Podcasts about network associates

American global computer security software company

  • 13PODCASTS
  • 17EPISODES
  • 49mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jul 27, 2023LATEST
network associates

POPULARITY

20172018201920202021202220232024


Best podcasts about network associates

Latest podcast episodes about network associates

Now That's IT: Stories of MSP Success
From Accounting to Managed Services with Braddon McCleland of South Africa's Network Associates

Now That's IT: Stories of MSP Success

Play Episode Listen Later Jul 27, 2023 10:44 Transcription Available


Braddon McCleland, the driving force behind Networks Associates - a thriving managed services enterprise in South Africa shares how he transitioned from an accounting student, to owning his own IT company. Braddon's journey is a testament to the power of passion and self-motivation, as he pivoted to follow his love for IT. He candidly shares his experiences, mistakes, and the evolution of his team, plus his unique customer service approach that has his business thriving. His transition is filled with insights on the significance of robust management tools, effective operational procedures, and the power of marketing. Listen in for key takeaways from Braddon's experiences that could prove instrumental in your own path to success. This episode is packed with valuable wisdom, don't miss out!For Empower 2024, innovation, business, and partnership will come together at the new home for modern golf – and future host of the PGA Championship and Ryder Cup – the Omni PGA Frisco Resort.'Now that's it: Stories of MSP Success,' dives into the journeys of some of the trailblazers in our industry to find out how they used their passion for technology to help turn Managed Services into the thriving sector it is today. Every episode is packed with the valuable insights, practical strategies, and inspiring anecdotes that lead our guests to the transformative moment when they knew….. Now, that's it.This podcast provides educational information about issues that may be relevant to information technology service providers. Nothing in the podcast should be construed as any recommendation or endorsement by N-able, or as legal or any other advice. The views expressed by guests are their own and their appearance on the podcast does not imply an endorsement of them or any entity they represent. Views and opinions expressed by N-able employees are those of the employees and do not necessarily reflect the view of N-able or its officers and directors. The podcast may also contain forward-looking statements regarding future product plans, functionality, or development efforts that should not be interpreted as a commitment from N-able related to any deliverables or timeframe. All content is based on information available at the time of recording, and N-able has no obligation to update any forward-looking statements.

The Tech Trek
Dina Bruzek - Building safe spaces to allow people to be heard

The Tech Trek

Play Episode Listen Later Feb 24, 2022 19:31


Some of what Dina talks about: Finding a way to connect with your team in a way you haven't before Building safe spaces to allow people to be heard All slack channels are public Create a culture committee to have employees be a part of the solution Break down assumptions that have been made Time and space introduce attribution error Meet: Dina Bruzek has over 31 years of experience in technology with more than 23 years of experience leading teams in the development of market-leading cybersecurity products. At Huntress Labs, Dina is Senior Vice President of Product and Engineering and is responsible for guiding the execution of the company's product strategy across the engineering and product management groups to bring enterprise-grade solutions to Mid-Market and SMB partners. Prior to joining Huntress Labs, Dina was also the SVP of Product and Engineering at NSS Labs and The Media Trust. Prior to that, Dina led Cisco's Network Threat Defense (NTD) group, where she was responsible for a $1.5 billion product portfolio. Dina joined Cisco through the 2013 acquisition of Sourcefire for $2.7 billion. At Cisco, she led the company's strategy to deliver the first threat-focused next-generation firewall. In addition, she led the integration of the Sourcefire and Cisco development teams and the agile transformation of the development and test organizations to form the NTD group, which consisted of more than 800 engineers. Before joining Cisco, Dina was the Vice President of Product Development at Sourcefire, where she was responsible for software and hardware development for Sourcefire network security products. She has also held various technical, strategic, and management roles in Internet security at Secure Computing Corporation and Network Associates. She started her career as a communications systems engineer at the Johns Hopkins University Applied Physics Laboratory. Dina holds a BS in Electrical Engineering from Purdue University and an MS in Engineering from Johns Hopkins University. If you have any questions for Dina, please feel free to reach out via: https://www.linkedin.com/in/dina-bruzek-997941/ https://twitter.com/dbruzek I hope you enjoyed the episode, the best place to connect with me is on Linkedin - https://www.linkedin.com/in/amirbormand (Amir Bormand). Please send me a message if you would like me to cover certain topics with future guests.

The Church Digital Podcast
EP201: Guest Engagement, Tom Pounder, & The TCD Sidekick Podcast Takeover

The Church Digital Podcast

Play Episode Listen Later Jan 31, 2022 40:16


So THECHURCH.DIGITAL is rolling out it's Podcast Network, and I gotta tell you, I'm excited about the Content Creators we're platforming here on The Church Digital Podcast Network. Over the next month The Church Digital Podcast is getting taken over! We'll be featuring one of our Network Associates each week for the next five weeks, giving you, listening audience, a taste of the different nuances featured on TCD Podcast Network. Right off the bat, we're featuring Tom Pounder & The TCD Sidekick Podcast. Tom is a veteran to digital ministry, blogging and podcasting on digital church FOR YEARS! Back in November we announced that Tom is coming over to THECHURCH.DIGITAL, bringing his proverbial talents over to TCD. For the takeover here we're bringing in Jake McNamara, a new digital pastor in this COVID season. Through The Compass Church, Jake has been exploring some interesting paths centered around guest engagement. What's Jake & The Compass Church learning in this season? How can we get guests to engage better digitally? Let's find out as Tom Pounder takes over The Church Digital Podcast. ON THE SHOW Host: Jeff Reed THECHURCH.DIGITAL & DigitalChurch.Network Twitter // Facebook // Instagram // LinkedIn // YouTube Guest: Tom Pounder New Life Christian Church, Online Pastor Subscribe to TCD Sidekick Podcast. Digital Bookcamp, Facebook Group Twitter // Facebook // LinkedIn RESOURCES Tom Interviews Jeff for the first time, back in 2018. How to Get Serious About Online Ministry at Your Church. More about the TCD Podcast Network. Subscribe to TCD Sidekick Podcast. Learn more about Tom Pounder. Full Show Notes Available on THECHURCH.DIGITAL --- Send in a voice message: https://anchor.fm/thechurchdigital/message

