Joel Cardella
Who am I?
ļ‚ž Joel Cardella
ļ‚ž Over 20 years in IT in various capacities
– infrastructure operations & data
centers, sales support, network ops,
security
ļ‚ž Email: jscardella@gmail.com
ļ‚ž Twitter: @JoelConverses
Fear, Uncertainty and Doubt (FUD) can no
longer be the fait accompli of the security
world to try and drive good security
decisions.
fait acĀ·comĀ·pli
ˈfet əkƤmˈplē,ˈfāt/
noun
a thing that has already happened or been decided before those affected
hear about it, leaving them with no option but to accept.
"the results were presented to shareholders as a fait accompli"
http://securityintelligence.com/cost-of-a-data-breach-2015/#.ValJ7vlVhBc
• The average cost paid for each lost or stolen record containing sensitive
and confidential information increased 6 percent, jumping from $145 in
2014 to $154 in 2015.
• The lowest cost per lost or stolen record is in the transportation industry, at
$121, and the public sector, at $68.
• On the other hand, the retail industry’s average cost increased
dramatically, from $105 last year to $165.
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-
hacks/
Number of
records
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-
hacks/
Data sensitivity
http://daveshackleford.com/
http://daveshackleford.com/
http://daveshackleford.com/
http://daveshackleford.com/
http://daveshackleford.com/
BSIDES DETROIT 2015: Data breaches cost of doing business
Michael Lynton, CEO of Sony Entertainment Inc
In a December [2014] interview with National Public Radio, Lynton insisted
his company was ā€œextremely well prepared for conventional
cybersecurity,ā€ but faced ā€œthe worst cyberattack in U.S. history.ā€ He has
repeatedly described it as a ā€œhighly sophisticated attack.ā€ Sony Pictures
provided written responses to questions through Robert Lawson, its chief
spokesman. He says Lynton has no plans to fire or discipline anyone. The
CEO’s reasoning rests on the belief that because Sony’s assailant was a
foreign government, with far more resources than a renegade band of
hackers, what happened was unstoppable. The studio simply faced an
unfair fight.
http://fortune.com/sony-hack-part-1/
If the data represents you, you are the owner.
The company hosting it, or collecting it, or buying it from a
clearinghouse is merely the custodian. And as a custodian they
have fiduciary responsibilities to that data, but they also
have financial obligations to their investors and shareholders.
So, in that equation, Mr and Mrs Data Owner suffer the downside of
risk.
BSIDES DETROIT 2015: Data breaches cost of doing business
These are all things I tried and
did not succeed with
ļ‚ž Don’t refer to security as an insurance
model
ļ‚ž Don’t use standards that don’t map to
your industry, or use apples & oranges
comparisons
ļ‚ž Don’t confuse compliance with security,
and don’t discuss them in the same
context – separate the words and define
them differently
BSIDES DETROIT 2015: Data breaches cost of doing business
What do we do?
ļ‚ž Pivot
ļ‚— This can be (sometimes should be) very obvious
ļ‚ž Understand what your ROI is
ļ‚— E.g. If the penalty for non-compliance is $X,
then we spend $Y to offset it
ļ‚— X < Y = Positive ROI
ļ‚— X > Y = Negative ROI
ļ‚— X = Y = ROI needs to be evaluated
ļ‚ž Other ROI can be more complex, and need
their own models
What to do?
ļ‚ž Treat Cybersecurity as a Business
Risk
ļ‚— And start referring to it as business risk
ā—‹ Example: SGRC
ļ‚— Ask how your business assess risk and
pattern a model that follows it – show execs
what they are used to seeing
ļ‚— Engage your peers and superiors on risk
topics – use what is in the media as a
conversation starter
ļ‚— This is where ROI begins
What to do?
ļ‚ž Build the path to awareness by your
leadership
ļ‚— Prepare reports on what’s going on in the
industry around you – execs love to know
how they are ding compared to those
around them
ļ‚— Start with the next level manager, or
managers in other departments –
sometimes it’s a journey not a ladder
ļ‚— This is where ROI is discussed
What to do?
ļ‚ž Learn from the past mistakes of others
ļ‚ž This is where ROI is proven
ļ‚ž Example of Sony:
ļ‚— Sony’s email-retention policy left up to seven
years of old messages on servers, unencrypted
ļ‚— The company was essentially using email for
long-term storage of business records,
contracts, and documents saved in case of
litigation.
ļ‚— An array of sensitive information—including user
names and passwords for IT administrators—
was kept in unprotected spreadsheets and Word
files with names like ā€œComputer Passwords.ā€
What to do?
ļ‚ž Be prepared! Know your data and
know what it takes to protect it – but
let someone else make the risk
decision on it
ļ‚— This requires emotional detachment!
ļ‚— This is where ROI is defended
What to do?
ļ‚ž Network! Network! Network!
