POPULARITY
Trace Network Operations, founded in 2016, provides bespoke network solutions in network management and network monitoring. Company founder Darryl Theron saw a gap in the market for a company that provides leading solutions in this space, stemming from his many years of experience in the pan-African infrastructure market. This episode of TechCentral's TCS+ business technology podcast, hosted by Jaydev Chiba, delves into how Trace Network Operations supports its customers in the areas of network management and network monitoring as a service (NMaaS) with Theron and his colleague, Gert van Deventer. The company's solutions are built around a product called StableNet, a carrier-grade network management and monitoring system that is built from the ground up. Trace Network Operations also uses other technologies, including the Red Hat Ansible automation platform, Cubro, Sophos, NetWitness and FNT. The company's solutions are designed to help businesses solve problems such as: • Lack of visibility into network activity: Many businesses lack the tools and expertise to monitor their networks effectively. This can lead to problems such as security breaches, performance issues and outages. • Difficulty in troubleshooting problems: When problems do occur, it can be difficult to identify the root cause and resolve them quickly. • Lack of automation: Many network management tasks are still performed manually, which is time-consuming and prone to errors. Trace Network Operations addresses these issues by providing a comprehensive suite of NMaaS solutions that includes: • Network monitoring: StableNet provides real-time visibility into network activity, allowing businesses to identify and resolve problems quickly. • Network management: The company's solutions help businesses to automate many network management tasks, such as configuration management, change management and fault management. • Security monitoring: It integrates solutions such as NetWitness and Cobra to provide comprehensive security monitoring and management. Trace Network Operations offers its solutions on a flexible basis, allowing businesses to tailor the level of service that best meets their needs. The interview also includes a few case studies of how Trace Network Operations' solutions have been used to provide value and benefits for companies. TechCentral
The high-profile hack of MGM Resorts International is shining a light on the latest tactics being used by organized hackers to exploit large companies. What lessons can consumers and other businesses learn from these attacks? Keith chats with Ben Smith, Field CTO of security firm NetWitness, about the fallout from these attacks and how companies can shore up their own security.
In this episode of Winning the Challenger Sale, hosted by Jen, Johnathan Bald, Area Vice President of Large Enterprise Sales Netwitness - Canada & US East at RSA Security, discusses the fundamentals of qualifying, disqualifying, and prioritizing opportunities. Johnathan explains how the unique market fit and the maturity of an organization influence the likelihood of qualifying or disqualifying a prospect, and factors that influence internal opportunity prioritization.
In this episode of Winning the Challenger Sale, hosted by Jen, Johnathan Bald, Area Vice President of Large Enterprise Sales Netwitness - Canada & US East at RSA Security, discusses the fundamentals of qualifying, disqualifying, and prioritizing opportunities. Johnathan explains how the unique market fit and the maturity of an organization influence the likelihood of qualifying or disqualifying a prospect, and factors that influence internal opportunity prioritization.
About the speaker: Amit Yoran is Chairman and Chief Executive Officer of Tenable, overseeing the company's strategic vision and direction. As the threat landscape expands, Amit is leading Tenable into a new era of security solutions, empowering organizations to meet the challenges of evolving threats with innovative technologies and a vision of transformative vulnerability management. Prior to joining Tenable, Amit was President of RSA, one of the most successful security companies in the world, where he led their growth and strategy since 2014. Amit came to RSA through the acquisition of his high-growth company, NetWitness, where he was founder and CEO for the market-leading network forensic product provider. Previously, he served as Founding Director of the United States Computer Emergency Readiness Team (US-CERT) program in the U.S. Department of Homeland Security. Amit also founded Riptech in Virginia, one of the first managed security service providers (MSSP) and which was acquired by Symantec in 2002. Amit currently serves as a board member and adviser to several security startups. Amit is an esteemed influencer and leader in the security industry. He is often sought out as a keynote speaker or media spokesperson. His unique blend of public service and private enterprise experience informs his insights, thought leadership, and engaging presentations.
