01. Bill Burns, VP & CISO, Informatica, visits theCUBE!. (00:31)
02. Update on the security industry.. (01:03)
03. Are we rethinking security, if not - should we?. (02:54)
04. Security expectations and the increasing complexity of security needs. (05:43)
05. What is Secure Source and how does that work?. (07:03)
06. How are customers putting data put use?. (08:25)
07. What does the age of engagement mean to the CISO?. (10:38)
08. Open ended possibilities of new security innovations. (12:33)
09. Legal ramifications of security breaches. (13:39)
10. What advice would you share for people interested in security?. (14:45)
Track List created with http://www.vinjavideo.com.
--- ---
Security gets a do-over | #Infa15
by Heather Johnson | Jul 27, 2015
The security side of IT faces challenges in both function and manpower. Security hustles to keep up with the growth of information, while its leaders hustle to find qualified talent.
“We have to figure out new ways to build products and secure products both for customers and enterprises,” said Bill Burns, VP and Chief Information Security Officer (CISO) for Informatica Corp., who spoke with SiliconANGLE’s Media team theCUBE during Informatica World 2015.
The changing role of the CISO
The role of the CISO is certainly changing with the rise of mobile, IaaS and technology that essentially makes firewalls obsolete. For a project last year, Burns surveyed a number of CISOs about their concerns. Of the executives polled, the main concerns were Cloud, mobility, personal use and work/life integration.
“As a security officer, how do you manage the risk, security breaches and privacy breaches of enterprise data?” asked Burns. “IT doesn’t have control of the components anymore, so how does the CISO manage risk effectively?”
Burns said that the old model of securing products after they are built and produced doesn’t work anymore. “Managing security at scale is something that must be done differently,” he added. “We need to automate things.”
@theCUBE
#INFA15
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Informatica World 2015 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Informatica World 2015 | Las Vegas
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Informatica World 2015 | Las Vegas.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Informatica World 2015 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Informatica World 2015 | Las Vegas
Please sign in with LinkedIn to continue to Informatica World 2015 | Las Vegas. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Bill Burns - Informatica World 2015 - theCUBE - #INFA15
01. Bill Burns, VP & CISO, Informatica, visits theCUBE!. (00:31)
02. Update on the security industry.. (01:03)
03. Are we rethinking security, if not - should we?. (02:54)
04. Security expectations and the increasing complexity of security needs. (05:43)
05. What is Secure Source and how does that work?. (07:03)
06. How are customers putting data put use?. (08:25)
07. What does the age of engagement mean to the CISO?. (10:38)
08. Open ended possibilities of new security innovations. (12:33)
09. Legal ramifications of security breaches. (13:39)
10. What advice would you share for people interested in security?. (14:45)
Track List created with http://www.vinjavideo.com.
--- ---
Security gets a do-over | #Infa15
by Heather Johnson | Jul 27, 2015
The security side of IT faces challenges in both function and manpower. Security hustles to keep up with the growth of information, while its leaders hustle to find qualified talent.
“We have to figure out new ways to build products and secure products both for customers and enterprises,” said Bill Burns, VP and Chief Information Security Officer (CISO) for Informatica Corp., who spoke with SiliconANGLE’s Media team theCUBE during Informatica World 2015.
The changing role of the CISO
The role of the CISO is certainly changing with the rise of mobile, IaaS and technology that essentially makes firewalls obsolete. For a project last year, Burns surveyed a number of CISOs about their concerns. Of the executives polled, the main concerns were Cloud, mobility, personal use and work/life integration.
“As a security officer, how do you manage the risk, security breaches and privacy breaches of enterprise data?” asked Burns. “IT doesn’t have control of the components anymore, so how does the CISO manage risk effectively?”
Burns said that the old model of securing products after they are built and produced doesn’t work anymore. “Managing security at scale is something that must be done differently,” he added. “We need to automate things.”
@theCUBE
#INFA15