ļ‚— Come to community meetups and cons
ļ‚— Come to local group meetings (#misec)
ļ‚— Engage on Twitter, or other social mediums
ļ‚— Forum discussions
ļ‚— Ask questions, share info
ļ‚— SWIPE
ļ‚— This is where ROI can be enhanced
Functional Area Key functions How we achieve it Business value
Security • Ensure proper controls for
systems and data access
• Ensure Confidentiality of
business data
• Ensure business data is
resistant to unauthorized
change
• Investment in security
technologies
• Multi-layer defensive strategy
• Segregation of duties controls
in SAP and other business
critical systems and
applications
• Ensure logical separation of
critical data
• Business can operate within
acceptable tolerance of risk
• Enterprise ā€œcrown jewelsā€ are
protected from malicious
threats
• Confidence in data is
increased, business decisions
have greater value
Governance • Ensure global and regional
directives and standards are
in place for all NASC and
relevant business processes
• Global ISMS participation
• Policy creation and
documentation
• Reviewing and approving
standards and practices
• Ensures the effective and
efficient use of IT Security in
enabling the business to
achieve its goals
• Ensures alignment with global
governance
Risk • Reduce enterprise risk
• Stay abreast of new risks and
threats
• Business continuity planning
and system availability
planning
• Ongoing risk assessments for
both IT and business
• Continually manage threats in
constantly changing threat
landscape
• Proactively test systems for
vulnerabilities
• Investment in risk
technologies
• Business continuity planning
for recovery of data and
continuation of business in
disaster situations
• Business can run with
reduced risk, allowing more
innovation and growth
• Newly emerging threats can
be dealt with more quickly
• Recovery capabilities for
outage situations can be dealt
with quickly, allowing for
minimal business interruption
Compliance • Ensure compliance activities
for regional and global
directives are met
• Ensure Legal mandates are
met
• ICS activities
• Interfacing with IT, global and
business auditors on all audits
• Interfacing with Legal
• Ensure follow up on audit
findings
• Internal Controls Systems
mandates are met
• Legal mandates are met
• Understanding of audit risks
and findings, help with
mitigation
Critical Success Factors • Confidentiality, Integrity and Availability of data is
managed to business expectation
• Providing cost effective security controls and risk
mitigation
• Proactively addressing security improvements and
mitigations where required
• Improve recovery capability
Key Activities • Managing audit findings as a tool for improving security
posture and maturity
• Execute control activities for governance and compliance
• Continually assess risk and validate mitigations and
controls
• Disaster/continuity planning and recovery planning
• Assess vulnerabilities, mitigate and manage emerging
threats
Key interfaces • Global IT security
• Project management
• Regional and global auditors
• External auditors (E&Y, PwC)
• Legal, both regional and global
• Corporate Communications
• Business units, all LOBs and process areas
• Executive management
• IT Security community
Guiding Principles 1. Focus on the Business
2. Comply with Relevant Legal and Regulatory
Requirements
3. Evaluate Current and Future Information Threats
4. Adopt a Risk-based Approach
5. Protect Classified Information & Ensure Proper Use
Layered security model
26
Perimeter defense
(hardware firewall,
intrusion detection)
Managed security
services, security threat
detection
Windows Firewall,
patching (software)
Anti-Virus
Measures
End User
Access
Controls
Critical
business
data
Hardware, restricts network
access from the internet
Software to restrict access,
patching to deal with known
vulnerabilities
End user awareness
training, strong passwords,
dual factor authentication
Services partner watches all
network activity, looks for
suspicious activity
Anti-virus blocks known
threats
Access controls restrict access
to the critical systems, manage
SOD conflicts
Final thoughts
ļ‚ž Remember, your job is to LOWER the risks of
doing business. Do so using positive ROI.
ļ‚ž Emotionally detach yourself from the things
that drive you nuts as an infosec admin or
manager.
ļ‚ž Understand you are there as an advisor, a
counselor. When you make decisions in this
capacity, you become trusted. You are no
longer a gatekeeper. Gatekeeper =
compliance.
ļ‚ž But keep in mind: your business can do
business without security. It’s high risk, but if
the benefits outweigh the risks…
Who am I?
ļ‚ž Joel Cardella
ļ‚ž Over 20 years in IT in various capacities
– infrastructure operations & data
centers, sales support, network ops,
security
ļ‚ž Email: jscardella@gmail.com
ļ‚ž Twitter: @JoelConverses

