This article is part of the January 2005 issue of How security pros can benefit from information sharing
DISPATCHES Two Seattle CISOs, Kirk Bailey and Ernie Hayden, are pioneering a new level of trust and cooperation to secure their enterprises. Over the clatter of an auto body shop where he was retrieving his car, Ernie Hayden received a disturbing cellphone call. "I'm sending you a warning about the latest MyDoom attack," the voice said. No introductions were necessary. Hayden, the manager of enterprise information security for the Port of Seattle, immediately recognized the voice as his counterpart at the city of Seattle, CISO Kirk Bailey. Usually, the pair meets once a week at a local coffeehouse to talk shop. They share their problems, insights, solutions and questions. Nothing is out of bounds, and there's no fear of compromise. Their trust in each other is unquestioned. While the urgent warning of a MyDoom variant wasn't the norm, it was hardly unusual. When something serious breaks, they call each other immediately. They know implicitly that one always has the other's back. By the time Hayden rolled into the office, he had the details of the worm that ... Access >>>
Premium Content for Free.
You're just plugging holes if you don't have the right processes and policies.
The Sky's the Limit
What security technology do you need that you can't get today? Here's your wish list.
Content Filtering: Websense Enterprise 5.5
Websense's Enterprise 5.5
Authentication: RSA SecurID 6.0 for Windows
RSA Security's SecurID 6.0 for Windows
Seattle CISOs Ernie Hayden and Kirk Bailey are pioneering a new level of trust and cooperation to secure their enterprises.
Hot Pick: F5 Networks' FirePass 4100 Series
F5 Networks' FirePass 4100 Series
- Vulnerability Mismanagement
Antispyware: Webroot Software's Spy Sweeper Enterprise
Webroot Software's Spy Sweeper Enterprise
Secure Reads: Gray Hat Hacking
Gray Hat Hacking: The Ethical Hacker's Handbook
Recent Releases: Security product briefs, January 2005
Learn about the information security products released in January 2005.
Avinti's iSolation Server 1.1
The Myths of Security
The ancient Greeks spun myths to explain the unexplainable. Modern enterprises use commonly held myths as a foundation for security.
Key to the World
SAML's portable trust makes federated identity work.
- Antispyware: Webroot Software's Spy Sweeper Enterprise
Logoff: Government tosses pennies toward information security
Death by a Thousand Cuts
Editor's Desk: Remembering the dearly departed
Built to Sell
Layer 8: The security governance myth
Perspectives: Walk in management's shoes
One security manager describes his experience with a management program that helped him understand how to align security with business objectives.
- Logoff: Government tosses pennies toward information security
More Premium Content Accessible For Free
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...