A new Open-source tool helps discover public Azure blobs, A New Eclypsium Integration with Kenna.VM, Armis Raises $125 Million, Okta launches its new open-source design system, Enterprise selfie biometrics solutions from Ping Identity, Bitglass announces technical integrations between SD-WAN providers and its SASE offering, Cisco AppDynamics strengthens security posture, RSA NetWitness Detect AI claims to provide advanced analytics for actionable threat detection, Jetstack Secure delivers protection and visibility of machine identities, Obsidian SaaS security solution now available on AWS Marketplace, and SentinelOne Acquires Scalyr, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw216
A new Open-source tool helps discover public Azure blobs, A New Eclypsium Integration with Kenna.VM, Armis Raises $125 Million, Okta launches its new open-source design system, Enterprise selfie biometrics solutions from Ping Identity, Bitglass announces technical integrations between SD-WAN providers and its SASE offering, Cisco AppDynamics strengthens security posture, RSA NetWitness Detect AI claims to provide advanced analytics for actionable threat detection, Jetstack Secure delivers protection and visibility of machine identities, Obsidian SaaS security solution now available on AWS Marketplace, and SentinelOne Acquires Scalyr, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw216
When speaking to nearly all startups about their exit strategy, it almost invariably is acquisition. But startup M&A is an area most founders know very little about and is clouded in mystery. What really happens when a startup is acquired, how does it happen, and when? Who reaches out to whom? Do you need a banker or boutique M&A firm? What are the tricks and traps on both sides of the table? In this #DreamitLive Amit Yoran (CEO Tenable, former President, RSA & CEO, Netwitness) and Mike Viscuso (Co-Founder, Carbon Black) will share their insights on the dynamic and high-stakes process of startup M&A. With decades of experience, Amit and Mike will share their thoughts with #DreamitLive co-hosts Mel Shakir (Managing Director, Dreamit Securetech) and Steve Barsh (Managing Partner, Dreamit Ventures). In this exclusive #DreamitLive episode we'll take a peek behind the curtain to discuss rarely talked about topics that startup founders need to know including: What are the top reasons an acquirer will do a deal? What are the top things they are looking for? As a startup, how do you make yourself most attractive to an acquirer? Are startups bought or are they sold and how does that influence the process? Where do most deals originate? Via a partnership, strategic investment, banker, or somewhere else? How does a startup maximize value during the M&A process? In deal structuring, what are the pros and cons of upfront payments and earnouts? What are the top mistakes startups and acquirers make during the M&A process? How are a startup's investors involved? Can they help? Can they hurt? What role do they play? Do most acquisitions occur because a startup hires an M&A firm and starts a process? What are the biggest challenges when working with a banker or M&A firm? What are the expected trends in cybersecurity M&A? Amit Yoran is Chairman and Chief Executive Officer of Tenable, overseeing the company's strategic vision and direction. As the threat landscape expands, Amit is leading Tenable into a new era of security solutions, empowering organizations to meet the challenges of evolving threats with innovative technologies and a vision of transformative vulnerability management. Prior to joining Tenable, Amit was President of RSA, one of the most successful security companies in the world, where he led their growth and strategy since 2014. Amit came to RSA through the acquisition of his high-growth company, NetWitness, where he was founder and CEO for the market-leading network forensic product provider. Previously, he served as Founding Director of the United States Computer Emergency Readiness Team (US-CERT) program in the U.S. Department of Homeland Security. Amit also founded Riptech in Virginia, one of the first managed security service providers (MSSP) and which was acquired by Symantec in 2002. Amit currently serves as a board member and adviser to several security startups. Amit is an esteemed influencer and leader in the security industry. He is often sought out as a keynote speaker or media spokesperson. His unique blend of public service and private enterprise experience informs his insights, thought leadership, and engaging presentations. Mike Viscuso drives the development of Carbon Black's long-term company and product strategy. He was co-founder and chief executive officer of Carbon Black, which merged with Bit9 in February 2014. A business-minded technologist, Viscuso is known for his drive and sense of mission and is highly regarded in the Computer Network Operations community as a top mind in offensive security. He co-founded Carbon Black in 2011 to provide organizations with unmatched protection, detection, and incident response capabilities. Prior to the merger with Bit9, Viscuso led Carbon Black's rapid rise and brand recognition in the market. Viscuso earned bachelor's degrees in mathematics and computer science at Villanova University. Follow Dreamit on...
