Tag Archives: IT security

Keynote Speaker Edgar Perez to Lead Cybersecurity Workshop for CEOs in Singapore, London and New York

Edgar Perez, author of Knightmare on Wall Street and The Speed Traders, partnering with Terrapinn Training to bring key insights for board members and CEOs who need to become more educated about cyber security today.

New York City, NY, USA — As cyber attacks become more common, companies are increasingly investing in cyber security protections and awareness. But even with the best systems in place, hackers can still easily break into a company’s network if employees and contractors aren’t also being diligent about security. Cyber criminals have gotten much better at disguising malicious email to make it look more legitimate. So employees need to be vigilant and ask questions about all of the email they receive that raises even the slightest suspicion, which is most likely not what happened at some of the high-profile cyber security breaches that have been in the headlines: Adobe, E*Trade, Fidelity, Home Depot, Neiman Marcus, Sony, Target and Wal-mart.

As Internet usage becomes increasingly widespread and information technology ever more complex, cybersecurity is becoming an increasingly important and business-critical field. Are you and your organization effectively prepared to handle cybersecurity threats? Do you know how to identify threats, address challenges and apply a cybersecurity framework? Participants at Terrapinn Training’s 3-Day Masterclass Cybersecurity will:

• Gain a comprehensive understanding of cybersecurity and its key aspects
• Get to grips with various cybersecurity testing methods
• Learn valuable system administration techniques for executives
• Master the cybersecurity framework and its five core functions
• Discover how to establish or improve your cybersecurity program
• Consider how the “weak human link” can become the organization’s greatest strength
• Understand the four components of the cyber preparedness continuum

Edgar Perez, author of The Speed Traders and Knightmare on Wall Street, is a recognized keynote speaker and director of programs targeted at board members, chief executive officers and senior executives looking for new ways to gain and maintain a competitive business advantage. He can be reached through Twitter and Weibo.

ABOUT KNIGHTMARE ON WALL STREET
Knightmare on Wall Street (http://www.knightmareonwallstreet.com), The Rise and Fall of Knight Capital and the Biggest Risk for Financial Markets, provides a fascinating account of what it took to elevate the firm to the cusp of the retail investing revolution of the late 1990s, to struggle through booms and busts, and to bring the firm down, to end up ultimately being ignominiously bought up by a competitor.

Knight Capital announced a staggering loss of $440 million. What followed after this shocking announcement were several rounds of desperate conversations with a number of vulture players who had smelled opportunity and were readying themselves to pick up bargain-priced pieces. On August 6, 2012, Joyce confirmed that Knight Capital had struck a deal with Jefferies, TD Ameritrade, Blackstone, GETCO, Stephens, and Stifel Financial, staving off collapse days after the trading mishap.

Knightmare on Wall Street, is a thrilling minute-by-minute account of the terrifying hours following Knight Capital’s August 1, 2012 trading debacle, with news-breaking research regarding the firm’s 17 years of tumultuous existence as an independent company. Knightmare on Wall Street is the definitive behind-the-scenes story of Knight Capital.

ABOUT THE SPEED TRADERS (http://www.thespeedtraders.com)
High-frequency traders have been called many things-from masters of the universe and market pioneers to exploiters, computer geeks, and even predators. Everyone in the business of investing has an opinion of speed traders, but how many really understand how they operate? The shadow people of the investing world, today’s high-frequency traders have decidedly kept a low profile-until now. In this title, The Speed Traders, Mr. Perez opens the door to the secretive world of high-frequency trading (HFT). Inside, prominent figures of HFT drop their guard and speak with unprecedented candidness about their trade.

Mr. Perez begins with an overview of computerized trading, which formally began on February 8, 1971, when NASDAQ launched the world’s first electronic market with 2,500 over-the-counter stocks and which has evolved into the present-day practice of making multiple trades in a matter of microseconds. He then picks the brains of today’s top players. John Netto (M3 Capital), Manoj Narang (Tradeworx), and Aaron Lebovitz (Infinium Capital Management) are just a few of the luminaries who decided to break their silence and speak openly to Mr. Perez. Virtually all of the expertise available from the world of speed trading is packed into these pages.