Me, Myself, and AI
Transforming a Technology Organization for the Future: Starbucks's Gerri Martin-Flickinger

Me, Myself, and AI

Play Episode Listen Later Jan 25, 2022 27:54


Why does how you describe your team — down to its name — matter? Gerri Martin-Flickinger, former executive vice president CTO at Starbucks, joins Me, Myself, and AI to describe some of the technology initiatives the coffeehouse chain has been able to pursue since rebranding its technology team and articulating its mission. In her conversation with Sam and Shervin, Gerri recaps a decades-spanning career working in technology leadership roles at Chevron, McAfee, and Adobe, then explains some recent employee- and customer-facing projects Starbucks has undertaken using AI and machine learning. Read the episode transcript here. Me, Myself, and AI is a collaborative podcast from MIT Sloan Management Review and Boston Consulting Group and is hosted by Sam Ransbotham and Shervin Khodabandeh. Our engineer is David Lishansky, and the coordinating producers are Allison Ryder and Sophie Rüdinger. Stay in touch with us by joining our LinkedIn group, AI for Leaders at mitsmr.com/AIforLeaders. Read more about our show and follow along with the series at https://sloanreview.mit.edu/ai. Guest bio: As executive vice president and CTO at Starbucks, Gerri Martin-Flickinger led the Starbucks Technology team through a transformation into a best-in-class retail technology organization. She was the passionate leader behind the technology strategy that plays a critical role in propelling the Starbucks mission — “empowering partners and delighting customers, globally.” Before joining Starbucks in 2015, Martin-Flickinger was senior vice president and CIO at Adobe, where she led portions of its technology transformation to a cloud-based subscription services business. Previously, she served as CIO at Verisign, McAfee, and Network Associates and held numerous senior leadership roles at Chevron, where she began her career. Martin-Flickinger currently sits on Charles Schwab's board of directors and serves as a member of Arizona State University's Fulton School of Engineering Advisory Board, Sierra Ventures' CIO Advisory Board, and The Wall Street Journal CIO Network.

Creating Wealth Real Estate Investing with Jason Hartman
1704 FBF: NSA-Proof Internet Browsing with John McAfee Developer of the McAfee Antivirus Software & Founder of McAfee Associates

Creating Wealth Real Estate Investing with Jason Hartman

Play Episode Listen Later Jun 25, 2021 49:39


Today's Flash Back Friday comes from Episode 353, originally published in December 2013. John McAfee is in the news, as he is trying to create an NSA-proof gadget used for private internet browsing, called "Decentral." McAfee, original creator of McAfee Antivirus software was born in the United Kingdom and raised in Salem, Virginia, United States.  McAfee was employed as a programmer by NASA's Institute for Space Studies in New York City from 1968 to 1970. From there he went to Univac as a software designer and later to Xerox. as an operating system architect. In 1978 he joined Computer Sciences Corporation as a software consultant. Later, while employed by Lockheed in the 1980s, McAfee received a copy of the Pakistani Brain computer virus and began developing software to combat viruses. In 1987 McAfee founded McAfee Associates, a computer anti-virus company. He was the first to distribute anti-virus software using the shareware business model. In 1989, he quit Lockheed and began working full-time at McAfee Associates, which he initially operated from his home in Santa Clara, California.The company was incorporated in Delaware in 1992, and McAfee resigned from the company in 1994. Two years after McAfee Associates went public, McAfee sold his remaining stake in the company. Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. This company later became Network Associates, a name it retained for seven years until it was renamed McAfee. Now a subsidiary of Intel corporation, McAfee remains today as one of the largest anti-virus companies in the world. Other business ventures that he founded included Tribal Voice, which developed one of the first instant messaging programs, PowWow. In 2000, John McAfee invested in and joined the board of directors of Zone Labs, makers of firewall software, prior to its acquisition by Check Point Software in 2003. In August 2009, The New York Times reported that McAfee's personal fortune had declined to $4 million from a peak of $100 million, the effect of the global financial crisis and recession on his investments. Beginning in February 2010, McAfee started a new venture in the field of bacterial quorum sensing. His company QuorumEx has its headquarters in Belize and is working towards producing commercial all natural antibiotics based on anti-quorum sensing technology. In 2013 McAfee started a new company, Future Tense Central, to produce a secure computer network device called the D-Central. Website: www.FutureTenseCentral.com www.JasonHartman.com/Properties