Chris Coleman: Reversing the Economics of Cyber Defense “When you are able to maintain your own highest standards of integrity - regardless of what others may do - you are destined for greatness.” -- Napoleon Hill On today’s episode of InSecurity, Matt Stephenson & Michelle Moskowitz chat with Chris Coleman, Advisor to the Chairman fo Lookingglass Cyber Solutions. In a wide-ranging discussion they take a look that escalating cybersecurity arms race, the role of Venture Capital in growing or stifling innovation and the need for standards in interoperability across the world of hardware and software in order to increase the security industry’s chancing of winning this battle. About Chris Coleman Chris Coleman (@cdeltac) has over 20 years of experience in information security and technology industry. He currently serves in an Advisor to the Chairman at Lookingglass Cyber Solutions. Prior to his stint as CEO at Lookingglass, Coleman served as the Director of Cyber Security for Cisco Systems' U.S. Public Sector Theater. Chris focused on driving Cisco and partner technology into solutions that helped address customer problems and leverage the core value of Cisco’s network technologies. Coleman served as a liaison between sales and engineering with regards to cyber security technology and development. Coleman also served as Vice President and Director of Engineering Services for ManTech International. During his tenure at ManTech, he was responsible for direct contract PNL and PNL associated with ManTech’s, remote security monitoring services and data center hosting services. In addition, Chris was responsible for ManTech IS&T's Divisional IT services and operations, and a subset of ManTech International’s IR&D. He also managed the NetWitness product development team, developed the initial architecture for moving from pure technology into a commercially viable product, defined the business case for developing a sales team and conceived the spin out of the technology and product team from ManTech International. About Michelle Moskowitz Michell Moskowitz is Vice President of Business Development & Chief of Staff at Sublime Communications. In her previous lives, she spun up the New Media Division for Lifetime network as well as working with numerous cybsecurity startups. With a career spent swimming in the waters of digital marketing and consulting Michelle has somehow found the time to also be a journalist at the Greenwich Sentinel. Michell will be joining us as a recurring co-host to bring additional perspective to the important role that communication plays in a world that grows increasingly technical. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
This week in the Enterprise News, Paul and Matt cover the following stories: Insight Completes Venture Acquisition of Armis, Salt Security API Protection Explained, RSA NetWitness Platform Bolsters Threat Detection and Incident Response, Thycotic Leads the Way for Cloud-based Privileged Access Management, Deep learning cybersecurity co Deep Instinct raises $43m, LogicHub launches MDR+ to provide flexible end-to-end detection and response, CipherCloud CASB+ for Slack: Visibility, protection and control of all user activity on Slack, ZeroFOX launches AI-powered Advanced Email Protection for Google and Microsoft platforms, 12,000+ Jenkins servers can be exploited to launch, amplify DDoS attacks, Elastic Stack 7.6 delivers automated threat analysis and response, and Tufin SecureCloud Enables Companies to Secure Hybrid Cloud Environments Without Compromising Business Speed or Agility. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode17
This week in the Enterprise News, Paul and Matt cover the following stories: Insight Completes Venture Acquisition of Armis, Salt Security API Protection Explained, RSA NetWitness Platform Bolsters Threat Detection and Incident Response, Thycotic Leads the Way for Cloud-based Privileged Access Management, Deep learning cybersecurity co Deep Instinct raises $43m, LogicHub launches MDR+ to provide flexible end-to-end detection and response, CipherCloud CASB+ for Slack: Visibility, protection and control of all user activity on Slack, ZeroFOX launches AI-powered Advanced Email Protection for Google and Microsoft platforms, 12,000+ Jenkins servers can be exploited to launch, amplify DDoS attacks, Elastic Stack 7.6 delivers automated threat analysis and response, and Tufin SecureCloud Enables Companies to Secure Hybrid Cloud Environments Without Compromising Business Speed or Agility. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode172
This week, Paul is joined by the Wizard of Entrepreneurship, Matt Alderman! In the Article Discussion, five techniques to nail the marketing aspect of your investor pitch, 18 things you need to know before you quit your job & launch your own startup, and more! In Tracking Security Innovation, BetterCloud closes $60M funding round, Fyde raises $3M in seed funding, RSA Acquires Fortscale, expands NetWitness SIEM Platform, and more on this episode of Business Security Weekly! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode80 Visit https://www.securityweekly.com/bsw for all the latest episodes!
