Comments
You must login to participate in this chat. Please login.

I am very pleased to see this post, thank you for sharing

Steel

Great information, Thank you!!

Steel

Thanks again, @Chris!

Author

If you'd like to re-ilisten or share the show with a friend, this episode of Tune in Tuesday with Chris Richter of Level 3 is available now at: http://www.thenewip.net/radio.asp?doc_id=723114

Author

@ChrislR Great last thoughts on the industry. Looking forward to following this story and the space.

 

Steel

@Alison: Thank you again for hosting me!

Steel

Proper application of threat intelligence will be key to improving security controls going forward.  There are many options on the market today.  The key is finding intelliegence sources that can directly be applied to your organization in a manner that is actionable.

Steel

Thanks, listeners, for tuning in and joining us. Look for more radio shows soon.

Author

This was a terrific radio show, Chris, one I am sure many people will come back to (I know I will). Thank you very much for sharing your insight with us. Lots of great food for thought both on the chat board and the radio.

Author

Thanks for a great discussion!  

Steel

Yes, in a software/network world, it's logical that the old, proprietary ways of providing security won't last.

Author

The connected world is going through a transformation in its approach to cyber.  Many organzations agree that network providers must provide more cost effective security controls as a means to break the hardware security-spend cycle.

 

Steel

I do wonder sometimes whose information isn't for sale out there, given the number and variety of sites that have been hacked. Believe at one point I was covered by monitoring from three different hacks.

Author

@ajpritchard: Agreed.  Any information can be of value to a cyber criminal, and thus will be accessed.  Make it hard for criminals.  If you are too hard of a target, they will, in many cases look elsewhere.

 

Steel

@Chris - I like the idae of breaking security into its own budget. And I'm sure CIOs do too! It's crazy to have so much money tied into one area at the expense of everything else, albeit understandable with all the threats. Encouraging to hear there are alternatives.

Author

Exactly, @apritchard. That's a whole other show in itself!

Author

Good reminder that you are a target if you have anything connected to the internet. Hello, IoT security!

Steel

@Alison, yes, security budgets are growing at such a rapid pace, they are eating into the "revenue producing" IT budgets.  Several organiztions that I've talked to are now considering breaking out security into its own budget -- away from IT.

 

Steel

I'm still struck by the numbers. If you figure by, what did Chris say, 2017 51% of IT budgets will go to security? Then you have something like, if I remember correctly, 40% going on maintenance, that means businesses only have ~9% for tech that actually innovates, etc.

Author

Many organizations block physical and logical access to company property and information for employees who do not pass regular security tests.

 

Steel

No organization is too small, or too large, to be targeted.  If you're connected to the internet, you are a target.  Keep your systems patched, and enforce cyber education and awareness for all employees.

Steel

Chris: Here's a good question for you - So now, what's next for the security space?

Author

Yes, thanks, that was a great show, really interesting chat on security!

I agree with Chris: Seeking an external partner for security makes sense for SMBs ... and for many large organizations too. Had agreed before, but even more so now after hearing the IDG stats he shared at the beginning of the radio show.

Author

Great discussion! So now, what's next for the security space?

 

Steel

Agreed - I think tapping outside security resources is really helpful for small organizations. Thanks for answering my questions!

ha! Yes, I can think of a few examples...a friend of mine opened an email that looked like it came from her bank. She clicked on the link the email directed her to to reset her password and her account was compromised. 

Blushing over here but I fell for a test phishing email! It looked totally legit.

Steel

Yes I agree, hard to govern that.....

Steel

It seems like sometimes employees inadvertantly open the door to security threats (opening emails or downloading programs with viruses). How can companies encourage employees to be security advocates? 

@LizCoyne M2M is happening already but we still need human involvement. There is a human on the other end of the attack, after all.

Steel

@ajpritchard for sure, I wonder if ransomware is particularly bad for small organizations that may not have robust enough back ups

Hi @mouraryan! Weirdly enough that as soon as this show started I just got an email from my kids elementary school principal ... from her account...that said, click here to open this highly confidential document and it even had her email signature with the school logo. I forwarded it to another principal...like uh this is suspicious

Platinum

how can we combat botnets? It seems like a task that will be ideal for analytics and AI and M2M but are we anywhere near that type of solutions?

Platinum

It is scary to think they are going after businesses both large and small.

 

Steel

briefly "Swung by" to say hello to all....Just this morning, Clinton Foundation was hacked and docs were released..and on a personal note, I got a note that Uber was hacked and I had some data that apparently was compromised....on top of a phishing attack from Chase that I brought to chase' attention....so, we're in a war....100K domains is a profound challenge (and the Chase Email was as authentic as it could be).....

Steel

Yes, definitely seeing more ransomware reports on the news!

I was just wondering that too, @Kelsey

Platinum

What's an example of a social networking attack?

Wow, that's really interesting to hear about security!

that's a pretty intense increase

Platinum

Mile High in Denver!

 

Steel

Excited to hear from Level 3!

Hey all - looking forward to a great show!

 

Lookng forward to the show!

Steel

Thinking up questions now!

Steel

Hi eveeryone! Look forward to our radio show with Chris, going live in about 15 minutes or so. Get those questions ready! :)

Author

Really interested to hear what Chris has to say on the show today. 

Platinum

Looking forward to the show!

Steel

Wow! This will be a Good-Good show!! Can't wait!

Steel

Looking forward to the show!

Steel

Hope to attend should be interesting 

Steel


JOIN THE TESTING!
NFV Orchestration, Infrastructure and VNF
Click to read the Multi-Vendor Interoperability Showcase 2017

CSP Attitudes Toward Digital Transformation: A Reality Check
Click to download

NFVi - VNF Interoperability Evaluation
Status: Updated December 2016
Click to read test results from 2015

Service Chaining Interoperability Evaluation - Live NFV Interoperability Demo
Status: Completed in May 2016
Click to read the Live NFV Interop Demo Report

To learn how NFVi vendors may participate in the NIA's evaluations, click here.
TEST REPORTS
VIRTUAPEDIA
VIRTUAPEDIA INDEXES
Video
Andrew Dugan, acting Chief Technology Officer at Level 3, discusses the service provider's SDN success and plans for NFV.
Produced in partnership with Ericsson, Cisco, Intel and Oracle, the Virtuapedia is the ultimate information source for people, companies, ...
Dave Ward, Cisco's CTO of Engineering and Chief Architect, outlines his vision for the future of virtualization.
AT&T's Doug Nassaur discusses interoperability and virtualization during BCE 2016 in Austin.
Lynn Comp, senior director of market development for the Network Platforms Group for Intel, outlines her vision for the future of virtualization.
All Videos
New IP Agency
About Us     Contact Us     Help     Register     Compliance     FAQ     RSS
Copyright © 2017 New IP Agency, All rights reserved. Privacy Policy | Terms of Use