-
Randall Gamby is the information security officer for the Medicaid Information Service Center of New York (MISCNY). MISCNY manages and maintains the largest state-run Medicaid claims data warehouse in the United States. Prior to this position he was the enterprise security architect for a Fortune 500 insurance and finance company. His experience also includes many years as an analyst for the Burton Group's Security and Risk Management Services group. His coverage areas included: secure messaging, security infrastructure, identity and access management, security policies and procedures, credential services, and regulatory compliance.
Prior to joining Burton Group, Randall was a senior consultant and infrastructure designer for Fortune 500 companies, global organizations, and federal governments developing integrated systems for enterprise, national and worldwide deployments. With 20 years of experience, Randall is a founding participant in OSI communications development and was a representative for McDonnell Douglas Corporation (now Boeing Aerospace) in the Aerospace Industries Association, which worked for standardized interoperation between aerospace organizations and the U.S. government.
-
Do you have a question for our experts?
Contributions from Randall Gamby, Contributor
- Using unique device identification for bank website sec
- How to install a new router to prevent single sign-on problems
- How to find and remove keyloggers and prevent spyware installation
- How to encrypt passwords using network security certificates
- Prevent meet-in-the-middle attacks with TDES encryption
- How to use single sign-on (SSO) for a server configuration
- Choosing management for Active Directory user provisioning
- LDAP signing requirements for various directory configurations
- User account best practices for an investment management website
- How to determine password strength for a website
- Content-aware IAM: Uniting user access and data rights
- The pros and cons of implementing smart cards
- Keep files from being deleted by assigning read and execute permission
- IT business justification to limit network access
- Prevent password cracking with password management strategies
- How to log in to multiple servers with federated single sign-on (SSO)
- How to confirm the receipt of an email with security protocols
Security Management Strategies for the CIO