Access "Ping: Robert Garigue"
This article is part of the July 2006 issue of Exclusive: Security salary and careers guide
Robert Garigue may be less than six months into a new industry as Bell Canada's chief security executive, but that doesn't mean the security playbook that served him well as CISO for the Bank of Montreal has to be scrapped. Most threats and best practices are universal, and security philosophies can be carried from job to job. In switching business sectors, which threats have carried over? Much of what's happening now is geared toward identity theft, and the threat [is a problem] for any business sector. Criminal focus has moved away from technology and toward the business model as the weakest link. Phishing and Trojans are used to capture passwords and access accounts; this attacks the trust mechanism of a business model as opposed to attacking the technology. How has the security response changed as a result? Initially the [threat focus] was on the networks, and the response was about access control lists and firewalls. Then, operating systems became the focus, and the response was intrusion detection systems and patch management. Now the focus is on the ... Access >>>
Premium Content for Free.
- What's a Hot Pick?
Calculate You IT Security Salary
Learn how to calculate your IT information security salary based on certifications, job and years of experience, company size and industry.
Document Detective 2.0
- All In A Day's Work
The Right Stuff
SAVVY No two CISOs have the same background, but successful ones have similar skills.
- The XX Factor
What Are You Worth?
SALARY Six-figure security jobs have become common. Maybe you should slip this article into your boss's mailbox.
- 9 Habits of Highly Successful CISOs
Information security resume do's and don'ts
Get advice, and learn do's and don'ts for creating an information security technology or network security resume.
Hot Pick: Tenable offers solid vulnerability management
by Brent Huston, Contributing Writer
Product review: Tenable Network Security's Security Center 3.0 helps organizations throughout the vulnerability management lifecycle, from asset discovery to remediation.
Mobile Device Security
Mobile Guardian Enterprise Edition 5.1
Authentication: RSA SecurID Appliance 2.0
RSA SecurID Appliance 2.0
- Buy the Book
Moving On Up
SKILLS How do you rise in the security ranks? Don't speak geek; use the language of business.
Face-Off: Schneier and Ranum debate security certifications
Are security certifications valuable?
Perspectives: Security success sometimes hinges on politics and personalities
The best infosecurity professionals are situationally aware and attuned to what is happening to them and their environment.
Ping: Robert Garigue
- Editor's Desk
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...