The Speed Traders, published by McGraw-Hill, is the most comprehensive, revealing work available on the most important development in trading in generations. High-frequency trading will no doubt play an ever larger role as computer technology advances and the global exchanges embrace fast electronic access. The Speed Traders explains everything there is to know about how today’s high-frequency traders make millions-one cent at a time.

ABOUT EDGAR PEREZ
Mr. Edgar Perez is a published author, business consultant for billion-dollar private equity and hedge funds and Council Member at the Gerson Lehrman Group, Guidepoint Global Advisors and Research International, with subject matter expertise in cyber security, investing, trading, financial regulation (Dodd-Frank Act) and market structure.

He is author of Knightmare on Wall Street, The Rise and Fall of Knight Capital and the Biggest Risk for Financial Markets (2013), and The Speed Traders, An Insider’s Look at the New High-Frequency Trading Phenomenon That is Transforming the Investing World, published in English by McGraw-Hill Inc. (2011), Published in Mandarin by China Financial Publishing House (2012), and Investasi Super Kilat, published in Bahasa Indonesia by Kompas Gramedia (2012).

Mr. Perez is course director of Cybersecurity Boardroom Workshop, How Boards of Directors and CXOs Can Build the Proper Foundation to Address Today’s Information Security Challenges, and The Speed Traders Workshop, How High Frequency Traders Leverage Profitable Strategies to Find Alpha in Equities, Options, Futures and FX; he has presented his workshops in Singapore, Hong Kong, Sao Paulo, Seoul, Kuala Lumpur, Warsaw, Kiev, New York, Singapore, Beijing, Shanghai. He contributes to The New York Times and China’s International Finance News and Sina Finance.

Mr. Perez has presented to the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), Quant Investment & HFT Summit APAC (Shanghai), U.S. Securities and Exchange Commission (Washington DC), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (Shanghai) and Pace University (New York), among other public and private institutions. In addition, Mr. Perez has spoken at a number of global conferences, including Cyber Security World Conference (New York), Inside Market Data (Chicago), Emerging Markets Investments Summit (Warsaw), CME Group’s Global Financial Leadership Conference (Naples Beach, FL), Harvard Business School’s Venture Capital & Private Equity Conference (Boston), High-Frequency Trading Leaders Forum (New York, Chicago), MIT Sloan Investment Management Conference (Cambridge), Institutional Investor’s Global Growth Markets Forum (London), Technical Analysis Society (Singapore), TradeTech Asia (Singapore), FIXGlobal Face2Face (Seoul) and Private Equity Convention Russia, CIS & Eurasia (London).

Mr. Perez has been interviewed on CNN’s Quest Means Business, CNBC’s Squawk on the Street, Worldwide Exchange, Cash Flow and Squawk Box, FOX BUSINESS’s Countdown to the Closing Bell and After the Bell, Bloomberg TV’s Market Makers, CNN en Español’s Dinero, Petersburg – Channel 5, Sina Finance, BNN’s Business Day, CCTV China, Bankier.pl, TheStreet.com, Leaderonomics, GPW Media, Channel NewsAsia’s Business Tonight and Cents & Sensibilities. In addition, Mr. Perez has been featured on Sohu, News.Sina.com, Yicai, eastmoney, Caijing, ETF88.com, 360doc, AH Radio, CNFOL.com, CITICS Futures, Tongxin Securities, ZhiCheng.com, CBNweek.com, Caixin, Futures Daily, Xinhua, CBN Newswire, Chinese Financial News, ifeng.com, International Finance News, Finance.QQ.com, hexun.com, Finance.Sina.com, The Korea Times, The Korea Herald, The Star, The Malaysian Insider, BMF 89.9, iMoney Hong Kong, CNBC, Bloomberg Hedge Fund Brief, The Wall Street Journal, The New York Times, Dallas Morning News, Valor Econômico, FIXGlobal Trading, TODAY Online, Oriental Daily News and Business Times.

