SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Mark Goldstein Value Proposition

I protect corporate, customer, and employee data in a complex legal, regulatory, and
technological environment that changes daily. I started in cybersecurity/privacy as the victim of
ID theft and have seen how threats affect families, organizations, and now our national security.
As a MBA with 20+ years working in various functions I combine process & technology, along
with the critical component, the people to make the protection of data embedded in the
organizational DNA.

The nexus of cybersecurity, privacy, and business       Compliance
Working across the ecosystem/know the parts             Collaborative
Focus on the customeremployeethe human                Protect the data like it’s your own
Speak the language of business                          Future focus/proactive strategy
Data is everywhere

The nexus of cybersecurity, privacy, and business – Security is how you protect data. Privacy
is what you do with the data. Both have the same goals but they take different paths. It is easy to
find someone who knows cybersec or privacy but not easy to find someone who covers both
fields. I integrate privacy practices (i.e., privacy by design, privacy assessments) and security
practices (i.e., least privilege, strong passwords) with a focus on business objectives. Having
worked in customer service, engineering, IT, project management, salesmarketing, I connect
protection of information across business operations and the critical element, employees, to make
it part of the enterprise’s DNA.

Working across the ecosystem/know the parts – Cybersecurity & privacy issues are complex
including technology (encrypting data in motion/at rest), human behavior (how to get
customers/employees to create strong passwords), current events (breaches, FTC settlements,
competitive changes), and legal/regulatory (what will the Supreme Court say about privacy, will
Congress enact breach legislation). I understand the components of this ecosystem protecting
data whether it is in the cloud, in a smartphone, or in an employee’s laptop.

Focus on the customeremployeethe human – Often organizations focus on technological
solutions while short-changing the human side of the equation. People can do great damage.
Connect employees with consequences of their actions. Engage people in the process. Take the
complexity out of cybersecurity/privacy.

Protect the data like it’s your own (and often it is) – I’m a passionate protector of all kinds of
information from financial data and intellectual property to company, customer, and employee
data. This comes from being the victim of ID theft as well as sitting in kitchens of dozens of
customers who were severely affected by malware, ID theft, and reputational damage. This is
serious stuff! Spread the passion to employees.

Collaborative – When working across organizational functions, collaboration is essential. Find
solutions that are wins for multiple groups. I started quarterly reviews between AOL’s privacy
and cybersecurity teams. This not only increased “eyes” looking for potential issues but it
enhanced the value of each team.


MG Value Proposition                             1                     1 December 2011 (Ver. 1.4)
Compliance – I worry about reduction in incidents rather than percentage of compliance.
“Compliance hawks” use checkboxes to ensure privacy and security. They think their job is done
when they check off all of their compliance metrics. Compliance is important but it should set
the “minimum floor.”

Speak the language of business – Effectively communicate the value of privacy/security I
speak the language of CFO’s who are concerned with ROI of cybersecurityprivacy investments,
chief marketing officers who worry about brand perception, chief legal officers who worry about
FTC investigations, and CEO’s who want to ensure risk is mitigated.

Future focus/proactive strategy –Changes happen fast in cybersecurity/privacy. Just read the
news. While it is important to know what happened to ensure it doesn’t happen again, I
proactively find the vulnerabilities and the areas that will be getting the attention of privacy
advocates and regulators. I ensure employees are proactively trained to be cybersecurity/privacy
sensitive and to use privacy/security by design when creating new products. Cloud computing,
mobile data management (MDM), “big data,” consumerization of IT, hacktivism, and mobile
apps are causing major changes. I understand these issues and anticipate the next issue.

Information security doesn’t end at the company’s gates – The touch points with customers
are growing through mobile apps, social networks, e-commerce sites, call centers, and traditional
bricks-and-mortar. Partners, vendors, and suppliers have access to sensitive data. Data flows
everywhere and there is a need to know where. At AOL I mapped dozens of data elements at
outsourced call centers, marketing partners, and service providers.




MG Value Proposition                            2                    1 December 2011 (Ver. 1.4)

Mais conteúdo relacionado

Mais procurados

GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!
GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!
GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!Elinar
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Information security in public governance
Information security in public governanceInformation security in public governance
Information security in public governanceTemitayo Oladiran
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questionsBill McCabe
 
JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016Jon Neiditz
 
Governing the Chaos
Governing the ChaosGoverning the Chaos
Governing the ChaosJohn Hansen
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...ProductNation/iSPIRT
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity
 
4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...
4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...
4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...Jheronimus Academy of Data Science
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsGiulio Coraggio
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware anAKHIL969626
 

Mais procurados (20)

GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!
GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!
GDPR and Privacy Data AI Miner - Solve your complex privacy data challenges!
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Information security in public governance
Information security in public governanceInformation security in public governance
Information security in public governance
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Helen paige
Helen paigeHelen paige
Helen paige
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016
 
Governing the Chaos
Governing the ChaosGoverning the Chaos
Governing the Chaos
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop Quiz
 
4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...
4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...
4. Workshop Responsible Data Science - Discussion on Confidentiality in data ...
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rights
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware an
 

Destaque (19)

Materiales
MaterialesMateriales
Materiales
 
Factsheet Electricity Emission
Factsheet Electricity EmissionFactsheet Electricity Emission
Factsheet Electricity Emission
 
Krönikan
KrönikanKrönikan
Krönikan
 
Nursing education
Nursing educationNursing education
Nursing education
 
Imagem 019
Imagem 019Imagem 019
Imagem 019
 
Imagem 028
Imagem 028Imagem 028
Imagem 028
 
Ultrasound technician jobs description
Ultrasound technician jobs descriptionUltrasound technician jobs description
Ultrasound technician jobs description
 
