- 25 years experience leading high-performing global product development teams, specializing in network security and security management.
- Experience in embedded software and hardware product development includes 12 years of development leadership at Cisco for products in the web services, Internet telephony, network and content security markets.
- Has led in-house and outsourced teams in India for more than 10 years; created groups and grew teams from 5 to over 50 employees; helped structure products and projects to get maximum benefit of U.S./India development work while minimizing the need for daily calls/meetings for coordination.
- Championed secure development practices at Cisco, focusing teams on processes to help improve the security of products from the initial design through implementation and bug-fix stages.
- Has spent virtually entire career working in multi-site development projects and has led multi-site development projects between the U.S., Europe and India
- All 10 Best Practices
- Pre-Call Discovery Process
- One-on-One Call with Expert
- Session Summary Report
- Post-Session Engagement
IT Security - How To Prepare For and Respond To Data Breaches
Risks & Opportunities
RisksCompanies that inadequately prepare for and respond to security breaches face significant risks:
- Brand damage
- Customer loss
- Legal liability
- Violations of laws and regulations such as HIPPA, FISMA, SOX, etc., may result in civil or criminal liability on your company and its officers.
- Failure to follow disclosure requirements may also result in liability.
- Loss of intellectual property
- This can result in a loss of business advantage.
- It can compromise the designs of future products.
Preparing for potential security breaches brings both business and learning opportunities. For learning opportunities, study the many companies who were breached and determine how they handled the event in the press. Who handled the situation well? What can be learned from them?
For business opportunities, good planning provides opportunities to:
- Assess your current practices and improve them.
- Reduce the risk of a breach.
- Reduce the impact of a breach should one occur.
- Limit brand damage.
- Improve customer confidence.