Mr. Perez was a vice president at Citigroup, a senior consultant at IBM, and a strategy consultant at McKinsey & Co. in New York City. Previously, he managed Operations and Technology for Peruval Finance. Mr. Perez has an undergraduate degree in Systems Engineering from Universidad Nacional de Ingeniería, Lima, Peru (1994), a Master of Administration from Universidad ESAN, Lima, Peru (1997) and a Master of Business Administration from Columbia Business School, New York, with a dual major in Finance and Management (2002). He belongs to the Beta Gamma Sigma honor society. Mr. Perez is an accomplished salsa and hustle dancer and resides in the New York City area.

Media Contact:
Julia Petrova
Media Relations Coordinator
The Speed Traders
+1-414-FORUMS0
jpetrova@thespeedtraders.com
http://www.mredgarperez.com

Edgar Perez Kicks off Asia Tour with Cybersecurity Boardroom Workshop 2015 in Bangkok, Jakarta, Sydney, Seoul and Tokyo

Edgar Perez, author of Knightmare on Wall Street and The Speed Traders, brings Cybersecurity Boardroom Workshop 2015, seminars in New York City, London, Dubai, Bangkok, Jakarta, Sydney, Taipei, Seoul and Tokyo that are targeted at board members and senior executives looking for new ways to gain and maintain competitive business advantage in one of the most critical subjects for corporations and governments worldwide.

New York City, NY, USA (September 23, 2015) — Mr. Edgar Perez, the renowned author, business consultant for private equity and hedge funds and Council Member at the Gerson Lehrman Group, is set to discuss at Cybersecurity Boardroom Workshop 2015 How Boards of Directors and CXOs Can Build the Proper Foundation to Address Today’s Information Security Challenges. Mr. Perez is a subject matter expert in cybersecurity, investing, trading, financial regulation (Dodd-Frank Act) and market structure.

Mr. Perez has presented at a number of global conferences, including Cyber Security World Conference 2014 (New York), MIT Sloan Investment Management Conference (Cambridge), Inside Market Data 2013 (Chicago), Institutional Investor’s Global Growth Markets Forum (London), Technical Analysis Society (Singapore), TradeTech Asia (Singapore), Emerging Markets Investments Summit 2013 (Warsaw), CME Group’s Global Financial Leadership Conference 2012 (Naples Beach, FL), Harvard Business School’s Venture Capital & Private Equity Conference (Boston0 High-Frequency Trading Leaders Forum (New York, Chicago), FIXGlobal Face2Face (Seoul) and Private Equity Convention Russia, CIS & Eurasia (London).

Additionally, Mr. Perez has been engaged to present to the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), U.S. Securities and Exchange Commission (Washington DC), Quant Investment & HFT Summit APAC 2012 (Shanghai), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (Shanghai) and Pace University (New York), among other public and private institutions. Mr. Perez’s participation at these forums has been praised by both organizers and attendees:

“It was such a pleasure to have you participate in our conference. The feedback was great and the information you shared with the audience was invaluable. Once again, thank you for your contribution in making the event a success.”

“I would like to show my appreciation on your willingness to share your insights about cybersecurity. We would certainly have you in mind as we move forward to deal with this very important issue.”

ABOUT CYBERSECURITY BOARDROOM WORKSHOP 2015
As cyber attacks become more common, companies are increasingly investing in cyber security protections. But even with the best systems in place, hackers can still easily break into a company’s network if workers aren’t also being diligent about security. Cyber criminals have gotten much better at disguising malicious email to make it look more legitimate. So employees need to be vigilant and ask questions about all of the email they receive that raises even the slightest suspicion, which is most likely not what happened at some of the high-profile cyber security breaches that have been in the headlines recently: Adobe, ADP, E*Trade, Fidelity, Home Depot, JPMorgan Chase, Nasdaq, Neiman Marcus, Sony, Target and Wal-mart.