The History of Computing
PGP and the First Amendment

The History of Computing

Play Episode Listen Later Sep 28, 2020 14:17


I was giving a talk at DefCon one year and this guy starts grilling me at the end of the talk about the techniques Apple was using to encrypt home directories at the time with new technology called Filevault. It went on a bit, so I did that thing you sometimes have to do when it's time to get off stage and told him we'd chat after. And of course he came up - and I realized he was really getting at the mechanism used to decrypt and the black box around decryption. He knew way more than I did about encryption so I asked him who he was. When he told me, I was stunned. Turns out that like me, he enjoyed listening to A Prairie Home Companion. And on that show, Garrison Keillor would occasionally talk about Ralph's Pretty Good Grocery in a typical Minnesota hometown he'd made up for himself called Lake Wobegon. Zimmerman liked the name and so called his new encryption tool PGP, short for Pretty Good Privacy. It was originally written to encrypt messages being sent to bulletin boards.  That original tool didn't require any special license, provided it wasn't being used commercially. And today, much to the chagrin of the US government at the time, it's been used all over the world to encrypt emails, text files, text messages, directories, and even disks. But we'll get to that in a bit.  Zimmerman had worked for the Nuclear Weapons Freeze Campaign in the 80s after getting a degree in computer science fro Florida Atlantic University in 1978. And after seeing the government infiltrate organizations organizing Vietnam protests, he wanted to protect the increasingly electronic communications of anti-nuclear protests and activities.  The world was just beginning to wake up to a globally connected Internet. And the ARPAnet had originally been established by the military industrial complex, so it was understandable that he'd want to keep messages private that just happened to be flowing over a communications medium that many in the defense industry knew well. So he started developing his own encryption algorithm called BassOmatic in 1988. That cipher used symmetric keys with control bits and pseudorandom number generation as a seed - resulting in 8 permutation tables. He named BassOmatic after a Saturday Night Live skit. I like him more and more.  He'd replace BassOmatic with IDEA in version 2 in 1992. And thus began the web of trust, which survives to this day in PGP, OpenPGP, and GnuPG. Here, a message is considered authentic based on it being bound to a public key - one that is issued in a decentralized model where a certificate authority issues a public and private key where messages can only be encrypted or signed with the private key and back then you would show your ID to someone at a key signing event or party in order to get a key. Public keys could then be used to check that the individual you thought was the signer really is. Once verified then a separate key could be used to encrypt messages between the parties.  But by then, there was a problem. The US government began a criminal investigation against Zimmerman in 1993. You see, the encryption used in PGP was too good. Anything over a 40 bit encryption key was subject to US export regulations as a munition. Remember, the Cold War. Because PGP used 128 bit keys at a minimum. So Zimmerman did something that the government wasn't expecting. Something that would make him a legend. He went to MIT Press and published the PGP source code in a physical book. Now, you could OCR the software, run it through a compiler. Suddenly, his code was protected as an exportable book by the First Amendment.  The government dropped the investigation and found something better to do with their time. And from then on, source code for cryptographic software became an enabler of free speech, which has been held up repeatedly in the appellate courts. So 1996 comes along and PGP 3 is finally available. This is when Zimmerman founds PGP as a company so they could focus on PGP full-time. Due to a merger with Viacrypt they jumped to PGP 5 in 1997.  Towards the end of 1997 Network Associates acquired PGP and they expanded to add things like intrusion detection, full disk encryption, and even firewalls. Under Network Associates they stopped publishing their source code and Zimmerman left in 2001. Network Associates couldn't really find the right paradigm and so merged some products together and what was PGP commandline ended up becoming McAfee E-Business Server in 2013.  But by 2002 PGP Corporation was born out of a few employees securing funding from Rob Theis to help start the company and buy the rest of the PGP assets from Network Associates. They managed to grow it enough to sell it for $300 million to Symantec and PGP lives on to this day.  But I never felt like they were in it just for the money. The money came from a centralized policy server that could do things like escrow keys. But for that core feature of encrypting emails and later disks, I really always felt like they wanted a lot of that free. And you can buy Symantec Encryption Desktop and command it from a server, S/MIME and OpenPGP live on in ways that real humans can encrypt their communications, some of which in areas where their messages might get them thrown in jail. By the mid-90s, mail wasn't just about the text in a message. It was more. RFC934 in 1985 had started the idea of encapsulating messages so you could get metadata. RFC 1521 in 1993 formalized MIME and by 1996, MIME was getting really mature in RFC2045. But by 1999 we wanted more and so S/MIME went out as RFC 2633. Here, we could use CMS to “cryptographically enhance” a MIME body. In other words, we could suddenly encrypt more than the text of an email and it since it was an accepted internet standard, it could be encrypted and decrypted with standard mail clients rather than just with a PGP client that didn't have all the bells and whistles of pretty email clients.  That included signing information, which by 2004 would evolve to include attributes for things like singingTime, SMIMECapabilities, algorithms and more.  Today, iOS can use S/MIME and keys can be stored in Exchange or Office 365 and that's compatible with any other mail client that has S/MIME support, making it easier than ever to get certificates, sign messages, and encrypt messages. Much of what PGP was meant for is also available in OpenPGP. OpenPGP is defined by the OpenPGP Working Group and you can see the names of some of these guardians of privacy in RFC 4880 from 2007. Names like J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer. Despite the corporate acquisitions, the money, the reprioritization of projects, these people saw fit to put powerful encryption into the hands of real humans and once that pandoras box had been opened and the first amendment was protecting that encryption as free speech, to keep it that way. Use Apple Mail, GPGTools puts all of this in your hands. Use Android, get FairEmail. Use Windows, grab EverDesk.  This specific entry felt a little timely. Occasionally I hear senators tell companies they need to leave backdoors in products so the government can decrypt messages. And a terrorist forces us to rethink that basic idea of whether software that enables encryption is protected by freedom of speech. Or we choose to attempt to ban a company like WeChat, testing whether foreign entities who publish encryption software are also protected. Especially when you consider whether Tencent is harvesting user data or if the idea they are doing that is propaganda. For now, US courts have halted a ban on WeChat. Whether it lasts is one of the more intriguing things I'm personally watching these days, despite whatever partisan rhetoric gets spewed from either side of the isle, simply for the refinement to the legal interpretation that to me began back in 1993. After over 25 years we still continue to evolve our understanding of what truly open and peer reviewed cryptography being in the hands of all of us actually means to society.  The inspiration for this episode was a debate I got into about whether the framers of the US Constitution would have considered encryption, especially in the form of open source public and private key encryption, to be free speech. And it's worth mentioning that Washington, Franklin, Hamilton, Adams, and Madison all used  ciphers to keep their communications private. And for good reason as they knew what could happen should their communications be leaked, given that Franklin had actually leaked private communications when he was the postmaster general. Jefferson even developed his own wheel cipher, which was similar to the one the US army used in 1922. It comes down to privacy. The Constitution does not specifically call out privacy; however, the first Amendment guarantees the privacy of belief, the third, the privacy of home, the fourth, privacy against unreasonable search and the fifth, privacy of of personal information in the form of the privilege against self-incrimination. And giving away a private key is potentially self-incrimination. Further, the ninth Amendment has broadly been defined as the protection of privacy.  So yes, it is safe to assume they would have supported the transmission of encrypted information and therefore the cipher used to encrypt to be a freedom. Arguably the contents of our phones are synonymous with the contents of our homes though - and if you can have a warrant for one, you could have a warrant for both. Difference is you have to physically come to my home to search it - whereas a foreign government with the same keys might be able to decrypt other data. Potentially without someone knowing what happened. The Electronic Communications Privacy Act of 1986 helped with protections but with more and more data residing in the cloud - or as with our mobile devices synchronized with the cloud, and with the intermingling of potentially harmful data about people around the globe potentially residing (or potentially being analyzed) by people in countries that might not share the same ethics, it's becoming increasingly difficult to know what is the difference between keeping our information private, which the framers would likely have supported and keeping people safe. Jurisprudence has never kept up with the speed of technological progress, but I'm pretty sure that Jefferson would have liked to have shared a glass of his favorite drink, wine, with Zimmerman. Just as I'm pretty sure I'd like to share a glass of wine with either of them. At Defcon or elsewhere!

