There were 19 press releases posted in the last 24 hours and 154,335 in the last 365 days.

Roger Thornton, AT&T Cybersecurity, VP of Products & Technology, Talks About Breaches and Best Practices

Roger Thornton - VP of Products & Technology - AT&T Cybersecurity

...AT&T Cybersecurity...

https://cyberinvestingsummit.com

"In The Boardroom" on SecuritySolutionsWatch.com

We are honored to have Roger Thornton, AT&T Cybersecurity, join us "In The Boardroom" to talk about recent breaches, cybersecurity best practices and the upcoming Cyber Investing Summit May 16 in NYC”
— Martin Eli, Publisher

NEW YORK, NEW YORK, UNITED STATES, May 14, 2019 /EINPresswire.com/ -- *****************************************************************************************************************

SecuritySolutionsWatch.com: Thank you for joining us today, Roger. Before discussing your May 16 Keynote at Cyber Investing Summit (https://cyberinvestingsummit.com/) in greater detail, please give us a brief overview of your background.

Roger Thornton: I had the incredibly good fortune to grow up in the Silicon Valley and then went on to spend 20 years there in a variety of professional roles ranging from software engineer and product manager to founder and CTO. That’s where I fell in love with the whole world of venture and startups. After a decade at some of the leading Silicon Valley companies, including Cypress Semiconductor, Apple Computer and Sun Microsystems, I eventually co-founded Fortify Software in 2002 with a good friend, Ted Schlein at Kleiner, Perkins, Caufield and Byers. Fortify was not my first adventure into Cybersecurity. I had previously been part of the startup team at Good Technologies (acquired by Motorola) and was an early investor in EnCommerce (acquired by Entrust). Fortify was acquired by HP in 2010 and was quite predominant in the high end of the security market - most large banks around the world utilized Fortify as did much of the DoD community. After the Fortify and HP Enterprise security experience, I truly wanted to focus my efforts on the broader market - the majority of companies that simply don’t have the same resources that a large bank or DoD agency has at its disposal. We founded AlienVault to help organizations of all shapes and sizes achieve world-class security without the headaches and expense of traditional solutions. AT&T completed its acquisition of AlienVault in August 2018, accelerating its own vision for giving organizations of all sizes access to more effective, simple and affordable cybersecurity solutions. Today I am the VP of Products and Technology at AT&T Cybersecurity. I have the incredible honor and privilege to work with some of the world’s most talented security experts and product professionals focusing on making AT&T’s extensive cybersecurity capabilities and technologies accessible to businesses of all sizes around the globe.

SecuritySolutionsWatch.com: We’ve all seen the headlines regarding the recent
Citrix 2FA breach https://www.computerweekly.com/news/252459162/Citrix-breach-once-again-highlights-password-weaknesses),
Equifax (https://www.ftc.gov/equifax-data-breach),
Marriott (https://www.consumer.ftc.gov/blog/2018/12/marriott-data-breach),
MyHeritage (https://www.reuters.com/article/us-myheritage-privacy/security-breach-at-myheritage-website-leaks-details-of-over-92-million-users-idUSKCN1J1308), and
Uber (http://fortune.com/2018/04/12/uber-data-breach-security/)
which have affected billions of users and the wake-up calls keep coming about cyber “insecurity”. Can we get a sneak peak, Roger, at the topics you’ll be discussing at Cyber Investing Summit ((https://cyberinvestingsummit.com/) ?

Roger Thornton: At AT&T our mission is “To connect people with their world everywhere they live and work, and do it better than anyone else”. We have been doing this for more than 140 years since the invention of the telephone. The company has been involved in cyber security for nearly as long - and long before the term cyber security was coined. I am going to share some of the unique insights on the marketplace that are gained from the vantage point running products and technology for our cyber security business unit. The talk will be a bit contrarian to the typical security message. Instead of showcasing the latest breach and trying to scare the audience into action, as is so common, I prefer to focus on what is working. How are the leaders dealing with the threats and surviving in today’s hostile environment? What can we learn from them and how do others follow in their path? We will explore how this impacts the market for new startup ventures and where the investor can look for opportunities.

SecuritySolutionsWatch.com: Congratulations on the formation of AT&T Cybersecurity (https://www.alienvault.com/blogs/security-essentials/att-cybersecurity-is-born) . Want to discuss the unique value proposition that AT&T Cybersecurity delivers to your customers?

Roger Thornton: Digital transformation - the movement of critical computing from the data-center to the cloud - is driving rapid changes in business models and network architectures. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year.

The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology.

AT&T started down this path years ago by building a best-of-breed Cybersecurity Consulting practice and Managed Security Services business serving customers of all sizes, across industries, and around the world. Combined with its network visibility across the threat landscape, AT&T has been well-positioned to take a unique role in cybersecurity.

With the acquisition of AlienVault, AT&T Cybersecurity will continue to deliver on our joint vision to address these “seams” and uniquely bring together people, process, and technology through a “software defined” unified security management platform. A platform that integrates, automates and orchestrates a wide spectrum of best-of-breed point security products.