More Related Content

PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PDF
Security and SMBs
PDF
Mergers and Acquisition Security - Areas of Interest
PPTX
Best practices to mitigate data breach risk
PDF
M&A security - E-crime Congress 2017
PDF
Dynamic Cyber Defense
PPT
Presentation to Irish ISSA Conference 12-May-11
PPTX
William A. Tanenbaum Association of Benefit Administrators April 2015
Protecting the Crown Jewels – Enlist the Beefeaters
Security and SMBs
Mergers and Acquisition Security - Areas of Interest
Best practices to mitigate data breach risk
M&A security - E-crime Congress 2017
Dynamic Cyber Defense
Presentation to Irish ISSA Conference 12-May-11
William A. Tanenbaum Association of Benefit Administrators April 2015

What's hot (18)

PDF
Looking Forward - Regulators and Data Incidents
PDF
2011 SC Magazine Insider Threat Keynote
PDF
Cybersecurity for Energy: Moving Beyond Compliance
PDF
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
PPTX
NZISF Talk: Six essential security services
PPTX
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
PPTX
New CISO - The First 90 Days
PDF
Responding to a Data Breach, Communications Guidelines for Merchants
PPTX
Cybersecurity Risks for Businesses
PPTX
Cybersecurity Risk Governance
PPTX
Cybertopicsecurity_3
PDF
What it Takes to be a CISO in 2017
PPTX
Helen Patton - Cross-Industry Collaboration
PPTX
A guide to Sustainable Cyber Security
PDF
Cyber security do your part be the resistance
PDF
Energy Industry Organizational Strategies to Increase Cyber Resiliency
PDF
Robert beggs incident response teams - atlseccon2011
PDF
NESCO Town Hall Workforce Development Presentation
Looking Forward - Regulators and Data Incidents
2011 SC Magazine Insider Threat Keynote
Cybersecurity for Energy: Moving Beyond Compliance
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
NZISF Talk: Six essential security services
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
New CISO - The First 90 Days
Responding to a Data Breach, Communications Guidelines for Merchants
Cybersecurity Risks for Businesses
Cybersecurity Risk Governance
Cybertopicsecurity_3
What it Takes to be a CISO in 2017
Helen Patton - Cross-Industry Collaboration
A guide to Sustainable Cyber Security
Cyber security do your part be the resistance
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Robert beggs incident response teams - atlseccon2011
NESCO Town Hall Workforce Development Presentation
Ad

Similar to BSIDES DETROIT 2015: Data breaches cost of doing business (20)

