Access "Interview: Arizona CISO David VanderNaalt"
This article is part of the April 2008 issue of Security Readers' Choice Awards 2008
The legislation that created Arizona's Statewide Information Security and Privacy Office last August (ARS 41-3507) brought David VanderNaalt home to Phoenix as the state's chief information security officer. One of the former American Express and City of New York CISO's first acts in office was to work with Governor Janet Napolitano's office to develop Executive Order 2008-10, which mandates that state agencies formalize their cybersecurity efforts and mitigate threats against citizens' personal information. DAVID VANDERNAALT How did the executive order come about? The executive order directs every agency to report security incidents to this office; prior to the legislation it was optional. In my first month, we had three reports. I commented to the governor's office through my boss that I thought I should address the cabinet on what I've seen through my first 30 days here, and give them a hint of the things they should be working on. The message came back to me that the governor would prefer that I work with them to develop an executive order that she could... Access >>>
Premium Content for Free.
Product review: Promisec's Spectator
Endpoint security solution by Promisec
Product review: Tufin's Tufin SecureTrack 4.1
Varonis DatAdvantage product review
Varonis DatAdvantage data governance software is evaluated on its configuration and management, effectiveness, policy control and reporting.
- Product review: Promisec's Spectator
Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Netgear's Netgear FVS336G ProSafe Dual WAN Gigabit Firewall combines firewall, IPsec and SSL VPN, packaged into a small-office friendly device. Information Security magazine reviews its capabilities.
Readers' Choice Awards '08: IT Security Products of the Year
Information Security magazine's annual Readers' Choice Awards honor security software, services and products of the year in several areas: antimalware, application, email and mobile security, network access control, firewalls, remote access, firewalls, SIMs, UTM, vulnerability management, wireless, IDS/IPS, and Web gateways.
Web security gateways keep Web-based malware at bay
Web Security Gateways - A new breed of integrated technology takes Web-based malware off the menu.
- Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Interview: Arizona CISO David VanderNaalt
The CISO for the state of Arizona helps craft an executive order that prioritizes information security in every state agency.
Companies Collecting Too Much Customer Data Increase Exposure
If the risk of losing customer or partner information outweighs its value, why collect it in the first place?
Exploring Security Myths, Misconceptions that Lead to Breaches
Perspectives: Gotcha Moments
Disclosure Laws Fail as an Incentive to Secure Data
Layer8: Data Leak Fatigue
- Interview: Arizona CISO David VanderNaalt
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...