Keep Leading!™
KL062: Leader as Coach

Keep Leading!™

Play Episode Listen Later May 7, 2020 36:34


KL062 Jennifer Hall Executive Coach, Leadership Trainer and Assessment Author Leader as Coach Episode Summary Dr. Jennifer Hall is an executive coach, leadership trainer and Co-author of the Entrepreneurial Mindset Profile (EMP) and the Coaching Mindset Index (CMI). We discussed why all leaders should also be a coach. Bio Dr. Jen Hall is an executive coach, leadership trainer and assessment author. A systems thinker who understands and attends to both individual and organizational dynamics, Jen brings to her coaching and speaking engagements a high level of energy, a sense of humor, and a strong bias for action. Jen spent almost 20 years as a coaching talent manager—selecting, developing and managing executive coaches—for the Center for Creative Leadership (CCL) or one of its Network Associates. In 2015, she launched her own business, Mindset Coaching. The Entrepreneurial Mindset Profile™ (EMP), one of the two assessments Jen co-authored, measures 14 dimensions that have been found to distinguish business owners from corporate managers. The Coaching Mindset Index (CMI), available in both self-report and 360-degree formats, enables leaders and organizations to understand and enhance the strategies they use to grow and develop their staff. Jen is a 2019 graduate of the Oxford Brooks Coaching Supervision Programme. A licensed psychologist and Board-Certified Coach, Jen holds a Ph.D. in Clinical Psychology from the University of Connecticut and a B.S. degree from Trinity College in Hartford, Connecticut. She lives with her husband and two children in Redington Beach, Florida. Website https://drjenhall.com/   LinkedIn https://www.linkedin.com/in/drjenniferhall   Twitter https://twitter.com/drjenhall_   Leadership Quote "Before you are a leader, success is all about growing yourself. When you become a leader, success is all about growing others."—Jack Welch   Subscribe, share and review on Apple Podcasts! https://podcasts.apple.com/us/podcast/keep-leading/id1461490512 Full Episode Transcripts and Detailed Guest Information  www.KeepLeadingPodcast.com Keep Leading LIVE (Live Recordings of the Keep Leading!® Podcast) www.KeepLeadingLive.com The Keep Leading!® podcast is for people passionate about leadership. It is dedicated to leadership development and insights. Join your host Eddie Turner, The Leadership Excelerator® as he speaks with accomplished leaders and people of influence across the globe as they share their journey to leadership excellence. Listen as they share leadership strategies, techniques and insights. For more information visit https://eddieturnerllc.com or follow Eddie Turner on Twitter and Instagram at @eddieturnerjr. Like Eddie Turner LLC on Facebook. Connect with Eddie Turner on LinkedIn. Learn more about your ad choices. Visit megaphone.fm/adchoices

InSecurity
Richard Stiennon: Security Yearbook 2020

InSecurity

Play Episode Listen Later Feb 10, 2020 69:51


Richard Stiennon: Security Yearbook 2020     Security Yearbook 2020 is the story of the people, companies, and events that comprise the history of of the IT security industry. In this inaugural edition, author Richard Stiennon digs into the early history of Symantec, Network Associates, BorderWare, Check Point Software. These iconic names and dozens of other companies contributed to the growth of an industry now is comprised of over 2,000 vendors of security products.  In addition to the history there are stories from industry pioneers such as Gil Shwed CEO and founder of Check Point Software; Chris Blask Co-inventor of Borderware Firewall and Sandra Toms Chief Organizer of the RSA Conference. The directory lists all the vendors alphabetically, by country, and by category, making an invaluable desk reference for students, practitioners, researchers, and investors.   For the first time ever, a complete history of the development of IT security solutions is presented in one place. The focus is on the pioneers in the space and the companies that arose from their efforts. Individual stories from these pioneers are presented in their own voice while the overall story of the space is recounted as it grew from modest beginnings to a $100 billion+ industry with over 2,200 companies.   This week on InSecurity, Matt welcomes Richard Stiennon back to the show. Already a legend in cybersecurity, Richard poured his knowledge and skill into creating the Security Yearbook 2020. Is this THE definitive guide to the ever-evolving and growing Cybsecurity world? Tune in and find out!   If you are coming to the RSA Conference in San Francisco at the end of the month you can find copies all over. Check out Where to Find Stiennon at RSAC 202.   About Richard Stiennon     Richard Stiennon (@stiennon & @cyberwar)played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PricewaterhouseCoopers before being drafted into Gartner in 2000 to cover the network security industry.   He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group.   Richard is the author of four books, including Secure Cloud Transformation: The CIO's Journey. He is an aerospace engineer (University of Michigan '82) turned historian (King's College, London, 2014)   About Matt Stephenson     Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe.   Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come   Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

DEF CON 23 [Audio] Speeches from the Hacker Convention
David Mortman - Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 21, 2015


Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-Mortman-Docker-UPDATED.pdf Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You David Mortman Chief Security, Architect & Distinguished Engineer, Dell Software Docker is all the rage these days. Everyone is talking about it and investing in it, from startups to enterprises and everything in between. But is it secure? What are the costs and benefits of using it? Is this just a huge risk or a huge opportunity? There's a while lot of ranting and raving going on, but not nearly enough rational discourse. I'll cover the risks and rewards of using Docker and similar technologies such as AppC as well as discuss the larger implications of using orchestration systems like Mesos or Kubernetes. This talk will cover the deep technical issues to be concerned about as well as the pragmatic realities of the real world. David Mortman is the Chief Security Architect and Distinguished Engineer at Dell Software and is a Contributing Analyst at Securosis. Before Dell, he ran operations and security for C3. Formerly the Chief Information Security Officer for Siebel Systems, Inc., Previously, Mr. Mortman was Manager of IT Security at Network Associates. Mr. Mortman has also been a regular panelist and speaker at RSA, Blackhat, DEF CON and BruCon as well. Mr.Mortman sits on a variety of advisoryboards including Qualys, Lookout and Risk I/O. He holds a BS in Chemistry from the University of Chicago. David writes for Securosis, Emergent Chaos and the New School blogs.