Cybersecurity Boardroom Workshop 2015 (http://www.cybersecurityboardroomworkshop.com), How Boards of Directors and CXOs Can Build the Proper Foundation to Address Today’s Information Security Challenges, is a must-attend forum for board members, CEOs, CFOs, COOs and executive managers in New York City, London, Dubai, Bangkok, Jakarta, Sydney, Taipei, Seoul and Tokyo who need to become more educated about cyber security in order to ask questions that are strategic yet granular enough to address company specifics. Cybersecurity Boardroom Workshop 2015 is targeted at corporate decision-makers for whom cybersecurity readiness is a relatively new yet critically important area to be intelligently conversant about:

• Understand enterprise cybersecurity and the impact on shareholder value in the short and long term
• Learn how to identify current and future challenges to better enable management to focus on threat reduction and operational reliability
• Identify immediate security needs for the organization with actionable steps for senior management
• Get up to speed on international and domestic approaches and frameworks for effective cybersecurity practices corporate wide

DAY 1: UNDERSTANDING THE CYBER WORLD

Understanding Cybersecurity
• The trillion dollar global cyber risk environment
• The impact of cybersecurity attacks on shareholder value
• The enterprise-wide challenge of protecting the organization’s assets
• Identity theft and the legal implications of data breaches

Social Engineering: The “Weakest Human Link” in Cybersecurity
• The responsibility for cybersecurity in the organization
• Evaluating shortcomings in meeting cybersecurity workforce standards
• Assessing the quality of the cybersecurity workforce
• Assessing the effectiveness of current professionalization tools

Understanding the Cybersecurity Testing Method
• Reconnaissance: How to use tools to find vulnerable systems and devices
• Port scanning: How port information is exposed on computer systems
• Packet sniffing: How to gather information from computer systems
• Password policy and cracking: What to consider when developing password policy
• Vulnerability: How to reduce attacks by enforcing proactive compliance policies

Basics of Security Architecture for Board Members and CXOs
• How architecture defines the structure of a system and makes it explicit
• How the current computer network infrastructure was not designed originally to be secure
• The fundamentals of layered architecture: presentation, business, data, and service layers
• Embedding architecting security into systems from inception

DAY 2: RESPONDING TO THE CYBERSECURITY CHALLENGE

Introduction to NIST’s Cybersecurity Framework
• Identifying and prioritizing opportunities for improvement
• Assessing and accelerating progress toward the target state
• Describing the enterprise’s current and target cybersecurity posture
• Communicating with internal and external stakeholders about cybersecurity risk

The Five Core Functions of NIST’s Cybersecurity Framework
• Identify: Organizational understanding to manage cybersecurity risk
• Detect: How to identify the occurrence of a cybersecurity event
• Protect: Safeguards to ensure delivery of critical infrastructure services
• Respond: Taking action regarding a detected cybersecurity event
• Recover: Maintaining plans for resilience and to restore any impaired capabilities

Introduction to Intelligence-driven Cyber Network Defenses
• How investigations are based upon the scientific method: observing, hypothesis, evaluation, prediction and validation
• How to continuously improve the enterprise process for defending IT assets
• How to leverage cutting edge technology, vigilant people and innovative processes
• How to empower people to resolve the problem with guidance and mentoring

Establishing or Improving a Cybersecurity Program
• Prioritize and scope: Identifying business/mission objectives and high-level priorities
• Create a current profile: Developing a profile by indicating current degree of preparedness
• Conduct a risk assessment: Analyzing the operational environment in order to discern the likelihood of an attack
• Orient: Identifying related systems and assets, regulatory requirements, and risk approach
• Create a target profile: Describing the organization’s desired cybersecurity outcomes
• Determine, analyze, and prioritize gaps: Determining gaps between current and target profiles
• Implement action plan: Deciding which actions to take in regards to identified gaps

Cybersecurity Boardroom Workshop 2015 is specifically designed for boards of directors and CEOs of public and private firms looking for new ways to gain and maintain their competitive advantages. Business executives with responsibility for IT, finance, compliance, risk management and procurement as well as entrepreneurs and innovators are welcome to add their points of view to the debate.

Media Contact:
Julia Petrova
Media Relations Coordinator
The Speed Traders
+1-414-FORUMS0
jpetrova@thespeedtraders.com
http://www.mredgarperez.com

Edgar Perez, Cybersecurity Boardroom Workshop 2015, on China, Russia, U.S. and North Korea’s Hacking

Edgar Perez, author of Knightmare on Wall Street and The Speed Traders, brings Cybersecurity Boardroom Workshop 2015, seminars in New York City, London, Dubai, Bangkok, Jakarta, Sydney, Taipei, Seoul and Tokyo that are targeted at board members and senior executives looking for new ways to gain and maintain competitive business advantage in one of the most critical subjects for corporations and governments worldwide.

