Navigation Links
The Security Consortium Announces Support for White House Cyber Chief Schmidt

Security “Czar” Wrote Foreword For TSC CEO Mark Kadrich’s Leading Security Book Endpoint Security

San Jose, CA (PRWEB) January 10, 2010 -- The Security Consortium, (TSC) a leading IT security testing, research and corporate counsel services organization, today announced its support for recently appointed White House cyber-security “czar” Howard Schmidt. A former chief security executive at Microsoft with 31 years' experience in law enforcement and the military, Schmidt is one of the world's leading authorities on computer security according to John Brennan, the White House counter-terrorism advisor. Schmidt also wrote the foreword for the leading security book, Endpoint Security, written by TSC CEO Mark Kadrich.

Similar to the goals Schmidt wants to accomplish in his newly created position, three years ago, Schmidt wrote in the book’s introduction that “moving forward… is the direction that information security needs to move today to have an even more secure cyberspace tomorrow. Moving forward means that we need to continue to innovate and be creative. In the past, people have innovated when they believed that they had a better way of doing something and they thought that they could make a difference. This book (Endpoint Security) is about security innovation – it’s about doing something new and making a difference.”

Published in 2007 by Addison-Wesley, Endpoint Security provides a comprehensive proven approach to securing network endpoints which is where the typical enterprise conducts most of its business. Disruption to these endpoints, a traditional target point for hackers and corporate criminals, can cause a huge impact to enterprises in terms of cost and lost productivity. As a result, today’s organizations are forced by necessity to confront endpoint security as a core business issue.

The cyber security initiatives Schmidt will unveil to secure the country’s way of doing business are described as well in the forward where he wrote “we need new tools if we are to continue to secure our critical infrastructure from those who would do us harm. …How we innovate is going to be the key to success in this battle, and part of that innovation is going to involve looking at things a little differently than how we have in the past.”

In the endpoint security battle, this innovation is revealed in Kadrich’s book where he illustrates a breakthrough strategy on how to protect endpoint devices from attack. Drawing on powerful process control techniques, the text shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’s newest threats, and prepare for tomorrow’s attacks. Unlike traditional “one-size-fits-all” solutions, Kadrich’s approach reflects the unique features of every endpoint, from its applications to its environment. Specific, customized strategies are presented on how to protect Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more, which is one of the key reasons Schmidt chose to endorse the book.

"Obama has displayed extraordinary vision by appointing Schmidt to this position in order to further the cybersecurity vision displayed in his campaign and the Cyberspace Policy Review unveiled in his May 29, 2009 speech,” said Mark Kadrich, TSC founder and CEO. “The power of this appointment will help to drive IT innovation at the highest levels of our government and our industry to take a strategic and proactive approach focused on securing our nation’s digital infrastructure.”

One of the early pioneers in the field of computer forensics and computer evidence collection, Schmidt established the first dedicated computer forensics lab in the government. His other government experience includes working for President George W. Bush as chair of the President's Critical Infrastructure Protection Board, where he reported to Condoleezza Rice, National Security Advisor and Governor Tom Ridge, Director of Homeland Security. In 2002, he helped develop the National Strategy to Secure Cyberspace, the first document of its kind in the government. He is a member of the American Academy of Forensic Scientists and has testified before congressional committees on computer security and cyber crime. He has also been instrumental in the creation of public and private partnerships and information-sharing initiatives. Schmidt previously served as the international president of the Information Systems Security Association (ISSA) where Kadrich currently serves as president of the Silicon Valley chapter.

"Schmidt will be a huge asset to this country," Kadrich continued. "His vast knowledge and understanding of the technology, business, and political issues will help keep the U.S. at the front edge of cyber security, and we are looking forward to working with him in this effort.”