DEF CON 22 [Materials] Speeches from the Hacker Convention.
Panel - DEF CON Comedy Jam Part VII, Is This The One With The Whales?

DEF CON 22 [Materials] Speeches from the Hacker Convention.

Play Episode Listen Later Dec 13, 2014


Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Mortman/DEFCON-22-Fail-Panel-Defcon-Comedy-Jam-VII.pdf DEF CON Comedy Jam Part VII, Is This The One With The Whales? David Mortman @MORTMAN Rich Mogull @RMOGULL Chris Hoff @BEAKER Dave Maynor @ERRATADAVE Larry Pesce @HAXORTHEMATRIX James Arlen @MYRCURIAL Rob Graham @ERRATAROB Alex Rothman Shostack @ARS_INFOSECTICA Weeeeeeeeee're baaaaaack. Bring out your FAIL. It's the most talked about panel at DEF CON! A standing room only event with a wait list at the door. Nothing is sacred, not the industry, not the audience, not even each other. Last year we raised over $2000 for the EFF and over $5000 over the last 5 years, let's see how much we can raise this year.... David Mortman is the Chief Security Architect and Distinguished Engineer at Dell Enstratius and is a Contributing Analyst at Securosis. Before enStratus, he ran operations and security for C3. Formerly the Chief Information Security Officer for Siebel Systems, Inc., Previously, Mr. Mortman was Manager of IT Security at Network Associates. Mr. Mortman has also been a regular panelist and speaker at RSA, Blackhat, DEF CON and BruCon as well. Mr.Mortman sits on a variety of advisoryboards including Qualys, Lookout and Virtuosi. He holds a BS in Chemistry from the University of Chicago. David writes for Securosis, Emergent Chaos and the New School blogs. James Arlen, CISA, is a senior consultant at Leviathan Security Group providing security consulting services to the utility, healthcare and financial verticals. He has been involved with implementing a practical level of information security in Fortune 500, TSE 100, and major public-sector corporations for over 20 years. James is also a contributing analyst with Securosis, faculty at IANS and a contributor to the Liquidmatrix Security Digest. Best described as: "Infosec geek, hacker, social activist, author, speaker, and parent." His areas of interest include organizational change, social engineering, blinky lights and shiny things. Larry is a Senior Security Analyst with InGuardians performing penetration testing, wireless assessments, and hardware hacking. He also diverts a significant portion of his attention co-hosting the Paul's Security Weekly podcast and likes to tinker with all things electronic and wireless, much to the disappointment of his family, friends, warranties, and his second Leatherman Multi-tool. Larry is an Extra Class Amateur Radio operator (KB1TNF) and enjoys developing hardware and real-world challenges for the Mid-Atlantic Collegiate Cyber Defense Challenge.

Creating Wealth Real Estate Investing with Jason Hartman
CW 353: NSA-Proof Internet Browsing with John McAfee Developer of the McAfee Antivirus Software & Founder of McAfee Associates

Creating Wealth Real Estate Investing with Jason Hartman

Play Episode Listen Later Dec 11, 2013 50:18


John McAfee is in the news, as he is trying to create an NSA-proof gadget used for private internet browsing, called "Decentral." [read more] McAfee, original creator of McAfee Antivirus software was born in the United Kingdom and raised in Salem, Virginia, United States.    McAfee was employed as a programmer by NASA's Institute for Space Studies in New York City from 1968 to 1970. From there he went to Univac as a software designer and later to Xerox. as an operating system architect. In 1978 he joined Computer Sciences Corporation as a software consultant. Later, while employed by Lockheed in the 1980s, McAfee received a copy of the Pakistani Brain computer virus and began developing software to combat viruses.   In 1987 McAfee founded McAfee Associates, a computer anti-virus company. He was the first to distribute anti-virus software using the shareware business model. In 1989, he quit Lockheed and began working full-time at McAfee Associates, which he initially operated from his home in Santa Clara, California.The company was incorporated in Delaware in 1992, and McAfee resigned from the company in 1994. Two years after McAfee Associates went public, McAfee sold his remaining stake in the company.   Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. This company later became Network Associates, a name it retained for seven years until it was renamed McAfee. Now a subsidiary of Intel corporation, McAfee remains today as one of the largest anti-virus companies in the world.   Other business ventures that he founded included Tribal Voice, which developed one of the first instant messaging programs, PowWow. In 2000, John McAfee invested in and joined the board of directors of Zone Labs, makers of firewall software, prior to its acquisition by Check Point Software in 2003.   In August 2009, The New York Times reported that McAfee's personal fortune had declined to $4 million from a peak of $100 million, the effect of the global financial crisis and recession on his investments. Beginning in February 2010, McAfee started a new venture in the field of bacterial quorum sensing. His company QuorumEx has its headquarters in Belize and is working towards producing commercial all natural antibiotics based on anti-quorum sensing technology. In 2013 McAfee started a new company, Future Tense Central, to produce a secure computer network device called the D-Central.

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Gerhard Eschelbeck: The Laws of Vulnerabilities (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

