Zero-trust Networking and Cloud Transformation
The CIO’s journey to a cloud-first strategy. The end-game is one where applications are hosted in the cloud and visible only to authorized users. Real world examples of success provided. The cloud becomes the data center. The internet becomes the corporate network. There is hope for the future but some dire consequences for traditional network security appliance vendors who lag behind the curve.
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,400+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 29 countries on six continents. He is a lecturer at Charles Sturt University in Australia. He is the author of Secure Cloud Transformation: The CIO’s Journey and Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. He writes for Forbes, CSO Magazine, and The Analyst Syndicate. He is a member of the advisory board at the Information Governance Initiative and sits on the Responsible Recycling Technical Advisory Committee, the standard for electronic waste. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. Follow @cyberwar on Twitter.
Get promotions and special offers directly to your inbox.