New York City, NY, USA (September 16, 2015) — Amid the massive Sony Pictures hacking crisis by the end of 2014, Russia offered support to North Korea in a sign that proved relations between the two nations were growing tighter. According to the Russians, the United States failed to offer any form of proof to back its claims against North Korea in the Sony Pictures hacking scandal.

What was China’s take on the situation? “Any civilized world will oppose hacker attacks or terror threats,” said China in a Global Times editorial. “But a movie like The Interview, which makes fun of the leader of an enemy of the U.S., is nothing to be proud of for Hollywood and U.S. society. Americans always believe they can jab at other countries’ leaders just because they are free to criticize or make fun of their own state leaders. Actually, the countries targeted in Hollywood movies are very selective, such as the Cold War era’s Soviet Union, North Korea and Iran.”

Mr. Edgar Perez, a published author, business consultant for private equity and hedge funds and Council Member at the Gerson Lehrman Group, is set to discuss at Cybersecurity Boardroom Workshop 2015 what these four super cyber powers, China, Russia, United States and North Korea, have in common. Mr. Perez is a subject matter expert in cybersecurity, investing, trading, financial regulation (Dodd-Frank Act) and market structure.

Mr. Perez has presented at a number of global conferences, including Cyber Security World Conference 2014 (New York), MIT Sloan Investment Management Conference (Cambridge), Inside Market Data 2013 (Chicago), Institutional Investor’s Global Growth Markets Forum (London), Technical Analysis Society (Singapore), TradeTech Asia (Singapore), Emerging Markets Investments Summit 2013 (Warsaw), CME Group’s Global Financial Leadership Conference 2012 (Naples Beach, FL), Harvard Business School’s Venture Capital & Private Equity Conference (Boston0 High-Frequency Trading Leaders Forum (New York, Chicago), FIXGlobal Face2Face (Seoul) and Private Equity Convention Russia, CIS & Eurasia (London).

Additionally, Mr. Perez has been engaged to present to the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), U.S. Securities and Exchange Commission (Washington DC), Quant Investment & HFT Summit APAC 2012 (Shanghai), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (Shanghai) and Pace University (New York), among other public and private institutions. Mr. Perez’s participation at these forums has been praised by both organizers and attendees:

“It was such a pleasure to have you participate in our conference. The feedback was great and the information you shared with the audience was invaluable. Once again, thank you for your contribution in making the event a success.”

“I would like to show my appreciation on your willingness to share your insights about cybersecurity. We would certainly have you in mind as we move forward to deal with this very important issue.”

ABOUT CYBERSECURITY BOARDROOM WORKSHOP 2015

As cyber attacks become more common, companies are increasingly investing in cyber security protections. But even with the best systems in place, hackers can still easily break into a company’s network if workers aren’t also being diligent about security. Cyber criminals have gotten much better at disguising malicious email to make it look more legitimate. So employees need to be vigilant and ask questions about all of the email they receive that raises even the slightest suspicion, which is most likely not what happened at some of the high-profile cyber security breaches that have been in the headlines recently: Adobe, ADP, E*Trade, Fidelity, Home Depot, JPMorgan Chase, Nasdaq, Neiman Marcus, Sony, Target and Wal-mart.

Cybersecurity Boardroom Workshop 2015 (http://www.cybersecurityboardroomworkshop.com), How Boards of Directors and CXOs Can Build the Proper Foundation to Address Today’s Information Security Challenges, is a must-attend forum for board members, CEOs, CFOs, COOs and executive managers in New York City, London, Dubai, Bangkok, Jakarta, Sydney, Taipei, Seoul and Tokyo who need to become more educated about cyber security in order to ask questions that are strategic yet granular enough to address company specifics. Cybersecurity Boardroom Workshop 2015 is targeted at corporate decision-makers for whom cybersecurity readiness is a relatively new yet critically important area to be intelligently conversant about:

