01. Allan Leinwand, ServiceNow, Visits theCUBE !. (00:20)
02. What Is Happening In Your World. (00:33)
03. How Have You Been Spending Your Time The Last Twelve Months. (01:12)
04. What Are The Challenges To Scaling Up. (01:41)
05. Because You're Mostly IT Are Your Customers Able To Deal With Cloudification. (02:51)
06. Do You Still Get A Lot Of Friction About Security. (04:16)
07. How Do The Regulations In Different Geo's Help Define A Different Spec. (05:32)
08. What About Data Locality. (08:03)
09. What Are You Seeing In The Cloud Adoption Wave. (08:59)
10. Did You Quantify The Response Plan. (10:40)
11. What Could Be On A CXO's Check List For Security To Go Over With The Board. (11:34)
12. Do CIO's Appreciate That You Can Help With Security By Giving It To You. (13:14)
13. Is The Key The Response When It Comes To Security. (13:58)
14. Are Boards Open About The Fact That There Will Be A Security Breach. (15:10)
15. What Would You Recommend CIO's Do About Response To Security Threats. (17:11)
16. Do Organizations Understand The Value Of Their Data. (19:08)
17. Do You Have A Security Test That Companies Use To See Where Their Problems Are. (19:51)
18. What Things Are Exciting You This Year. (23:12)
#theCUBE #ServiceNow #Know16 #Knowledge #SiliconANGLE
--- ---
Security, sovereignty and scalability in the enterprise | #Know16
by Gabriel Pesek | May 19, 2016
One of the less glamorous aspects of networking is the security side of things, despite the vital role it plays in keeping all the other data running smoothly. At ServiceNow’s Knowledge16 conference, ServiceNow, Inc. is attempting to put some of the spotlight on this integral service and make attendees more aware of its part in their enterprises.
Allan Leinwand, CTO at ServiceNow, met with Dave Vellante (@dvellante) and Jeff Frick (@JeffFrick), cohosts of theCUBE, from the SiliconANGLE Media team, to talk about some of the security challenges he’s encountered, how the spread of the cloud is changing things and what he sees as the best responses to security compromises.
Scaling and growth
Big topics early on in the conversation addressed expansion of the cloud while educating people about it, as well as the expansion of infrastructure and operations teams. Leinwand addressed the broadening of cloud’s space within government realms with the improvement of federal compliance standards, but didn’t put too much stress on accelerating this sector, feeling that it would mature at its own pace.
“There’s always challenges when you scale up operations and infrastructure,” he said. “It’s one of those things where you don’t know how to do it until you do it.”
Looking to the public side of cloud engagement, Leinwand noted, “We’re seeing our customers put more data in the cloud, run more operations, more apps, and all that means we need to think about how to scale.”
Securing the space
“Our customers’ data, we treat it like our own,” Leinwand stated. “So we give them a lot of functionality … to make it as secure as we can. … I’m hoping over time that as we prove and gain trust … that [security worries] will become less of a problem.”
With international data management bringing up concerns of “making sure that the data is sovereign within its environment,” and worries about the “Snowden effect,” ServiceNow has provided its customers with encryption on-prem before data arrives at the cloud, meaning that if a government demand for the data were to be issued, ServiceNow would be completely unable to turn it over in a usable form. Just by addressing international data governance standards compliance, ServiceNow has drawn in security specialists who were wary about the issue.
Fire drills and event response
“What you want to be able to do is have a process,” Leinwand said, similar to a fire drill, in which the chain of events responding to a security compromise is clearly laid out ahead of time and practiced thoroughly. He noted that for best response and preparation implementation, the CSO and CIO planning of response practices would need to be shared with ServiceNow, but that the main things for a CXO to take to the board when discussing security were: “What is their security incident response plan? … Have they tested it? [And] the second thing is … do they understand the attack surface of their company?”
Leinward continued: “The data that they can use to respond to the attacks is something we can help them manage.” But he also felt, “The key in all these events … is actually not that they’ve even occurred, but how you respond to the event, and what you learn from it … being able to forensically analyze the data, make sure you have the right collection … the harder thing that I think people haven’t internalized is ‘Am I tracking the right data?’”
