Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 59, 2019 - Issue 2
 

ABSTRACT

Few areas within the security domain are more critical than incident response. Unfortunately, incident response—similar to business continuity—tends to be overlooked or under-prioritized given day-to-day requirements on the CISO’s time. Ignore incident response at your own peril.

Additional information

Notes on contributors

Matt Stamper

Matt Stamper is a Certified Information Systems Auditor (CISA), a Certified Information Security Manager (CISM) and a Certified Information Privacy Professional (CIPP/US) with public and early-stage company experience. Matt brings a broad, multidisciplinary understanding to cybersecurity best practices to his clients. His diverse domain knowledge spans IT service management (ITSM), cybersecurity, cloud services, control design and assessment (Sarbanes-Oxley, HIPAA-HITECH), privacy (GDPR, CCPA), governance, enterprise risk, and IT management (ERM/ITRM), sales management and individual revenue contribution, new product and service development as well as international experience in both Latin America and China. Matt excels at conveying complex cybersecurity and IT concepts to boards of directors, executive management, as well as professional service providers. His executive-level experience with managed services, cybersecurity, data centers, networks services, and ITSM provides a unique perspective on the fast-changing world of enterprise IT, IoT, and cloud services. Matt is also the co-author of the CISO Desk Reference Guide, Volumes 1 & 2, co-authored with Gary Hayslip and Bill Bonney. Matt received a Bachelor of Arts from the University of California at San Diego, a Master of Arts in Pacific International Affairs from the University of California at San Diego, and a Master of Science degree in Telecommunications sponsored by AT&T.

Gary Hayslip

Gary Hayslip is the CISO for Webroot, where he advises executive leadership on protecting critical information resources and oversees enterprise cybersecurity strategy. His mission includes creating a “risk aware” culture that places a high value on securing and protecting customer information entrusted to Webroot. Hayslip’s career in the fields of enterprise information security and network security spans more than 20 years and includes multiple CIO, CISO, CRO, and deputy director of IT positions for the U.S. Navy, the Federal Government, the City of San Diego, and Webroot. Hayslip recently co-authored the CISO Desk Reference Guide: A Practical Guide for CISOs—Volumes 1 & 2, which are considered among the leading books on enabling CISOs to expand their expertise and scope of business knowledge. Hayslip is an active member of the professional organizations ISC2, ISSA, ISACA, OWASP, and InfraGard. He currently holds several professional certifications, including CISSP, CISA, and CRISC. Hayslip has a BS in information systems management from UMUC and an MBA from San Diego State University.

Bill Bonney

Bill Bonney is a security evangelist, author, and consultant. Most recently, Bill was vice president of Product Marketing and chief strategist at FHOOSH, a maker of high-speed encryption software. Prior to FHOOSH, Bill held executive management roles at the firms Intuit (maker of TurboTax and QuickBooks) and FICO (of the famed “FICO Score”) and was vice president of Product Marketing and a Principal Consulting Analyst at TechVision Research. Bill holds multiple patents in data protection, access, and classification, and is a member of the Board of Advisors for CyberTECH, a San Diego incubator, and is on the board of directors for the San Diego CISO Roundtable, a professional group focused on building relationships and fostering collaboration in information security management. Bill is a highly regarded speaker and panelist addressing technology and security concerns. Bill recently co-authored the CISO Desk Reference Guide: A Practical Guide for CISOs— Volumes 1 & 2, which are considered among the leading books for CISOs and aspiring CISOs. He holds a Bachelor of Science degree in Computer Science and Applied Mathematics from Albany University.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.