Sergey Nivens - Fotolia
- Kathleen Richards, features editor
As the year comes to a close, we are excited to present one of our favorite issues, the annual Security 7 award winners. For the past decade, we have asked the information security community to nominate peers who are at the top of their profession for recognition in one of seven enterprise markets. The winners this year carry on that tradition, leading the charge in areas such as healthcare information sharing, secure software development, community building, and cybersecurity education.
Check out this year's Security 7 winners:
- Terry Rice, Merck & Co. Inc.
- Jason Harkins, Sony Network Entertainment International
- Frederick Chang, Southern Methodist University
- Leigh Honeywell, Heroku
- Joe Grand, Grand Idea Studio Inc.
- Terry Low, PointClickCare
- Shon Harris, in Memoriam
We also honor and say a sad goodbye to our former colleague Shon Harris. A longtime contributor to TechTarget's Security Media Group and a former contributing editor to Information Security magazine, Shon shared her enthusiasm for information security through multiple channels as a highly regarded trainer, educator and author. We thank her for her many contributions over the years. She will be missed.
In addition to unveiling the Security 7, we look at the year in review and find some lessons learned in an article penned by Editorial Director Robert Richardson. As data breaches shaped 2014, incident response planning has become critical to CISOs and will be the new measure of success in 2015.
"Really, what you are seeing in the marketplace is a pivot to more attention on incident response, investigative techniques and solutions that provide investigative capabilities," says Chris Pierson, the chief security officer, executive vice president and general counsel of Orlando, Fla.-based Viewpost IP Holdings LLC, whom I interviewed in this month's edition of ISM.
In 2015, companies will continue to invest in virtualization technologies even as security professionals struggle to manage security in these environments. Voodoo Security founder Dave Shackleford looks at the gaps and offers tips on whether these environments can (still) be secured by conventional methods as new virtualization security controls emerge.
Finally, longtime contributor Marcus Ranum and FireEye Chief Security Strategist Richard Bejtlich (who needs no introduction among security professionals) discuss the process of security strategy in a wide-ranging Q&A that's not to be missed.
We congratulate the Security 7 winners!