Access your Pro+ Content below.
Converting to cloud: Ranum Q&A with Lee Heath
This article is part of the September 2013 Volume 15 / No. 7 issue of Information Security magazine
Lee Heath, Information Security Business Partner, Alliance Data Systems Is Marcus Ranum changing his views on cloud computing? The Information Security magazine columnist chats with Lee Heath, a 20-year veteran of vulnerability management and compliance at companies such as Yahoo! and JPMorgan Chase & Co. Heath is currently working on data loss prevention, classification and cloud storage as an information security business partner for Alliance Data Systems Inc. and its line of businesses. Marcus Ranum: We were talking in Dallas a couple of weeks ago and you said some things that pretty much made me do a complete 180 on the whole cloud computing thing. You were, basically, embracing it and using it as a way to steer other business problems, specifically, data custodianship and classification. Tell us about it. Lee Heath: My colleagues -- Brian Mork and Houston Hopkins -- and I are somewhat new to our positions, and we were tasked with a few specific jobs. We were to look for ways to improve upon several standard security ...
Features in this issue
Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.
This month's special online multimedia supplement to Information Security magazine details the advanced new features of next-generation firewalls and how to make the most of them.
While poaching security talent may plug short-term gaps, outreach and education will solve the long-term shortfall in IT security professionals.
Global risk management based on the lowest common denominator may not ‘comply' with IP or trade secrets. Analysts see big changes ahead.
Columns in this issue
Analysts expect security concerns to drive global risk management, but executives may need convincing.
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process.
Forget the slogans. Reset your security awareness program with actionable information.