Governance & Risk Management , Next-Generation Technologies & Secure Development

Why Automation of Security Controls Is Lagging

Ted Gary of Tenable on Overcoming Challenges
Ted Gary, senior product marketing manager, Tenable

New research shows that the automation of five key security controls is lacking at a majority of organizations, says Ted Gary of Tenable. A key reason why: the lack of skilled cybersecurity professionals.

See Also: Conquer Any Security Challenge With Next-Gen Solutions

In an interview at Information Security Media Group's recent Healthcare Security Summit in New York, Gary discusses:

  • The need to get management support for using a security framework;
  • The challenges facing the healthcare sector; and
  • The need to learn about a broad range of security controls.

Gary is senior product marketing manager for security frameworks at Tenable. With more than 10 years' of information security experience in both product management and product marketing roles, he has defined SaaS security services, file integrity management and configuration assessment products. Gary has been trained as an internal IT auditor and has helped companies assess their compliance with security frameworks.

About the Author

Tracy Kitten

Tracy Kitten

Former Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity

Kitten was director of global events content and an executive editor at ISMG. A veteran journalist with more than 20 years of experience, she covered the financial sector for over 10 years. Before joining Information Security Media Group in 2010, she covered the financial self-service industry as the senior editor of ATMmarketplace, part of Networld Media. Kitten has been a regular speaker at domestic and international conferences, and was the keynote at ATMIA's U.S. and Canadian conferences in 2009. She has been quoted by, ABC News, and MSN Money.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.