to learn more about MatthewRosenquist, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
Cybersecurity issues are putting measurable and significant pressure on organizations, including technology executives. Security has always been linked to the prosperity of the technology market, but for many ye... Cybersecurity is Affecting the Technology MarketBack In cybersecurity, so many times the wrong questions are being asked. Case in point. Executives are notorious for asking IF their organization is secure, rather than HOW secure are they. It is a subtle difference but a... Security is Not an AbsoluteBack Security is valuable, but comes at a cost. Businesses and organizations must weight investments in security with the costs and potential impacts to productivity and user experiences. It is a balancing act ... Security is About Balancing TradeoffsBack In the first installment in a series from Semiconductor Engineering, The Next Big Threat declares how security is no longer just a software problem. They are absolutely correct and bring up a number of important... In the digital world, opportunities and risks coexist. To achieve and maintain a balanced Cyber Strategy, implementing a model of "connected security" has become a new imperative in business and society. Managem... Intel Cyber Security Briefing - Trends, Challenges, and Leadership Opportunities - Cyberstrat14Back They got it right. In early 2000, Intel senior management correctly predicted the increase of importance in computer security. The era of cyber was going strong but the combination of a rapidly growing worldwide... Back Cyber security is fraught with chaos, uncertainty and surprises. Insights into the future are a risky proposition, but they can be very valuable in preparing for the challenges ahead. As part of my annual practi... Top 10 Cyber Security Predictions for 2014 and BeyondBack The McKinsey and World Economic Forum report Risk and Responsibility in a Hyperconnected World: Implications for Enterprises looks at the potential consequences of cyber threats to the world’s economy. It... Risk and Responsibility Report Sizes the Importance of CybersecurityBack The estimated growth of devices connected to the Internet is staggering. By 2020 Cisco estimates that 99% of devices (50 billion) will be connected to the Internet. In contrast, currently only around 1% is... Cyber Security is Not Prepared for the Growth of Internet Connected DevicesBack To defeat cyber attacks, we must first understand their characteristics and how they come about. Deconstructing threats is a way of comprehending the factors which drive information security strategy. Without understa... Deconstructing Cyber Security Attacks - Threat ModelBack As an information security strategist for Intel, and a 20-year veteran of the infosec industry, security is my passion. Throughout the week, I come across quite a few interesting articles, or have thoughts about indus... Security Digest: Is Rapid Detection the New Prevention? Are NFC Lamp Posts at Risk? and the Greatest Threat Facing the United StatesBack During the 2013 Intel IT Experts Tour, an audience of IT professionals showed great concern and interest in the challenges of protecting their computing environments from cyber security threats. As part of Intel... Intel IT Experts Tour Security PresentationBack Join me at the Cyberstrat14 security conference in Helsinki on January 22nd. Myself and other keynote speakers and will discuss the challenges and meaningful practices to manage cyber security risks. &nbs... Join Me at the Cyberstrat14 Security Conference in Helsinki, Jan 22ndBack War is a branch-path for governments to achieve political objectives through the influence or application of power. Throughout history, leaders have applied cutting-edge technology in the pursuit of political as... How Cyber War is Different than WarBack Another job well done by the Microsoft Digital Crimes Unit (DCU). My heroes and heroines at the DCU partnered with Europol’s European Cybercrime Centre (EC3), the FBI, and technology industry leaders to ta... Another Win in the Battle Against Botnets!Back Join me at the Cyberstrat13 security conference in Paris on November 26th. I am the keynote speaker and will discuss the challenges and meaningful practices to manage cyber security risks. In the ... Join Me at the Cyberstrat13 Security Conference in Paris, Nov 26thBack The rise in offensive cyber security will cause major shifts in traditional threat and protection strategies. The shift is happening now, as the markets grow, threats increase, players change, and we all are bei... How Offensive Cyber Security is Changing the IndustryBack Enough fluff, smoke, and flash: get to the point. Why have security? At the end of the day, it is all about loss. If you don't like experiencing loss then you must do something to avoid, minimize, or control it... Purpose of Security ProgramsBack Join me at the Cyberstrat13 security conference in Rome on November 21st. I am the keynote speaker and will discuss the challenges and meaningful practices to manage cyber security risks. In the d... Join Me at the Cyberstrat13 Security Conference in Rome, Nov 21stBack Fellow security professionals, come join me at the T.E.N. Cyberstrat13 The Art of Cyber War: Managing Complexity security conference in New York City, September 24th. I will be one of the many speakers discussing chal... Join Me at the Cyberstrat13 Security Conference in NYC Sept 24thBack