As threats from APTs and other attackers continue to rapidly morph, the CISO faces an uphill battle of getting his or her team up to speed on the dangers that face an organization. The traditional model of waiting for a breach and then reacting has changed to be preemptive and preventative, and with that comes a score of new skills and strategies the CISO must develop among his or her team. What challenges are CISOs facing in this regard, and how can they address them? Where can they look for help, talent and added resources?
Adam Rice, CISO, ATK
Adam Rice is the Chief Information Security Officer for ATK Adam Rice has 17 years of established experience in information technologies and information security. Adam is responsible for establishing the information security strategy a... More View all posts
Adam Rice is the Chief Information Security Officer for ATK Adam Rice has 17 years of established experience in information technologies and information security. Adam is responsible for establishing the information security strategy and direction for the company. This responsibility spans the architecture, design and implementation to protect ATK’s operations, assets and information. Adam oversees and coordinates all information security efforts across ATK and is accountable for enterprise wide results. He also is responsible for identifying, evaluating and reporting on information security risks in a manner that meets compliance, regulatory and enterprise risk management (ERM) requirements. Prior to working at ATK Adam was The Global Chief Security Officer and VP of Managed Security Services at Tata Communications, a Senior Manager at VeriSign’s Security Professional Services, the Director of Professional Services at Counterpane Internet Security, the Senior Director of IT Operations at RedSiren Managed Security Services, and a Distinguished Member of the Consulting Staff at Lucent Technologies. Adam was in the United States Army and Army National Guard from 1983 until 2007. During this time Adam was a team sergeant for a Special Forces detachment and served a combat tour in Afghanistan. Adam holds a Masters Degree in Public Administration from George Mason University, as well as post graduate work in Information Security Management from the University of Virginia. Adam has published numerous articles on Information Security. Less View all posts