, HP Enterprise Services. In this article, Mr. Diamant discusses the growing business need to architect and design security in up front during the application development process in order to avoid costly application security vulnerabilities and weak enterprise security links.
Scott Gaydos – Chief Technologist, Federal Healthcare, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Gaydos discusses the use of Real-Time Location System (RTLS) solutions aimed at improving clinical and administrative workflows, reduce expenses and improve efficiencies. He also addresses concerns regarding the protection of sensitive data, information and systems in the pursuit of reducing financial theft and fraud.
Todd Musselman – Senior Manager, Global Identity Practice, HP Enterprise Services, U.S. Public Sector. In this article, Mr. Musselman discusses the increasing need for Identity and Access Management controls to mitigate risk, reduce fraud and defend against internal and external security threats.
Navy Rear Adm. (Retired) Betsy Hight – Vice President, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector. In this article, retired Navy Rear Adm. Hight, discusses the breadth and depth of HP’s cybersecurity portfolio as it aligns to our customers business and mission objectives, along with the company’s service excellence and overall security methodology.