PPTX
INFRAGARD 2014: Back to basics security
ODP
CISSP Week 9
PDF
Building an effective Information Security Roadmap
PPTX
Selling security to the C-level
PDF
MacIT 2014 - Essential Security & Risk Fundamentals
PDF
Information Security Management 101
PPTX
D1 security and risk management v1.62
PPT
MIS chap # 9.....
PPTX
Top Cybersecurity Challenges Facing Your Business
PPTX
Your data is your business: Secure it or Lose it!
PDF
BEA Presentation
PPT
The Business Of Information Security V2.0
PPTX
crisc_wk_2a.pptx
Ā 
PPTX
(2016_01_20)_IS_Management_Basics_LinkedIn
PDF
Microsoft power point closing presentation-greenberg
PPTX
Secure Iowa Oct 2016
PDF
Issala exec-forum-opening-150604
PDF
CISSP 8 Domains.pdf
Ā 
PDF
Your're Special (But Not That Special)
PDF
New Age Red Teaming - Enterprise Infilteration
INFRAGARD 2014: Back to basics security
CISSP Week 9
Building an effective Information Security Roadmap
Selling security to the C-level
MacIT 2014 - Essential Security & Risk Fundamentals
Information Security Management 101
D1 security and risk management v1.62
MIS chap # 9.....
Top Cybersecurity Challenges Facing Your Business
Your data is your business: Secure it or Lose it!
BEA Presentation
The Business Of Information Security V2.0
crisc_wk_2a.pptx
Ā 
(2016_01_20)_IS_Management_Basics_LinkedIn
Microsoft power point closing presentation-greenberg
Secure Iowa Oct 2016
Issala exec-forum-opening-150604
CISSP 8 Domains.pdf
Ā 
Your're Special (But Not That Special)
New Age Red Teaming - Enterprise Infilteration
Ad

More from Joel Cardella (9)

PDF
GrrCON 2018: Stop boiling the ocean!
PDF
GRRCON 2017 - Shuttle Columbia - Risk Management Lessons That Were Not Learned
PPTX
TACOM 2014: Back To Basics
PPTX
GrrCon 2014: Security On the Cheap
PPTX
WCC 2014: Globalization and cloud services for the enterprise
PPTX
GRRCON 2013: Imparting security awareness to all levels of users
PPTX
WCC 2013: The internet of everything
PPTX
WCC 2012: General security introduction for non-security students
PPTX
2nd FACTOR: The Story of Mat Honan
GrrCON 2018: Stop boiling the ocean!
GRRCON 2017 - Shuttle Columbia - Risk Management Lessons That Were Not Learned
TACOM 2014: Back To Basics
GrrCon 2014: Security On the Cheap
WCC 2014: Globalization and cloud services for the enterprise
GRRCON 2013: Imparting security awareness to all levels of users
WCC 2013: The internet of everything
WCC 2012: General security introduction for non-security students
2nd FACTOR: The Story of Mat Honan

Recently uploaded (20)

PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
STKI Israel Market Study 2025 version august
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
DOCX
search engine optimization ppt fir known well about this
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Getting started with AI Agents and Multi-Agent Systems
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Five Habits of High-Impact Board Members
PPTX
Modernising the Digital Integration Hub
PPTX
TEXTILE technology diploma scope and career opportunities
UiPath Agentic Automation session 1: RPA to Agents
NewMind AI Weekly Chronicles – August ’25 Week III
Flame analysis and combustion estimation using large language and vision assi...
STKI Israel Market Study 2025 version august
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Credit Without Borders: AI and Financial Inclusion in Bangladesh
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Benefits of Physical activity for teenagers.pptx
Build Your First AI Agent with UiPath.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
search engine optimization ppt fir known well about this
CloudStack 4.21: First Look Webinar slides
Zenith AI: Advanced Artificial Intelligence
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
sbt 2.0: go big (Scala Days 2025 edition)
Getting started with AI Agents and Multi-Agent Systems
Module 1.ppt Iot fundamentals and Architecture
Five Habits of High-Impact Board Members
Modernising the Digital Integration Hub
TEXTILE technology diploma scope and career opportunities