This week, Paul is joined by the Wizard of Entrepreneurship, Matt Alderman! In the Article Discussion, five techniques to nail the marketing aspect of your investor pitch, 18 things you need to know before you quit your job & launch your own startup, and more! In Tracking Security Innovation, BetterCloud closes $60M funding round, Fyde raises $3M in seed funding, RSA Acquires Fortscale, expands NetWitness SIEM Platform, and more on this episode of Business Security Weekly! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode80 Visit https://www.securityweekly.com/bsw for all the latest episodes!
Join us as we talk some lab shop with Mike Bailey and the rest of the crew! Please visit http://wiki.securabit.com/ShowNotes/EP94 for our show notes!
SecuraBit Episode 81: Network Admins Takeover May 4, 2011 Hosts: Anthony Gartner – @anthonygartner http://anthonygartner.com Andrew Borel – @andrew_secbit Tim Krabec - @tkrabec Guests: Sam Bowne discusses IPv6 and the RA 0day attack Twitter: @sambowne Home page: samsclass.info General topics: IPv6 Info: http://samsclass.info/ipv6/60_S11.php RA 0day attack: http://samsclass.info/ipv6/proj/flood-router6a.htm http://orchilles.com/2011/04/ssl-renegotiation-dos-faq.html NIST Guidelines for the Secure Deployment of IPv6 http://csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf Hurricane Electric cert and info http://ipv6.he.net/certification/ BackTrack 5 Available on May 10, 2011 http://www.backtrack-linux.org/ Netwitness http://www.netwitness.com/products-services/investigator-freeware http://www.netwitness.com/resources/videos/investigator-tutorial-1-overview-navigation Use our discount code "Connect_SecuraBit" to get $150.00 off of ANY training course. The discount code is good for all SANS courses in all formats. Upcoming events: CEIC Orlando (15 – 18 May 2011) #BSidesROC Rochester, NY (21 May 2011) #BSidesDetroit (3 - 4 Jun 2011) #BSidesStJohns St. John's, NL (10 Jun 2011) #BSidesCT Meriden, CT (11 Jun 2011) FIRST Austria (12 - 17 June 2011) #BSidesVienna(18 June 2011) Toorcon (18 - 19 June 2011) #BSidesLasVegas (3-4 August 2011) BlackHat Vegas (3 - 4 August 2011) DEFCON 19 (4 - 7 August 2011) #BSidesLA Los Angeles, CA (18 - 19 August 2011) #BSidesMO(21 Oct 2011) #BSidesNewDelhi (22 - 23 October 2011) VB Barcelona October 2011 Links: http://www.securabit.com Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405 iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
Securabit Episode 73: Eber Kneber and botnet stuntmen January 12, 2011 Hosts: Anthony Gartner – @anthonygartner http://anthonygartner.com Chris Gerling – @chrisgerling Christopher Mills – @thechrisam Jason Mueller – @securabit_jay Andrew Borel – @andrew_secbit Guests: We discuss Kneber and other fun security topics with Alex Cox of NetWitness @perpetualsec http://www.networkforensics.com/ General topics: Kneber Botnet Mariposa Responsible disclosure Evil Virustotal http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf PROGRAMMABLE HID USB KEYSTROKE DONGLE: USING THE TEENSY AS A PEN TESTING DEVICE https://www.defcon.org/html/defcon-18/dc-18-speakers.html#Crenshaw http://www.irongeek.com/i.php?page=videos/dojocon-2010-videos Use our discount code "Connect_SecuraBit10" to get 10% off of ANY training course. The discount code is good for all SANS courses in all formats. Upcoming