The upcoming Interop event in Las Vegas will offer lots of sessions and workshops from fellow IT professionals and experts to attend and get current on your interests.
Take part in the social gathering to meet old friends and make new ones. Personal networking is as important as anything in your career.
Interop is next week and I am looking forward to catching up with old friends, peers, and colleagues and making new acquaintances. Still, the draw for me is meeting with vendors and attending a few of the presentations over the course of the event. The content this year is very solid and there’s something for everyone.
The true value of SDN lies in the benefits it can provide across a number of IT environments, but determining that specific value is difficult at best and requires context that only you can provide.
Make a point of extending the discussion about SDN at conferences and take the time to share your experiences and concerns with your IT colleagues; everyone will reap benefits far beyond the price of admission.
The SDN discussion really needs to move beyond the technology that powers it and towards the value it provides to enterprise IT. Thankfully analysts, press, and technical bloggers are all starting to talk about the value that SDN provides in addition to technology and I think we’ll see much more in 2014. Continue reading “Make Speaking on SDN a 2014 Resolution”→
Educate end users on the reasons behind corporate security policies and the nature of social engineering to help reduce risky behavior.
Ensure end users understand corporate policies around the use of personal smartphones and tablets for accessing corporate resources.
With this year’s huge rise in the awareness of advanced persistent threats (APTs), now would be a good time to focus on educating employees not only about corporate policies and government mandates, but also about the growing risk that these APTs pose to the organization. By educating end users about the reasons behind the policies, as well as the nature of such attacks, security professionals can get better buy-in from those end users, increasing the likelihood of changing risky end user behavior. Given the focus of these APTs on gaining entry through more sophisticated spear phishing attempts, encouraging a heightened vigilance among end users could be an additional tool in the security practitioner’s toolbox. With attackers’ proclivity for identifying users within the organization which have the credentials to access systems with sensitive data, and then sending e-mails that appear to be legitimate and contain links to sites with malicious code or attached documents infected with malware, end users become the weak link in the chain of trust. In addition, the combination of the growing BYOD phenomenon and the upcoming Christmas shopping season makes this an ideal time to remind end users of the dangers of careless Internet usage as well as corporate policies regarding smartphones and tablets.