@theCUBE
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
ServiceNow Knowledge 2016. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For ServiceNow Knowledge 2016
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for ServiceNow Knowledge 2016.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
ServiceNow Knowledge 2016. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to ServiceNow Knowledge 2016
Please sign in with LinkedIn to continue to ServiceNow Knowledge 2016. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Allan Leinwand, ServiceNow | ServiceNow Knowledge16
01. Allan Leinwand, ServiceNow, Visits theCUBE !. (00:20)
02. What Is Happening In Your World. (00:33)
03. How Have You Been Spending Your Time The Last Twelve Months. (01:12)
04. What Are The Challenges To Scaling Up. (01:41)
05. Because You're Mostly IT Are Your Customers Able To Deal With Cloudification. (02:51)
06. Do You Still Get A Lot Of Friction About Security. (04:16)
07. How Do The Regulations In Different Geo's Help Define A Different Spec. (05:32)
08. What About Data Locality. (08:03)
09. What Are You Seeing In The Cloud Adoption Wave. (08:59)
10. Did You Quantify The Response Plan. (10:40)
11. What Could Be On A CXO's Check List For Security To Go Over With The Board. (11:34)
12. Do CIO's Appreciate That You Can Help With Security By Giving It To You. (13:14)
13. Is The Key The Response When It Comes To Security. (13:58)
14. Are Boards Open About The Fact That There Will Be A Security Breach. (15:10)
15. What Would You Recommend CIO's Do About Response To Security Threats. (17:11)
16. Do Organizations Understand The Value Of Their Data. (19:08)
17. Do You Have A Security Test That Companies Use To See Where Their Problems Are. (19:51)
18. What Things Are Exciting You This Year. (23:12)
#theCUBE #ServiceNow #Know16 #Knowledge #SiliconANGLE
--- ---
Security, sovereignty and scalability in the enterprise | #Know16
by Gabriel Pesek | May 19, 2016
One of the less glamorous aspects of networking is the security side of things, despite the vital role it plays in keeping all the other data running smoothly. At ServiceNow’s Knowledge16 conference, ServiceNow, Inc. is attempting to put some of the spotlight on this integral service and make attendees more aware of its part in their enterprises.
Allan Leinwand, CTO at ServiceNow, met with Dave Vellante (@dvellante) and Jeff Frick (@JeffFrick), cohosts of theCUBE, from the SiliconANGLE Media team, to talk about some of the security challenges he’s encountered, how the spread of the cloud is changing things and what he sees as the best responses to security compromises.
Scaling and growth
Big topics early on in the conversation addressed expansion of the cloud while educating people about it, as well as the expansion of infrastructure and operations teams. Leinwand addressed the broadening of cloud’s space within government realms with the improvement of federal compliance standards, but didn’t put too much stress on accelerating this sector, feeling that it would mature at its own pace.
“There’s always challenges when you scale up operations and infrastructure,” he said. “It’s one of those things where you don’t know how to do it until you do it.”
Looking to the public side of cloud engagement, Leinwand noted, “We’re seeing our customers put more data in the cloud, run more operations, more apps, and all that means we need to think about how to scale.”
Securing the space
“Our customers’ data, we treat it like our own,” Leinwand stated. “So we give them a lot of functionality … to make it as secure as we can. … I’m hoping over time that as we prove and gain trust … that [security worries] will become less of a problem.”
With international data management bringing up concerns of “making sure that the data is sovereign within its environment,” and worries about the “Snowden effect,” ServiceNow has provided its customers with encryption on-prem before data arrives at the cloud, meaning that if a government demand for the data were to be issued, ServiceNow would be completely unable to turn it over in a usable form. Just by addressing international data governance standards compliance, ServiceNow has drawn in security specialists who were wary about the issue.
Fire drills and event response
“What you want to be able to do is have a process,” Leinwand said, similar to a fire drill, in which the chain of events responding to a security compromise is clearly laid out ahead of time and practiced thoroughly. He noted that for best response and preparation implementation, the CSO and CIO planning of response practices would need to be shared with ServiceNow, but that the main things for a CXO to take to the board when discussing security were: “What is their security incident response plan? … Have they tested it? [And] the second thing is … do they understand the attack surface of their company?”
Leinward continued: “The data that they can use to respond to the attacks is something we can help them manage.” But he also felt, “The key in all these events … is actually not that they’ve even occurred, but how you respond to the event, and what you learn from it … being able to forensically analyze the data, make sure you have the right collection … the harder thing that I think people haven’t internalized is ‘Am I tracking the right data?’”
@theCUBE