events ShmooCon (28 - 31 Jan 2011) RSA Conference 2011 (14 -18 Feb 2011) #BSidesSanFrancisco (14 - 15 Feb 2011) #BSidesCleveland (18 Feb 2011) #BSidesHalifax (5 Mar 2011) #BSidesGSO Greensboro, NC (9 Mar 2011) #BSidesAustin (11 - 12 March 2011) http://www.keepsecurityweird.org/ #BSidesChicago (16 - 17 Apr 2011) #BSides London, (20 Apr 2011) #BSidesROC Rochester, NY (21 May 2011) #BSidesDetroit (3 - 4 Jun 2011) Links: http://www.securabit.com Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405 iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
SecuraBit Episode 62: Visualizing Data with NetWitnessHosts:Anthony Gartner – @anthonygartner http://anthonygartner.comChris Gerling – @chrisgerlingChristopher Mills – @thechrisamAndrew Borel – @andrew_secbitGuests:Eddie Schwartz - @eddieschwartzGeneral topics:BSidesLV http://www.securitybsides.com/BSidesLasVegasBlackHat https://www.blackhat.com/html/bh-us-10/bh-us-10-home.htmlDefcon https://www.defcon.org/html/defcon-18/dc-18-schedule.htmlShmoocon Woot Video http://www.youtube.com/watch?v=HJ0ypgZU_D0NetWitness Visualize http://visualize.netwitness.com/Brief panel on certifications.iPhone App Now Available. http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8http://itunes.apple.com/us/podcast/securabit/id280048405Upcoming eventsSouth Florida ISSA’s Hack the flag and chili cook-off Saturday August 14, 2010 from 12:00pm - 5:00pmhttp://sfissa.org/index.php/sfissa-mm-events/htf-main/85-hack-the-flag-2010Hacker Halted http://www.hackerhalted.com/ Tim Is speaking October 14thLinks:http://securabit.comChat with us on IRC at irc.freenode.net #securabitiTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
Adding second hard drive to desktop, NOD32 antivirus, faxing using Ooma VoIP, converting Word doc to pdf, Profiles in IT (Christopher Isaac Stone, co-founder Twitter), anatomy of a botnet attack on financial institutions (network uncovered by NetWitness, used Zeus Trojan for hire, 2,500 institutions penetrated), Google Chrome OS (soon to be on netbooks, open-source print cloud architecture), Feds drop attempt to access Yahoo mail without warrant, and Website of the Week (What is Reality, excellent description of the quantum world). This show originally aired on Saturday, April 17, 2010, at 9:00 AM EST on WFED (1500 AM).
Adding second hard drive to desktop, NOD32 antivirus, faxing using Ooma VoIP, converting Word doc to pdf, Profiles in IT (Christopher Isaac Stone, co-founder Twitter), anatomy of a botnet attack on financial institutions (network uncovered by NetWitness, used Zeus Trojan for hire, 2,500 institutions penetrated), Google Chrome OS (soon to be on netbooks, open-source print cloud architecture), Feds drop attempt to access Yahoo mail without warrant, and Website of the Week (What is Reality, excellent description of the quantum world). This show originally aired on Saturday, April 17, 2010, at 9:00 AM EST on WFED (1500 AM).
Amit Yoran is the CEO of NetWitness and has been since November of 2006. Prior to NetWitness, he was appointed as Director of US-CERT and the National Cyber Security Division of the Department of Homeland Security. He was also previously the CEO and advisor to In-Q-Tel, the venture capital arm of the CIA. In this podcast he discusses the Kneber Botnet and cybersecurity issues with Denise Zheng.
