Global Security Operations a Chance to Learn from the Experts

Hands-on workshop and technology lab geared to security executives set for June 12-13 in Sunnyvale, Calif.


Are you building the kind of security operations that you will need in 2015? Here's your chance to find out.

Global Security Operations 2015 is an interactive workshop and hands-on technology lab designed to give security executives the chance to learn from the successful experience of leading global CSOs and security managers. Not the typical “PowerPoint session” event, the two-day workshop and technology lab is an interactive leadership workshop to address issues that are relevant — and even critical — to the success of your security program. It will be held on June 12-13 at Yahoo Corporate Headquarters in Sunnyvale, Calif. Visit www.GSOevents.com for more information and registration procedures.

Here's an exclusive Q&A with event co-hosts/co-producers Ray Bernard and James Connor. Mr. Bernard is a monthly contributor to STE Magazine and is the foremost expert on physical and IT security system convergence. Mr. Connor, also a past contributor to STE, is Principal of consulting firm N2N Secure and is the former Senior Manager of Global Security Systems for Symantec Corp.

 

Q: There are so many industry events already. Why another one?

Ray Bernard: Most event focus on product features or what’s being done now. This event looks ahead and asks the question, “Are you building the kind of security operations that you will need in 2015?” Changing or implementing a global or national program doesn’t happen overnight. And things don’t stand still during that time either. So we look ahead at all of the trends that impact a security program—such as management trends, risk trends, technology trends, social trends—and consider where security programs and technology deployments need to go.

James Connor: It‘s future-focused, and that’s what we need to be concentrating on now. Otherwise what we build will be outdated before we get it in place. Corporate trends and technology trends are intersecting in ways that can make security’s job easier—but it requires the right vision to make that happen.

Bernard: Practitioners thinking about this event should ask themselves, “What’s the most important thing I have to accomplish?” Then take a look at the agenda online at www.GSOEvents.com and see how that supports what they need to do.


Q: You have a Technology Lab on Day 2. How is this different from what anyone would see at trade show floors like ISC or ASIS?

Connor: At a trade show each vendor is trying to make his or her sale, mostly in isolation from other technologies. At GSO we and our event staff—not the vendors—are demonstrating how the integrated technologies work together in security response scenarios and for day-to-day security operations. Attendees also participate in the exercises. It’s a hands-on experience in an operational context, with lots of Q&A from the group. That’s very different from typical trade show floor’s one-on-one “show and tell”.

Bernard: One reality of today’s deployments is the mix of legacy technologies, which usually represents a significant investment. So we examine the ways to extend the useful life of existing technology and how to plan a migration to new technology, in a way that develops an evolvable infrastructure intended to be updated as technology advances. Today product lifecycles and the rate of innovation are very different than one or two decades ago. Yet we’re still using decades old approaches to technology deployment in many cases.


Q: The website says, “Security Leadership, Technology Command.” What exactly does that mean?

This content continues onto the next page...