BSIDES DETROIT 2015: Data breaches cost of doing business

  • 2. Who am I? ļ‚ž Joel Cardella ļ‚ž Over 20 years in IT in various capacities – infrastructure operations & data centers, sales support, network ops, security ļ‚ž Email: [email protected] ļ‚ž Twitter: @JoelConverses
  • 3. Fear, Uncertainty and Doubt (FUD) can no longer be the fait accompli of the security world to try and drive good security decisions. fait acĀ·comĀ·pli ˈfet əkƤmˈplē,ˈfāt/ noun a thing that has already happened or been decided before those affected hear about it, leaving them with no option but to accept. "the results were presented to shareholders as a fait accompli"
  • 4. http://securityintelligence.com/cost-of-a-data-breach-2015/#.ValJ7vlVhBc • The average cost paid for each lost or stolen record containing sensitive and confidential information increased 6 percent, jumping from $145 in 2014 to $154 in 2015. • The lowest cost per lost or stolen record is in the transportation industry, at $121, and the public sector, at $68. • On the other hand, the retail industry’s average cost increased dramatically, from $105 last year to $165.
  • 13. Michael Lynton, CEO of Sony Entertainment Inc In a December [2014] interview with National Public Radio, Lynton insisted his company was ā€œextremely well prepared for conventional cybersecurity,ā€ but faced ā€œthe worst cyberattack in U.S. history.ā€ He has repeatedly described it as a ā€œhighly sophisticated attack.ā€ Sony Pictures provided written responses to questions through Robert Lawson, its chief spokesman. He says Lynton has no plans to fire or discipline anyone. The CEO’s reasoning rests on the belief that because Sony’s assailant was a foreign government, with far more resources than a renegade band of hackers, what happened was unstoppable. The studio simply faced an unfair fight. http://fortune.com/sony-hack-part-1/
  • 14. If the data represents you, you are the owner. The company hosting it, or collecting it, or buying it from a clearinghouse is merely the custodian. And as a custodian they have fiduciary responsibilities to that data, but they also have financial obligations to their investors and shareholders. So, in that equation, Mr and Mrs Data Owner suffer the downside of risk.
  • 16. These are all things I tried and did not succeed with ļ‚ž Don’t refer to security as an insurance model ļ‚ž Don’t use standards that don’t map to your industry, or use apples & oranges comparisons ļ‚ž Don’t confuse compliance with security, and don’t discuss them in the same context – separate the words and define them differently
  • 18. What do we do? ļ‚ž Pivot ļ‚— This can be (sometimes should be) very obvious ļ‚ž Understand what your ROI is ļ‚— E.g. If the penalty for non-compliance is $X, then we spend $Y to offset it ļ‚— X < Y = Positive ROI ļ‚— X > Y = Negative ROI ļ‚— X = Y = ROI needs to be evaluated ļ‚ž Other ROI can be more complex, and need their own models
  • 19. What to do? ļ‚ž Treat Cybersecurity as a Business Risk ļ‚— And start referring to it as business risk ā—‹ Example: SGRC ļ‚— Ask how your business assess risk and pattern a model that follows it – show execs what they are used to seeing ļ‚— Engage your peers and superiors on risk topics – use what is in the media as a conversation starter ļ‚— This is where ROI begins
  • 20. What to do? ļ‚ž Build the path to awareness by your leadership ļ‚— Prepare reports on what’s going on in the industry around you – execs love to know how they are ding compared to those around them ļ‚— Start with the next level manager, or managers in other departments – sometimes it’s a journey not a ladder ļ‚— This is where ROI is discussed
  • 21. What to do? ļ‚ž Learn from the past mistakes of others ļ‚ž This is where ROI is proven ļ‚ž Example of Sony: ļ‚— Sony’s email-retention policy left up to seven years of old messages on servers, unencrypted ļ‚— The company was essentially using email for long-term storage of business records, contracts, and documents saved in case of litigation. ļ‚— An array of sensitive information—including user names and passwords for IT administrators— was kept in unprotected spreadsheets and Word files with names like ā€œComputer Passwords.ā€
  • 22. What to do? ļ‚ž Be prepared! Know your data and know what it takes to protect it – but let someone else make the risk decision on it ļ‚— This requires emotional detachment! ļ‚— This is where ROI is defended
  • 23. What to do? ļ‚ž Network! Network! Network! ļ‚— Come to community meetups and cons ļ‚— Come to local group meetings (#misec) ļ‚— Engage on Twitter, or other social mediums ļ‚— Forum discussions ļ‚— Ask questions, share info ļ‚— SWIPE ļ‚— This is where ROI can be enhanced