Listen in as we interview 1Password and NetWitness! Dave Teare - Co-Founder of 1Password Agile Web Solutions' 1 Password http://agilewebsolutions.com/products/1Password Q's What was the motivation to create 1Password? There are two key chain types that are used. Why the switch to the other one? When will we be able to sync across the iphone cord? (Edge/3G) 8.02.11 BGA type Are there plans to port 1Password to Win/Lin platforms? 1password Anywhere? Is there a way to import from other password managers? CSV format what is the difference between the 1password pro and the touch pro? http://help.agile.ws/1Password_touch/pro_vs_standard.html What is the diffrence between 1Password and 1Password Pro? Who actually maintains the twitter account? Find out more at http://get1password.com NetWitness - Eddie Schwartz http://www.netwitness.com/ Q's How long have you been with NetWitness? http://download.netwitness.com/ http://download.netwitness.com/download.php?src=DIRECT Google Earth integration - Very Cool!! What OS will the free or paid version work on and will it work from within a VM? What does netwitness do at the layer 7 level? Join us in IRC at irc.freenode.net #securabit Hosts: Anthony Gartner – @anthonygartner Christopher Mills – @thechrisam Jason Mueller - @securabit_jay Andrew Borel – @andrew_secbit Guests: Dave Teare - 1Password Eddie Schwartz - Netwitness
mit Yoran Amit Yoran led the management buyout of NetWitness from ManTech in 2006 and serves as the Chairman and CEO. Prior to NetWitness, he was appointed as Director of the National Cyber Security Division of Homeland Security, and as CEO and advisor to In-Q-Tel, the venture capital arm of the CIA. Formerly Mr Yoran served as the Vice President of Worldwide Managed Security Services at the Symantec Corporation. Mr. Yoran was the co-founder of Riptech, a market leading IT security company, and served as its CEO until the company was acquired by Symantec in 2002. He served as an officer in the United States Air Force in the Department of Defense's Computer Emergency Response Team. www.netwitness.com Kevin Nixon Kevin Nixon has over 25 years experience in MIS design and development, Information Security, Business Continuity & Disaster Recovery and US and European Regulatory Compliance. He joined Datacastle in January 2008 as the Director of Security Business Strategy & Product Marketing. Kevin was responsible for public policy review and compliance analysis. He educates corporate management and staff on pending and existing technology legislation relevant to client employees, customers, partners, and vendors. In his role, Kevin has testified before the Republican High Tech Task Force, Chairman of the Senate Armed Services Committee & the Chairman of the House Ways and Means Committee and several infrastructure security boards and committees including: * Disaster Recovery Workgroup for the Office of Homeland Security (under Richard Clarke, Special Advisor to the President for Cyberspace Security and Chairman of the Critical Infrastructure Protection Board) * Executive Board of the Internet Security Alliance (ISA) * Chairman of the Best Practices Information Security Management Committee, ISA * Executive Board Member of the Accredited Standards Committee, X9, Inc., the only industry-wide forum that brings together bankers, securities professionals, manufacturers, regulators, associations, consultants, and others in the financial services arena to address technical problems, find the best solutions, and codify them as nationally accepted standards. * US TC68-SC2 & US TC68-SC6 Delegation Member to the International Standards Organization (ISO) on Financial Data Protection, Privacy and Security Standards * Consultant to the Federal Trade Commission on the roll out of the Fair and Accurate Credit Transactions Act of 2003 (FACTA) on web security best practices for the AnnualCreditReport.com website * Appeared as Cyber-terrorism Expert on CNBC?s Squawk Box with Mark Haines Kevin served as Director of Information Systems Security & Business Continuity at Alliance Data Systems and as the Banking Security Officer of World Financial Network National Bank. Kevin has held positions for oversight of all regulatory compliance, data security, and data privacy issues as well as; compliance with FFIEC Banking Regulations and directed the OCC & SAS 70 Audits for the corporation. From 1984 until 1997, Kevin worked for AMR AA/SABRE where he held various management positions of increasing responsibility. In 1995, Kevin managed the SABRE division's implementation and compliance to all European Union & European Commission regulations for Computerized Reservation Systems, which also included external audit management, and all SABRE contract management. Kevin is known for building strategic alliances, converting complicated regulatory and compliance language and translating it into common sense, easy to understand solutions. Kevin is a Master Security Architect (MSA); a Certified Information Systems Security Professional (CISSP); a Certified Information Security Manager (CISM) and attended the SMU Cox School of Business. Contact Information: Kevin M. Nixon, MSA, CISSP, CISM Mobile (214) 649-6305 E-mail: Kevin.Nixon@datacastlecorp.com Company Webpage: http://www.datacastlecorp.com Media Relations Contact: media@datacastlecorp