• Understand enterprise cybersecurity and the impact on shareholder value in the short and long term
• Learn how to identify current and future challenges to better enable management to focus on threat reduction and operational reliability
• Identify immediate security needs for the organization with actionable steps for senior management
• Get up to speed on international and domestic approaches and frameworks for effective cybersecurity practices corporate wide

DAY 1: UNDERSTANDING THE CYBER WORLD

Understanding Cybersecurity
• The trillion dollar global cyber risk environment
• The impact of cybersecurity attacks on shareholder value
• The enterprise-wide challenge of protecting the organization’s assets
• Identity theft and the legal implications of data breaches

Social Engineering: The “Weakest Human Link” in Cybersecurity
• The responsibility for cybersecurity in the organization
• Evaluating shortcomings in meeting cybersecurity workforce standards
• Assessing the quality of the cybersecurity workforce
• Assessing the effectiveness of current professionalization tools

Understanding the Cybersecurity Testing Method
• Reconnaissance: How to use tools to find vulnerable systems and devices
• Port scanning: How port information is exposed on computer systems
• Packet sniffing: How to gather information from computer systems
• Password policy and cracking: What to consider when developing password policy
• Vulnerability: How to reduce attacks by enforcing proactive compliance policies

Basics of Security Architecture for Board Members and CXOs
• How architecture defines the structure of a system and makes it explicit
• How the current computer network infrastructure was not designed originally to be secure
• The fundamentals of layered architecture: presentation, business, data, and service layers
• Embedding architecting security into systems from inception

DAY 2: RESPONDING TO THE CYBERSECURITY CHALLENGE

Introduction to NIST’s Cybersecurity Framework
• Identifying and prioritizing opportunities for improvement
• Assessing and accelerating progress toward the target state
• Describing the enterprise’s current and target cybersecurity posture
• Communicating with internal and external stakeholders about cybersecurity risk

The Five Core Functions of NIST’s Cybersecurity Framework
• Identify: Organizational understanding to manage cybersecurity risk
• Detect: How to identify the occurrence of a cybersecurity event
• Protect: Safeguards to ensure delivery of critical infrastructure services
• Respond: Taking action regarding a detected cybersecurity event
• Recover: Maintaining plans for resilience and to restore any impaired capabilities

Introduction to Intelligence-driven Cyber Network Defenses
• How investigations are based upon the scientific method: observing, hypothesis, evaluation, prediction and validation
• How to continuously improve the enterprise process for defending IT assets
• How to leverage cutting edge technology, vigilant people and innovative processes
• How to empower people to resolve the problem with guidance and mentoring

Establishing or Improving a Cybersecurity Program
• Prioritize and scope: Identifying business/mission objectives and high-level priorities
• Create a current profile: Developing a profile by indicating current degree of preparedness
• Conduct a risk assessment: Analyzing the operational environment in order to discern the likelihood of an attack
• Orient: Identifying related systems and assets, regulatory requirements, and risk approach
• Create a target profile: Describing the organization’s desired cybersecurity outcomes
• Determine, analyze, and prioritize gaps: Determining gaps between current and target profiles
• Implement action plan: Deciding which actions to take in regards to identified gaps

Cybersecurity Boardroom Workshop 2015 is specifically designed for boards of directors and CEOs of public and private firms looking for new ways to gain and maintain their competitive advantages. Business executives with responsibility for IT, finance, compliance, risk management and procurement as well as entrepreneurs and innovators are welcome to add their points of view to the debate.

Media Contact:
Julia Petrova
Media Relations Coordinator
The Speed Traders
+1-414-FORUMS0
jpetrova@thespeedtraders.com
http://www.mredgarperez.com

Towerwall Listed among “20 Most Promising Security Consulting Companies”

Also named to CRN’s “Women in the Channel” and “The Power 50”

Boston, MA, May 28, 2014 – Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced it was selected for inclusion in a list of the 20 “Most Promising Enterprise Security Consulting Companies.” The list was compiled by the editors of CIO Review, a magazine published in Fremont, Calif. Michelle Drolet, founder and CEO of Towerwall, was also named to Computer Reseller News (CRN) “Women of the Channel” and to its list of “The Power 50.”

CRN’s “Women of the Channel” is “a special recognition of those female channel executives, who have made great strides and are leaving their indelible mark on the technology channel,” says CRN.

