Access "Interview: Arizona CISO David VanderNaalt"
This article is part of the April 2008 issue of Security Readers' Choice Awards 2008
The legislation that created Arizona's Statewide Information Security and Privacy Office last August (ARS 41-3507) brought David VanderNaalt home to Phoenix as the state's chief information security officer. One of the former American Express and City of New York CISO's first acts in office was to work with Governor Janet Napolitano's office to develop Executive Order 2008-10, which mandates that state agencies formalize their cybersecurity efforts and mitigate threats against citizens' personal information. DAVID VANDERNAALT How did the executive order come about? The executive order directs every agency to report security incidents to this office; prior to the legislation it was optional. In my first month, we had three reports. I commented to the governor's office through my boss that I thought I should address the cabinet on what I've seen through my first 30 days here, and give them a hint of the things they should be working on. The message came back to me that the governor would prefer that I work with them to develop an executive order that she could... Access >>>
Premium Content for Free.
Product review: Promisec's Spectator
Endpoint security solution by Promisec
Product review: Tufin's Tufin SecureTrack 4.1
Varonis DatAdvantage product review
Varonis DatAdvantage data governance software is evaluated on its configuration and management, effectiveness, policy control and reporting.
- Product review: Promisec's Spectator
Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Netgear's Netgear FVS336G ProSafe Dual WAN Gigabit Firewall combines firewall, IPsec and SSL VPN, packaged into a small-office friendly device. Information Security magazine reviews its capabilities.
Readers' Choice Awards '08: IT Security Products of the Year
Information Security magazine's annual Readers' Choice Awards honor security software, services and products of the year in several areas: antimalware, application, email and mobile security, network access control, firewalls, remote access, firewalls, SIMs, UTM, vulnerability management, wireless, IDS/IPS, and Web gateways.
Web security gateways keep Web-based malware at bay
Web Security Gateways - A new breed of integrated technology takes Web-based malware off the menu.
- Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Interview: Arizona CISO David VanderNaalt
The CISO for the state of Arizona helps craft an executive order that prioritizes information security in every state agency.
Companies Collecting Too Much Customer Data Increase Exposure
If the risk of losing customer or partner information outweighs its value, why collect it in the first place?
Exploring Security Myths, Misconceptions that Lead to Breaches
Perspectives: Gotcha Moments
Disclosure Laws Fail as an Incentive to Secure Data
Layer8: Data Leak Fatigue
- Interview: Arizona CISO David VanderNaalt
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...