Play Episode Listen Later Oct 31, 2006 82:25


"New vulnerabilities to networks are discovered and published on a daily base. With each such announcement, the same questions arise. How significant is this vulnerability? How prevalent is this vulnerability? How easy is this vulnerability to exploit? Are any of my systems affected by this vulnerability? Due to lack of global vulnerability data, answers to these questions are often hard to find and risk rating is even more difficult. As part of ongoing research, Gerhard Eschelbeck of Qualys, Inc. has been gathering statistical vulnerability information for more than two years. Those vulnerabilities have been identified in the real world across hundreds of thousands of systems and networks. This data is not identifiable to individual users or systems. However, it provides significant statistical data for research and analysis, which enabled Gerhard to define the Laws of Vulnerabilities. The Laws of Vulnerabilities is derived from vulnerability data gathered during the past 30 months from over five million scans of individual systems from global organizations. During this timeframe a collective amount of more than three million vulnerabilities - reflecting multiple levels of severity and prevalence - has been identified. Furthermore, the responses to external events (i.e. availability of an exploit or worm taking advantage of a vulnerability) have been studied providing valuable lessons for attendees on how to protect networks and systems from evolving threats. Gerhard Eschelbeck is a respected CTO, researcher and author in the network security field. He published the now well-known ""Laws of Vulnerabilities,"" the industry's first research derived from a statistical analysis of millions of critical vulnerabilities collected across thousands of networks over a multi-year period. Eschelbeck presented his findings before Congress at the hearing on ""Worm and Virus Defense: How Can We Protect Our Nation's Computers from These Serious Threats?"" His research has been featured at major security conferences including Black Hat, CSI, and RSA and in numerous media outlets, including The Wall Street Journal, The Economist and others. Gerhard was named one of Infoworld's 25 Most Influential CTO's in 2003 and 2004 and is a significant contributor to the SANS Top 20 expert consensus identifying the most critical security vulnerabilities. Prior to joining Qualys, Eschelbeck was Senior VP of Engineering for security products at Network Associates, VP of Engineering of anti-virus products at McAfee Associates, and Founder of IDS GmbH, a secure remote control company acquired by McAfee. Earlier, he was a research scientist at the University of Linz, Austria, where he earned Masters and Ph.D. degrees in computer science and where he still teaches regularly in the field of network security. Eschelbeck has authored several papers on active security, automating security management, and multi-tier IDS. He is an inventor of numerous patents in the field of managed network security."

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

In the last year, there have been 45 security incidents compromising the personal information of 9.3 million individuals. What can we do given our current situation? How are we going to successfully secure personal information moving forward? This panel will discuss the future of personal information and its implications on privacy. Joseph Ansanelli is CEO of Vontu, a software company focused on the insider threat. Joseph has spoken to Congress twice in the past twelve months as an advocate of privacy and consumer data standards. Mr. Ansanelli has successfully co-founded and led two other companies and has an extensive track record of developing innovative solutions into successful companies. His first venture, Trio Development's Claris Organizer, was ultimately acquired by Palm, Inc. Mr. Ansanelli holds four patents and received a B.S. in Applied Economics from the Wharton School at the University of Pennsylvania Rich Baich, CISSP, CISM, Chief Information Security Officer, ChoicePoint. Mr. Baich has been working in the Information Security Business for over 10 years and has extensive experience working with government and commercial executives providing risk management and consultative council while developing, improving and implementing security architecture, solutions and policies. He has held security leadership positions as the Cryptolog Officer for the National Security Agency (NSA), Sr. Director Professional Services at Network Associates (now McAfee) and after 9/11 as the Special Assistant to the Deputy Director for the National Infrastructure Protection Center (NIPC) at the Federal Bureau of Investigation (FBI). Rich is the author of a security executive leadership guidebook, Winning as a CISO. The book is the first-of-its-kind to detail and provide the roadmap to transform security executives from a technical and subject matter expert to a comprehensive well-rounded business executive. He holds a BS from United States Naval Academy, MBA / MSM from University of Maryland University College, and has been awarded the National Security Telecommunications and Information Systems Security (NSTISSI) 4011 Certification and the NSA sponsored Information Systems Security (INFOSEC) Assessment Methodology (IAM) Certification. Adam Shostack is a privacy and security consultant and startup veteran. Adam worked at Zero-Knowledge building and running the Evil Genius group of advanced technology experts, building prototypes and doing research into future privacy technologies, including privacy enhancing networks, credentials, and electronic cash. He has published papers on the security, privacy, as well as economics, copyright and trust. Shostack sits on the Advisory Board of the Common Vulnerabilities and Exposures initiative, the Technical Advisory Board of Counterpane Internet Security, Inc and others. Adam is now an independent consultant. Paul Proctor is a vice president in the security and risk practice of Gartner Research. His coverage includes Legal and Regulatory Compliance, Event Log Management, Security Monitoring (Host/Network IDS/IPS), Security Process Maturity Risk Management Programs, Forensics and Data Classification. Mr. Proctor has been involved in information security since 1985. He was founder and CTO of two security technology companies and developed both first- and second-generation, host-based intrusion-detection technologies. Mr. Proctor is a recognized expert in the field of information security and associated regulatory compliance issues surrounding the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley, and the Gramm-Leach-Bliley Act (GLBA). He has authored two Prentice Hall books and many white papers and articles. Mr. Proctor is an accomplished public speaker and was recognized for his expertise by being appointed to the original Telecommunications Infrastructure Protection working group used by Congress to understand critical infrastructure protection issues prior to the terrorist attack of Sept. 11. Previously, he worked for SAIC, Centrax, CyberSafe, Network Flight Recorder and Practical Security.