Says CIO Review: “Presently, the time is apt to identify some of the right security players in the market. We believe these companies have achieved significant momentum and will rise above the rest. A distinguished panel comprising CIOs and CEOs of public companies, analysts, and the CIOReview editorial board finalized the 20 Most Promising Enterprise Security Consulting Companies. We congratulate the 20 finalists for achieving this vote of respect and wish them a great future ahead.”

According to CRN, The Power 50: Solution Providers is a new list for 2014, honoring those female executives extending their respective company’s sphere of influence as trusted advisers.  “This year’s submissions included a significant amount of women in Service Provider organizations. Enough to be recognized in their own category.”

To view the top 20, please visit: http://www.cioreview.com/magazine/20-Most-Promising-Enterprise-Security-Companies–GCLV674595908.html

About Towerwall:
Founded in 1993 and based in Framingham, Massachusetts, Towerwall provides organizations such as Biogen Idec, Middlesex Savings Bank, Bahamas Telecom, Brown University and Smith & Wesson, with IT security technology services required for secure business-class networks. Strategic partnerships with Sophos, Varonis, AlienVault, Websense, Qualys, and many other nationally-recognized security vendors allows Towerwall to offer its customers an integrated approach to solving their security needs by coupling best-of-breed technology with top-notch integration services. For more information please call (774) 204-0700 or email us at info@towerwall.com.

Contact:
Victor Cruz
MediaPR.net, Inc.
PO Box 961
Essex, MA 01929
978-768-6888
vcruz@mediapr.net
http://www.towerwall.com

Free eBook Offers Ways to Cope with BYOD

Towerwall today announced a freely downloadable eBook that offers strategies and best practices for companies dealing with employees bringing mobile devices to work.

Towerwall ( http://www.towerwall.com ), an IT security services provider for small to mid-size businesses, today announced a freely downloadable eBook that offers strategies and best practices for companies dealing with employees bringing mobile devices to work. The eBook, “Beware of BYOD: How Forward Thinking Companies Can Cope with ‘Bring Your Own Device,’” is available at Towerwall.com.

As the runaway proliferation of smartphones and tablets in the workplace goes unchecked, the BYOD trend is introducing serious IT security issues including the potential theft of IP and proprietary information plus vulnerabilities.

Statistics show that 80% of workers bring their own mobile device to the workplace. Around 60% of workers do so even though the practice is not formally sanctioned by the company. Add to this that half of all security breaches stem from lost or stolen devices, pointing to the difficulty of securing information with mobile devices.

“Beware of BYOD” is authored by Michelle Drolet, CEO of Towerwall, whose consulting clients include Brown University, Bose, and Raytheon. Towerwall manages and deploys technology by such leading vendors as Trend Micro, RSA, Websense, and Qualys.

“Beware of BYOD” introduces possible legal ramifications as well as the probability of inviting malware into the network. The eBook helps companies frame their response by asking the right questions, taming myths about the costs, and advocates what a BYOD policy should entail. Topics include remote data wiping, data leakage prevention, best practices and education. Chapters include:

* To Authorize BYOD or Not, That is the Question
* 10 Things Everyone Should Know Before Bringing a Device to Work
* Why You Need a Mobile Device Policy
* Key Issues to Consider for a BYOD Strategy
* 5 Ways BYOD Can Harm Your Company

“Even if you don’t condone it in the workplace you should still have a BYOD policy in place,” says Drolet. “The trend is universal and it represents a threat to organizations of all sizes. Just as with every other change, planning and strategy must come first. This eBook covers what businesses need to know before creating policy.”

This is an excellent resource for IT managers, CTOs, and business owners to learn more about this trend and strategies that can be applied to better control and manage BYOD.

Download “Beware of BYOD” by visiting http://www.Towerwall.com.

