Five Minutes With … Tom Resau on the Changing “Rules” for Information Security

Resau: “The bull’s eye has shifted to the end user, particular with social media and devices. There’s a lot more the end user can do to get in trouble.”
Resau: “The bull’s eye has shifted to the end user, particular with social media and devices. There’s a lot more the end user can do to get in trouble.”

(If you like this blog, please share it. Thanks!)

Remember the good ol’ days – waaay back to a year like, say, 2002 – when a company’s security vendor got all the heat for a systems compromise? These days, there’s plenty of blame to go around: For starters, organizations need to take a good, close look at what internal users are doing to let the bad guys in.

In this “TechConnections: Five Minutes With …” installment, Tom Resau explains how “the rules” of information security are profoundly transforming. In the past, it was all about protecting hardware and software. Today, it’s still about that. But it’s also about staying on top of the constantly shifting perimeters of your enterprise and minimizing risks brought on by internal user-employees. (Note we say “minimizing” here. Not “eliminating.”) Listen to our conversation about information security assurance.

About our guest: Tom Resau is vice president at W2 Communications, focusing on information security communications/PR campaigns for clients. Resau has specialized in this area for nearly his entire career, lending his expertise to former employers such as Symantec and Pillsbury Winthrop Shaw Pittman, a global law firm.

This interview was hosted by Dennis McCafferty, Director of Content with W2 Communications, a high tech PR agency. Find out more about our full service communications offerings. Subscribe to our “Tech Connections: Five Minutes With …” series on iTunes.