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

As a result of the Real-ID Act, all American citizens will have an electronically readable ID card that is linked to the federal database by May 2008. This means that in three years we will have a National ID card system that is being unilaterally controlled by one organization (DHS) whether we want it or not. Organizations such as the ACLU are already exploring opportunities for litigation. Privacy advocates cite Nazi Germany and slippery slopes, while the government waves the anti-terrorism flag back in their faces. Compromises and alternate solutions abound. Join us for a lively debate/open forum as an attempt to find a useable solution to this sticky problem. We will review solutions from the AMANA as well as ask why passports are not considered to be a privacy problem in the same ways. Would a National ID card make us safer? What to do about 15 million illegal immigrants? If college students can fake an ID, why can't a terrorist? What civil rights are abrogated by requiring everyone to possess an ID? What problem are we trying to solve anyway and will federal preemption address them? David Mortman, Chief Information Security Officer for Siebel Systems, Inc., and his team are responsible for Siebel Systems' worldwide IT security infrastructure, both internal and external. He also works closely with Siebel's product groups and the company's physical security team and is leading up Siebel's product security and privacy efforts. Previously, Mr. Mortman was Manager of IT Security at Network Associates, where, in addition to managing data security, he deployed and tested all of NAI's security products before they were released to customers. Before that, Mortman was a Security Engineer for Swiss Bank. A CISSP, member of USENIX/SAGE and ISSA, and an invited speaker at RSA 2002 and 2005 security conferences, Mr. Mortman has also been a panelist at InfoSecurity 2003 and Blackhat 2004. He holds a BS in Chemistry from the University of Chicago. Dennis Bailey is the Chief Operating Officer for Comter Systems, a top-secret, 8(a) information technology and management consulting firm based out of Fairfax, Virginia. He is also the author of "The Open Society Paradox: Why the Twenty-First Century Calls for More Openness Not Less", a recently published book which makes the case for secure identification and information sharing. He is active in the fields of identification, information sharing and security. He was a participant in the Sub-group on Identification for the Markle Foundation Task Force on Terrorism. He participates on the ITAA's Identity Management Task Group and is a member of the Coalition for a Secure Driver's License. His education includes a master's degree in political science from American University, where he worked at the Center for Congressional and Presidential Studies. Dennis also has a master's degree in psychology from the University of Dayton, where he worked at the Social Science Research Center. Jim Harper: As director of information policy studies, Jim Harper speaks, writes, and advocates on issues at the intersection of business, technology, and public policy. His work focuses on the difficult problems of adapting law and policy to the unique problems of the information age. Jim is also the editor of Privacilla.org, a Web-based think-tank devoted exclusively to privacy. He is a member of the Department of Homeland Security's Data Privacy and Integrity Advisory Committee. In addition to giving dozens of speeches and participating in panel discussions and debates nationwide, Jim's work has been quoted and cited by USA Today, the Associated Press, and Reuters, to name a few. He has appeared on numerous radio programs and on television, commenting for Fox News, CBS News, and MSNBC. Jim is a native of California and a member of the California bar. He earned his bachelor's degree in political science at the University of California, Santa Barbara, where he focused on American politics and the federal courts. At Hastings College of the Law, Jim served as editor-in-chief of the Hastings Constitutional Law Quarterly. In addition to numerous writings and ghost-writings in the trades and popular press, his scholarly articles have appeared in the Administrative Law Review, the Minnesota Law Review, and the Hastings Constitutional Law Quarterly. Rhonda E. MacLean is a charter member of the Global Council of Chief Security Officers. The Council is a think tank comprised of a group of influential corporate, government and academic security experts dedicated to encouraging dialogue and action to meet the new challenges of global online security. MacLean provided leadership as the Global Chief Information Security Officer for Bank of America from 1996 until 2005. At Bank of America she was responsible for company-wide information security policies and procedures, support for the lines of business in their management of information risk, implementation of security technology, cyber forensics and investigations, and awareness for the company's leadership, associate base and outside suppliers. In that role she provided leadership for a number of company-wide initiatives designed to protect sensitive customer and company information. In addition, under her leadership the bank's corporate information security organization has been a leader in innovation, filing for numerous U.S. Patents in the areas of infrastructure risk management and information security. After many years of service on some of the industry's most important associations, advisory boards and think tanks, she was appointed in 2002 by the Secretary of the Treasury to serve as the financial services sector coordinator for critical infrastructure protection and homeland security. In that role, she established a Limited Liability Corporation which brought together 26 financial service trade associations, utilities and professional institutes to work in partnership with Treasury to create several important industry initiatives designed to ensure industry cooperation and resiliency. She continues to serve as Chairman Emeritus for the Council. In September 2003, The Executive Women's Forum named MacLean one of five "Women of Vision", one of the top business leaders shaping the information security industry. MacLean was named one of the 50 most powerful people in the network industry in NetworkWorld's 2003 and 2004 issues. In recognition of her continued leadership in the security field, she was awarded CSO's Compass Award in 2005. In April 2005, The Friends of a Child's Place, a Charlotte-based advocacy for the homeless, named her one of the "First Ladies of Charlotte" in recognition of her pioneering role in information security and her support for the Charlotte community. MacLean has spent more than 25 years in the information technology industry. Immediately before joining Bank of America, MacLean spent 14 years at The Boeing Company where she was the Senior Information Security Manager for Boeing's proprietary and government programs. She is certified by the Information Systems Audit and Control Association as a Certified Information Security Manager.>

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

In the last year, there have been 45 security incidents compromising the personal information of 9.3 million individuals. What can we do given our current situation? How are we going to successfully secure personal information moving forward? This panel will discuss the future of personal information and its implications on privacy. Joseph Ansanelli is CEO of Vontu, a software company focused on the insider threat. Joseph has spoken to Congress twice in the past twelve months as an advocate of privacy and consumer data standards. Mr. Ansanelli has successfully co-founded and led two other companies and has an extensive track record of developing innovative solutions into successful companies. His first venture, Trio Development's Claris Organizer, was ultimately acquired by Palm, Inc. Mr. Ansanelli holds four patents and received a B.S. in Applied Economics from the Wharton School at the University of Pennsylvania Rich Baich, CISSP, CISM, Chief Information Security Officer, ChoicePoint. Mr. Baich has been working in the Information Security Business for over 10 years and has extensive experience working with government and commercial executives providing risk management and consultative council while developing, improving and implementing security architecture, solutions and policies. He has held security leadership positions as the Cryptolog Officer for the National Security Agency (NSA), Sr. Director Professional Services at Network Associates (now McAfee) and after 9/11 as the Special Assistant to the Deputy Director for the National Infrastructure Protection Center (NIPC) at the Federal Bureau of Investigation (FBI). Rich is the author of a security executive leadership guidebook, Winning as a CISO. The book is the first-of-its-kind to detail and provide the roadmap to transform security executives from a technical and subject matter expert to a comprehensive well-rounded business executive. He holds a BS from United States Naval Academy, MBA / MSM from University of Maryland University College, and has been awarded the National Security Telecommunications and Information Systems Security (NSTISSI) 4011 Certification and the NSA sponsored Information Systems Security (INFOSEC) Assessment Methodology (IAM) Certification. Adam Shostack is a privacy and security consultant and startup veteran. Adam worked at Zero-Knowledge building and running the Evil Genius group of advanced technology experts, building prototypes and doing research into future privacy technologies, including privacy enhancing networks, credentials, and electronic cash. He has published papers on the security, privacy, as well as economics, copyright and trust. Shostack sits on the Advisory Board of the Common Vulnerabilities and Exposures initiative, the Technical Advisory Board of Counterpane Internet Security, Inc and others. Adam is now an independent consultant. Paul Proctor is a vice president in the security and risk practice of Gartner Research. His coverage includes Legal and Regulatory Compliance, Event Log Management, Security Monitoring (Host/Network IDS/IPS), Security Process Maturity Risk Management Programs, Forensics and Data Classification. Mr. Proctor has been involved in information security since 1985. He was founder and CTO of two security technology companies and developed both first- and second-generation, host-based intrusion-detection technologies. Mr. Proctor is a recognized expert in the field of information security and associated regulatory compliance issues surrounding the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley, and the Gramm-Leach-Bliley Act (GLBA). He has authored two Prentice Hall books and many white papers and articles. Mr. Proctor is an accomplished public speaker and was recognized for his expertise by being appointed to the original Telecommunications Infrastructure Protection working group used by Congress to understand critical infrastructure protection issues prior to the terrorist attack of Sept. 11. Previously, he worked for SAIC, Centrax, CyberSafe, Network Flight Recorder and Practical Security.