About Towerwall:
Since 1993, Towerwall has been providing IT security technology services required to run successful business-class networks for such organizations as Brown University, Bose, Middlesex Savings Bank, PerkinElmer and Raytheon. For more information please visit http://www.towerwall.com.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net
+1 978-594-4134
vcruz@mediapr.net
http://www.Towerwall.com

Brainloop Publishes New White Paper on Managing Document Security

“Managing Information Risk in the Extended Enterprise: Why Corporate Compliance & IT Security Must Join Forces”

Boston, MA, November 02, 2010 — Brainloop ( http://www.brainloop.com ), the leading supplier of software solutions for high-security management of confidential documents, today issued a white paper that looks at the challenges of managing security across the entire document lifecycle. Brainloop is used internationally by hundreds of renowned companies including BMW, Deloitte and Eurocopter, for document compliance management and secure collaboration involving highly confidential documents throughout the extended enterprise.

Titled “Managing Information Risk in the Extended Enterprise: Why Corporate Compliance and IT Security Must Join Forces,” the paper is authored by Michael Rasmussen of Corporate Integrity LLC, a noted authority in understanding governance, risk and compliance (GRC) processes and considered the first analyst to define and model the GRC market for professional services and technology.

The paper examines how the distributed nature of working with confidential documents in collaborative settings between employees, external auditors, strategic partners, or any other individuals outside the corporate network poses a serious security risk. Traditional IT security tools do not protect documents outside the firewall. Intellectual property, trade secrets, financial and legal papers, customer lists and other highly sensitive data must be managed under a set of controls that include authentication, audit tracking, rights management, and role-based access control.

“Risk and compliance issues are compounded by the pervasive nature of electronic documents. The more sensitive a document is, the more likely it will need to travel outside the organization, increasing the likelihood of risk exposure,” notes Rasmussen.

“The traditional infrastructure approach to security – firewalls, network access control, endpoint security – cannot protect collaboration in a dynamic and extended business environment. If an organization closely restricts and monitors online collaboration without providing a secure alternative, users are forced to send documents as email attachments — completely unprotected.-

One challenge the paper notes is the necessity of “changing the security culture in the organization from an endpoint or network infrastructure-centric view to an information-centric view of security. This includes a new paradigm of managing security across the entire document lifecycle – even when they are outside the firewall.”

The paper further makes the case for why compliance and IT security must join forces to deliver a secure online collaboration platform, with the stated goal of empowering end users, vendors and partners with a transparent means of supporting security policies.

Sourced and vetted by IT security, this platform must meet corporate standards for security certification, enterprise integration, choice of delivery model (cloud-based or onsite), Service Level Agreements (SLAs), and flexibility to apply the right level of secure collaboration relevant to the level of risk exposure within the document.

Compliance and legal issues such as electronic discovery and litigation risks weigh heavily on the decision and evaluation of a document compliance management solution. Legal, financial and contract-related licensing documents all require documentation of accesses, non-repudiation and control over document integrity.
Rasmussen writes, “It’s time to stop fighting collaborative processes that end-users have so avidly embraced, and objectively look at securing online document collaboration across extended business relationships to take full advantage of its benefits.”

To read the Brainloop white paper, “Managing Information Risk in the Extended Enterprise,” go to: http://www.brainloop.com/fileadmin/assets/PDFs/White_Papers/brainloop_white_paper_managing_information_risk.pdf

About Brainloop:
Brainloop, with offices in Boston and Munich, is the leading supplier of software solutions for high-security document collaboration. Brainloop’s secure online workspace is a virtual document safe that enables secure filing, editing and distribution of highly confidential documents within a single company, and beyond. All contents are powerfully protected from unauthorized internal or external access, and all actions within the application are documented by a tamper-proof audit trail. Frequent uses include contract negotiations, collecting data and compiling quarterly reports, collaboration with external auditors and counsel, and any other communication that contains confidential information.

Brainloop is used internationally by hundreds of renowned companies including BMW, Deutsche Telekom, Eurocopter, Galileo Industries, Premiere and ThyssenKrupp. Leading law firms and investment banks use this solution for the complete life cycle of M&A transactions. Strategic partners of Brainloop are HP, IZB, Microsoft and T-Systems Business Services. http://www.brainloop.com

Copyright © 2010, Brainloop AG. All rights reserved. All trademarks mentioned in this document are the property of their respective owners.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Boston, MA 02101
(401) 349-3369
vcruz@mediapr.net
http://www.brainloop.com