This article can also be found in the Premium Editorial Download "Information Security magazine: Tips from the 2007 Security 7 Awards."
Download it now to read this article plus other related content.
Seven Winners, One Mission
In recognizing seven individuals working in different markets, you might think their experiences and abilities would be quite diverse. And while it's true that all of this year's Security 7 Award winners possess their own traits and talent, all are unified by a single mission: align information security with the business. Across the board, the seven winners have succeeded in guiding large security operations toward this unification while keeping some of the world's largest and most sensitive networks safe from harm. The following profiles shed light on their accomplishments and provide insight into what drives some of the brightest practitioners in the industry.
in critical infrastructure systems by establishing a program to develop language owners can insert in procurement contracts with vendors.
BALANCES NEED FOR SECURITY AND OPENNESS
required by one of the largest research universities in North America; a staunch advocate of defending against cyberfraud and harassment.
CRAFTS THE POLICIES
that protect the systems and intellectual property of one of the country's largest defense contractors; manages a staff of 41 and a $16M annual budget.
BUILDS A STATE-OF-THE-ART
security operations center with a small staff and instituted successful two-factor authentication in 30 locations.
AGENT FOR CHANGE
within his company and in the security community, delivering security as a managed service within the corporate walls, and identity exchange programs industry-wide.
MONITORS AND AUDITS
access to patient records through data mined from hundreds of applications; safeguards privacy of thousands and maintains the open nature mandated in a teaching hospital.
ENSURES THE SECURE DELIVERY
of real-time market pricing information, news and trading services to 330,000 financial services professionals, via a program that promotes service management within the security organization.
This was first published in October 2007