  • 24. Functional Area Key functions How we achieve it Business value Security • Ensure proper controls for systems and data access • Ensure Confidentiality of business data • Ensure business data is resistant to unauthorized change • Investment in security technologies • Multi-layer defensive strategy • Segregation of duties controls in SAP and other business critical systems and applications • Ensure logical separation of critical data • Business can operate within acceptable tolerance of risk • Enterprise ā€œcrown jewelsā€ are protected from malicious threats • Confidence in data is increased, business decisions have greater value Governance • Ensure global and regional directives and standards are in place for all NASC and relevant business processes • Global ISMS participation • Policy creation and documentation • Reviewing and approving standards and practices • Ensures the effective and efficient use of IT Security in enabling the business to achieve its goals • Ensures alignment with global governance Risk • Reduce enterprise risk • Stay abreast of new risks and threats • Business continuity planning and system availability planning • Ongoing risk assessments for both IT and business • Continually manage threats in constantly changing threat landscape • Proactively test systems for vulnerabilities • Investment in risk technologies • Business continuity planning for recovery of data and continuation of business in disaster situations • Business can run with reduced risk, allowing more innovation and growth • Newly emerging threats can be dealt with more quickly • Recovery capabilities for outage situations can be dealt with quickly, allowing for minimal business interruption Compliance • Ensure compliance activities for regional and global directives are met • Ensure Legal mandates are met • ICS activities • Interfacing with IT, global and business auditors on all audits • Interfacing with Legal • Ensure follow up on audit findings • Internal Controls Systems mandates are met • Legal mandates are met • Understanding of audit risks and findings, help with mitigation
  • 25. Critical Success Factors • Confidentiality, Integrity and Availability of data is managed to business expectation • Providing cost effective security controls and risk mitigation • Proactively addressing security improvements and mitigations where required • Improve recovery capability Key Activities • Managing audit findings as a tool for improving security posture and maturity • Execute control activities for governance and compliance • Continually assess risk and validate mitigations and controls • Disaster/continuity planning and recovery planning • Assess vulnerabilities, mitigate and manage emerging threats Key interfaces • Global IT security • Project management • Regional and global auditors • External auditors (E&Y, PwC) • Legal, both regional and global • Corporate Communications • Business units, all LOBs and process areas • Executive management • IT Security community Guiding Principles 1. Focus on the Business 2. Comply with Relevant Legal and Regulatory Requirements 3. Evaluate Current and Future Information Threats 4. Adopt a Risk-based Approach 5. Protect Classified Information & Ensure Proper Use
  • 26. Layered security model 26 Perimeter defense (hardware firewall, intrusion detection) Managed security services, security threat detection Windows Firewall, patching (software) Anti-Virus Measures End User Access Controls Critical business data Hardware, restricts network access from the internet Software to restrict access, patching to deal with known vulnerabilities End user awareness training, strong passwords, dual factor authentication Services partner watches all network activity, looks for suspicious activity Anti-virus blocks known threats Access controls restrict access to the critical systems, manage SOD conflicts
  • 27. Final thoughts ļ‚ž Remember, your job is to LOWER the risks of doing business. Do so using positive ROI. ļ‚ž Emotionally detach yourself from the things that drive you nuts as an infosec admin or manager. ļ‚ž Understand you are there as an advisor, a counselor. When you make decisions in this capacity, you become trusted. You are no longer a gatekeeper. Gatekeeper = compliance. ļ‚ž But keep in mind: your business can do business without security. It’s high risk, but if the benefits outweigh the risks…
  • 28. Who am I? ļ‚ž Joel Cardella ļ‚ž Over 20 years in IT in various capacities – infrastructure operations & data centers, sales support, network ops, security ļ‚ž Email: [email protected] ļ‚ž Twitter: @JoelConverses