By abstracting much of the management of individual security products, we are automating deployment and ongoing operations, and operating them as a single unified solution - much in the same way AlienVault had done with the critical capabilities required for threat detection and response. This platform will use the technical capabilities and reach of AT&T’s Edge-to-Edge intelligence in order to deliver solutions as on-demand digital services optimized to help protect customers through their own digital transformation journey.

We will accomplish this through collaboration with AT&T’s industry-leading Chief Security Organization, our impressive list of industry partners and through the integration and automation of AT&T Alien Labs threat intelligence. The combination of Open Threat Exchange now curated by Alien Labs and AT&T’s incredible breadth and depth of threat intelligence will create one of the world’s leading threat intelligence platforms!

AT&T Cybersecurity is uniquely positioned to provide security without the seams through people, process and technology, which will provide unrivaled visibility for our customers!

SecuritySolutionsWatch.com: Today’s threat landscape is persistent and complex. Your thoughts about “best practices” that should be followed in this environment?

Roger Thornton: I can never talk about best practices without mentioning and stressing the “basics”. Our industry loves to talk about the edge cases, advanced threats, and the latest innovations. I understand why, all that stuff is really cool and when a company has an incident or a breach, it sounds much better to attribute the action to an “advanced threat actor”. But the fact remains that no rational adversary is ever going to invest more than they have to in order to gain what they came looking for and most have a good understanding of how much money they will be able to make if they are able to breach your systems. The basics really do matter, they are your best opportunity to upset this balance and make the threat actor spend more than they want. Once the basics are in place, the critical challenge is to maintain your security posture without spending a fortune in the process. We are not at a loss for security solutions today, the challenge is making them work effectively, efficiently and making them all work together. Given the myriad of solutions available in the market today, an ability to select the right solutions and make them work is the real key to success.

SecuritySolutionsWatch.com: May we ask you, Roger…what does your crystal ball reveal regarding cybersecurity headlines in the coming year?

Roger Thornton: Sadly, it is a very good bet that we will continue to see some of the same headlines that we have in the past. I do think that it is a good bet that there will be headlines associated with the EU’s GDPR and similar privacy legislation here in the US like California’s CCPA. This will create yet another wave of opportunity for innovative new startups to help end customers navigate these new regulatory requirements.

SecuritySolutionsWatch.com: Thanks again for joining us today, Roger. Any other subjects you’d like to discuss?

Roger Thornton: I would just like to thank you and your team for all the great work involved in making the summit the great success that has grown into and for the opportunity to share thoughts and insights with you here today. I look forward to seeing everyone in New York on May 16th.

*****************************************************************************************************************


For the discussion with Roger Thornton, AT&T Cybersecurity, VP of Products & Technology, on SecuritySolutionsWatch.com, please click here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Thornton_ATT.html

*****************************************************************************************************************

CYBER INVESTING SUMMIT
Thursday, May 16, 2019
Convene – Financial District
32 Old Slip, New York, NY 10005
Videos of previous CYBER INVESTING SUMMIT here:
https://www.youtube.com/channel/UCCi2WTHuC8h2nIba2jyA2Jg
https://cyberinvestingsummit.com/

*****************************************************************************************************************

About SecuritySolutionsWatch.com
www.SecuritySolutionsWatch.com features thought leadership interviews about IT, IoT and security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about solutions from leading global brands such as: 3M, AMAG Technology - A G4S Company, ASSA ABLOY, Cisco Security, Cyberinc, Dell EMC, HP Cybersecurity, Fujitsu, Gemalto, HID Global, IBM, ImageWare, Intel, SAP, Siemens, Stanley Security, SONY, Unisys, and Yahoo, just to name a few.

What's YOUR authentication, cybersecurity, physical security, mobility, or "smart" solution?
What's YOUR AI, Blockchain, FinTech or IoT solution?

We invite you to please join us "In The Boardroom" at www.SecuritySolutionsWatch.com.

For a quick tour to see exactly how your brand will be featured, please contact Ali Eng on our publishing team via
email: ALE@SecuritySolutionsWatch.com, or phone: 1+914.690.9351, or, LinkedIn: https://www.linkedin.com/in/ali-eng-a8a41015b/

For more details, please click here: www.SecuritySolutionsWatch.com/Main/Jan2018.pdf
And for our Media Kit, please click here: www.SecuritySolutionsWatch.com/MediaKit.html

****************************************************************************************************************

It's FREE...our monthly newsletter with thought leadership content from leading security experts.
Please click here: -www.SecuritySolutionsWatch.com/newsletters/newsletter_2019_04.html

And please visit us on Twitter here: www.twitter.com/SecStockWatch

****************************************************************************************************************

All content which appears on SecuritySolutionsWatch.com and in this Press Release is subject to our disclaimer:
www.SecuritySolutionsWatch.com/Main/Terms_of_Use.html

****************************************************************************************************************

Martin Eli, Publisher
SecuritySolutionsWatch.com
+1 914-690-9351
email us here


EIN Presswire does not exercise editorial control over third-party content provided, uploaded, published, or distributed by users of EIN Presswire. We are a distributor, not a publisher, of 3rd party content. Such content may contain the views, opinions, statements, offers, and other material of the respective users, suppliers, participants, or authors.