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

As a result of the Real-ID Act, all American citizens will have an electronically readable ID card that is linked to the federal database by May 2008. This means that in three years we will have a National ID card system that is being unilaterally controlled by one organization (DHS) whether we want it or not. Organizations such as the ACLU are already exploring opportunities for litigation. Privacy advocates cite Nazi Germany and slippery slopes, while the government waves the anti-terrorism flag back in their faces. Compromises and alternate solutions abound. Join us for a lively debate/open forum as an attempt to find a useable solution to this sticky problem. We will review solutions from the AMANA as well as ask why passports are not considered to be a privacy problem in the same ways. Would a National ID card make us safer? What to do about 15 million illegal immigrants? If college students can fake an ID, why can't a terrorist? What civil rights are abrogated by requiring everyone to possess an ID? What problem are we trying to solve anyway and will federal preemption address them? David Mortman, Chief Information Security Officer for Siebel Systems, Inc., and his team are responsible for Siebel Systems' worldwide IT security infrastructure, both internal and external. He also works closely with Siebel's product groups and the company's physical security team and is leading up Siebel's product security and privacy efforts. Previously, Mr. Mortman was Manager of IT Security at Network Associates, where, in addition to managing data security, he deployed and tested all of NAI's security products before they were released to customers. Before that, Mortman was a Security Engineer for Swiss Bank. A CISSP, member of USENIX/SAGE and ISSA, and an invited speaker at RSA 2002 and 2005 security conferences, Mr. Mortman has also been a panelist at InfoSecurity 2003 and Blackhat 2004. He holds a BS in Chemistry from the University of Chicago. Dennis Bailey is the Chief Operating Officer for Comter Systems, a top-secret, 8(a) information technology and management consulting firm based out of Fairfax, Virginia. He is also the author of "The Open Society Paradox: Why the Twenty-First Century Calls for More Openness Not Less", a recently published book which makes the case for secure identification and information sharing. He is active in the fields of identification, information sharing and security. He was a participant in the Sub-group on Identification for the Markle Foundation Task Force on Terrorism. He participates on the ITAA's Identity Management Task Group and is a member of the Coalition for a Secure Driver's License. His education includes a master's degree in political science from American University, where he worked at the Center for Congressional and Presidential Studies. Dennis also has a master's degree in psychology from the University of Dayton, where he worked at the Social Science Research Center. Jim Harper: As director of information policy studies, Jim Harper speaks, writes, and advocates on issues at the intersection of business, technology, and public policy. His work focuses on the difficult problems of adapting law and policy to the unique problems of the information age. Jim is also the editor of Privacilla.org, a Web-based think-tank devoted exclusively to privacy. He is a member of the Department of Homeland Security's Data Privacy and Integrity Advisory Committee. In addition to giving dozens of speeches and participating in panel discussions and debates nationwide, Jim's work has been quoted and cited by USA Today, the Associated Press, and Reuters, to name a few. He has appeared on numerous radio programs and on television, commenting for Fox News, CBS News, and MSNBC. Jim is a native of California and a member of the California bar. He earned his bachelor's degree in political science at the University of California, Santa Barbara, where he focused on American politics and the federal courts. At Hastings College of the Law, Jim served as editor-in-chief of the Hastings Constitutional Law Quarterly. In addition to numerous writings and ghost-writings in the trades and popular press, his scholarly articles have appeared in the Administrative Law Review, the Minnesota Law Review, and the Hastings Constitutional Law Quarterly. Rhonda E. MacLean is a charter member of the Global Council of Chief Security Officers. The Council is a think tank comprised of a group of influential corporate, government and academic security experts dedicated to encouraging dialogue and action to meet the new challenges of global online security. MacLean provided leadership as the Global Chief Information Security Officer for Bank of America from 1996 until 2005. At Bank of America she was responsible for company-wide information security policies and procedures, support for the lines of business in their management of information risk, implementation of security technology, cyber forensics and investigations, and awareness for the company's leadership, associate base and outside suppliers. In that role she provided leadership for a number of company-wide initiatives designed to protect sensitive customer and company information. In addition, under her leadership the bank's corporate information security organization has been a leader in innovation, filing for numerous U.S. Patents in the areas of infrastructure risk management and information security. After many years of service on some of the industry's most important associations, advisory boards and think tanks, she was appointed in 2002 by the Secretary of the Treasury to serve as the financial services sector coordinator for critical infrastructure protection and homeland security. In that role, she established a Limited Liability Corporation which brought together 26 financial service trade associations, utilities and professional institutes to work in partnership with Treasury to create several important industry initiatives designed to ensure industry cooperation and resiliency. She continues to serve as Chairman Emeritus for the Council. In September 2003, The Executive Women's Forum named MacLean one of five "Women of Vision", one of the top business leaders shaping the information security industry. MacLean was named one of the 50 most powerful people in the network industry in NetworkWorld's 2003 and 2004 issues. In recognition of her continued leadership in the security field, she was awarded CSO's Compass Award in 2005. In April 2005, The Friends of a Child's Place, a Charlotte-based advocacy for the homeless, named her one of the "First Ladies of Charlotte" in recognition of her pioneering role in information security and her support for the Charlotte community. MacLean has spent more than 25 years in the information technology industry. Immediately before joining Bank of America, MacLean spent 14 years at The Boeing Company where she was the Senior Information Security Manager for Boeing's proprietary and government programs. She is certified by the Information Systems Audit and Control Association as a Certified Information Security Manager.>