Literatue Review
Literatue ReviewLiteratue Review
Literatue Review
 
Menu natale 2011
Menu natale 2011Menu natale 2011
Menu natale 2011
 
Shot list
Shot listShot list
Shot list
 
Tic
TicTic
Tic
 
Imagem 042
Imagem 042Imagem 042
Imagem 042
 
Pmi%20for%20 custom%20closet%20 %20sheet1
Pmi%20for%20 custom%20closet%20 %20sheet1Pmi%20for%20 custom%20closet%20 %20sheet1
Pmi%20for%20 custom%20closet%20 %20sheet1
 
Introdução ao LaTeX v.2 (SECCOM 2013)
Introdução ao LaTeX v.2 (SECCOM 2013)Introdução ao LaTeX v.2 (SECCOM 2013)
Introdução ao LaTeX v.2 (SECCOM 2013)
 
No0rmiitha 108
No0rmiitha 108No0rmiitha 108
No0rmiitha 108
 
Picture Story: 'Picturing smarter buildings during a day at the museum
Picture Story: 'Picturing smarter buildings during a day at the museumPicture Story: 'Picturing smarter buildings during a day at the museum
Picture Story: 'Picturing smarter buildings during a day at the museum
 
Introducción a ram en gcb
Introducción a  ram en gcbIntroducción a  ram en gcb
Introducción a ram en gcb
 
Guianomina2012
Guianomina2012Guianomina2012
Guianomina2012
 
Cuento la lombriz excavadora pdf
Cuento la lombriz excavadora pdfCuento la lombriz excavadora pdf
Cuento la lombriz excavadora pdf
 

Semelhante a Mark Goldstein Value Proposition

Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Security Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItSecurity Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItPeak 10
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityDavid X Martin
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure CommunicationsKavika Roy
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 

Semelhante a Mark Goldstein Value Proposition (20)

Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Security Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItSecurity Hurts Business - Don't Let It
Security Hurts Business - Don't Let It
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 

Mark Goldstein Value Proposition

  • 1. Mark Goldstein Value Proposition I protect corporate, customer, and employee data in a complex legal, regulatory, and technological environment that changes daily. I started in cybersecurity/privacy as the victim of ID theft and have seen how threats affect families, organizations, and now our national security. As a MBA with 20+ years working in various functions I combine process & technology, along with the critical component, the people to make the protection of data embedded in the organizational DNA. The nexus of cybersecurity, privacy, and business Compliance Working across the ecosystem/know the parts Collaborative Focus on the customeremployeethe human Protect the data like it’s your own Speak the language of business Future focus/proactive strategy Data is everywhere The nexus of cybersecurity, privacy, and business – Security is how you protect data. Privacy is what you do with the data. Both have the same goals but they take different paths. It is easy to find someone who knows cybersec or privacy but not easy to find someone who covers both fields. I integrate privacy practices (i.e., privacy by design, privacy assessments) and security practices (i.e., least privilege, strong passwords) with a focus on business objectives. Having worked in customer service, engineering, IT, project management, salesmarketing, I connect protection of information across business operations and the critical element, employees, to make it part of the enterprise’s DNA. Working across the ecosystem/know the parts – Cybersecurity & privacy issues are complex including technology (encrypting data in motion/at rest), human behavior (how to get customers/employees to create strong passwords), current events (breaches, FTC settlements, competitive changes), and legal/regulatory (what will the Supreme Court say about privacy, will Congress enact breach legislation). I understand the components of this ecosystem protecting data whether it is in the cloud, in a smartphone, or in an employee’s laptop. Focus on the customeremployeethe human – Often organizations focus on technological solutions while short-changing the human side of the equation. People can do great damage. Connect employees with consequences of their actions. Engage people in the process. Take the complexity out of cybersecurity/privacy. Protect the data like it’s your own (and often it is) – I’m a passionate protector of all kinds of information from financial data and intellectual property to company, customer, and employee data. This comes from being the victim of ID theft as well as sitting in kitchens of dozens of customers who were severely affected by malware, ID theft, and reputational damage. This is serious stuff! Spread the passion to employees. Collaborative – When working across organizational functions, collaboration is essential. Find solutions that are wins for multiple groups. I started quarterly reviews between AOL’s privacy and cybersecurity teams. This not only increased “eyes” looking for potential issues but it enhanced the value of each team. MG Value Proposition 1 1 December 2011 (Ver. 1.4)
  • 2. Compliance – I worry about reduction in incidents rather than percentage of compliance. “Compliance hawks” use checkboxes to ensure privacy and security. They think their job is done when they check off all of their compliance metrics. Compliance is important but it should set the “minimum floor.” Speak the language of business – Effectively communicate the value of privacy/security I speak the language of CFO’s who are concerned with ROI of cybersecurityprivacy investments, chief marketing officers who worry about brand perception, chief legal officers who worry about FTC investigations, and CEO’s who want to ensure risk is mitigated. Future focus/proactive strategy –Changes happen fast in cybersecurity/privacy. Just read the news. While it is important to know what happened to ensure it doesn’t happen again, I proactively find the vulnerabilities and the areas that will be getting the attention of privacy advocates and regulators. I ensure employees are proactively trained to be cybersecurity/privacy sensitive and to use privacy/security by design when creating new products. Cloud computing, mobile data management (MDM), “big data,” consumerization of IT, hacktivism, and mobile apps are causing major changes. I understand these issues and anticipate the next issue. Information security doesn’t end at the company’s gates – The touch points with customers are growing through mobile apps, social networks, e-commerce sites, call centers, and traditional bricks-and-mortar. Partners, vendors, and suppliers have access to sensitive data. Data flows everywhere and there is a need to know where. At AOL I mapped dozens of data elements at outsourced call centers, marketing partners, and service providers. MG Value Proposition 2 1 December 2011 (Ver. 1.4)