Security

How Do You Secure Your Extended IT?

How Do You Secure Your Extended IT?

Today, organizations are outsourcing more and more of their IT applications, systems, and infrastructure, and moving to the cloud. But can their IT leaders depend solely on the vendors’ promises and contract agreements about delivering these services securely? It’s one thing to articulate security concerns but another to live with risks, including job loss, which could arise while someone external has control of these services. How can IT leaders secure these extensions to their IT departments? What has been tried? What has worked or not worked?

Contributors

Download Podcast

Apple PodcastGoogle PodcastSpotifyPandoraiHeartRadioSoundCloudTuneIn, and Stitcher. Find other syndication channels here or search CIO Talk Network podcast on any other app.

Contributors

Dan Blum

Dan Blum, VP and Distinguished Analyst, Gartner

currently covers security architecture, cloud computing security, endpoint security, Web/email content filtering, and the cybercrime/threat landscape. He also has a background in identity management and other security technologies. Mr. Blum... More   View all posts
Alan Levine

Alan Levine, Global CISO , Alcoa Inc.

For the past 14 years, Alan Levine has served as the global Information Security Officer for Alcoa Inc, with worldwide responsibilities for all aspects of cyber security, based in Pittsburgh, PA. Alan also serves as the Chief Privacy Offic... More   View all posts
Add Comment
Click here to post a comment

Advertisement

Amaze for Application 2 MPU 300X250
Dan Blum

Login


Not Member Yet?
Register

Register

  • Name

  • Contact Info

  • About Yourself

  • Minimum length of 8 characters
  • Upload
  • Location

  • Professional Background

  • Other Social Profiles

  • Areas of Interest