About The Security Consortium:
Design, testing, counsel and leadership services from The Security Consortium (TSC) provide companies with the ability to balance the need for security with business objectives. TSC brings together design, network and product expertise with testing and process feedback to create competitive advantage for companies. By focusing on overall business results instead of narrow test requirements, TSC helps companies improve the processes used to create, purchase, and operate security products. The result is competitive advantage for both buyers and sellers through lower TCO, better quality and usability, fewer security vulnerabilities and more successful deployments. TSC is a privately held company, founded in 2007 and based in San Jose, California.

Further information on TSC is available at or contact
Robin Lutchansky, Lutchansky Communications at 408/607-7118 or at robinL(at)Lcomm(dot)com.

Copyright © 2009 The Security Consortium, Inc. All rights reserved. TSC, TSC Wireless, The Security Consortium, and other TSC products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of The Security Consortium, Inc. All other product and service names mentioned are trademarks of their respective companies. Information in this document, including data, is for informational purposes only and is subject to change without notice. These materials are provided by The Security Consortium and its partners or affiliated companies without representation or warranty of any kind, and neither The Security Consortium, its affiliates or partners will be liable for any errors or omissions. The only warranties for The Security Consortium products or services are those set forth in the express warranty statements accompanying such products or services, if any.

# # #

Read the full story at

Source: PRWeb
Copyright©2010 Vocus, Inc.
All rights reserved

Related medicine news :

1. National Disability Lawyer Gets 2010 Social Security Website Upgrade
2. 5th Annual Homeland Security Professionals Conference and Exposition in Vegas on October 25-29 2010
3. BlockMaster Launches SafeConsole 4.0 To Enhance Usability and Security of USB Devices
4. Rush Limbaugh & Michael Steele Join Tea Party Support & Social Security Institute-Demand GOP Senate Stop ObamaCare by Any Means Possible
5. Hard to Treat Diseases (HTDS) Comments on Recent Movement Of Its Security
6. Lumension Webinar Discusses How to Effectively Streamline Security and Compliance Initiatives
7. New Lumension Endpoint Management and Security Suite To Deliver End-to-End Endpoint Management Capabilities
8. Food Security to be the Top Issue for EUs Science Chief
9. NCL Security Launches EyeCentral Video Platform for the Security Industry to Generate Recurring Monthly Revenue for Central Stations and Security Dealers
10. Lumension Endpoint Management Platform Strategy to Reduce Complexity, Enhance Security & Compliance, and Expand Visibility across IT Operations and Security Functions
11. New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
Post Your Comments:
(Date:11/27/2015)... CA (PRWEB) , ... November 27, 2015 , ... According ... carried out by the University of Toronto and the University of British Columbia suggested ... hospitalizations for head injuries. The article explains that part of the reason for the ...
(Date:11/27/2015)... , ... November 27, 2015 , ... ... safe and convenient way to dispense prescription medications at home, so he invented ... way to monitor and dispense prescription medications. In doing so, it could help ...
(Date:11/27/2015)... ... November 27, 2015 , ... ProSidebar: Fashion is a ... X. With ProSidebar: Fasion, video editors can easily add an informative sidebar to ... title opener. Utilize presets featuring self-animating drop zones, lines, bars, and text with ...
(Date:11/27/2015)... , ... November 27, 2015 , ... A simply groundbreaking ... is an interesting show that delves into an array of issues that are presently ... could benefit from open dialogue, this show is changing the subjects consumers focus on, ...
(Date:11/27/2015)... ... November 27, 2015 , ... The men and women on ... organizations in the country. They have overseen financial turnarounds, shown commitment to their ... healthcare industry as a whole through their advocacy and professional efforts. , Becker's ...
Breaking Medicine News(10 mins):
(Date:11/26/2015)... , November 26, 2015 --> ... to use SyMRI to find optimal contrast weighting of MRI ... metastases, and has signed a research agreement with SyntheticMR in ... hospital. Using SyMRI, it is possible to generate multiple contrast ... after the patient has left, thus making it possible to ...
(Date:11/26/2015)... DUBLIN , November 26, 2015 ... has announced the addition of the  ... in the Global Cell Surface Testing ... Opportunities" report to their offering.  ... the addition of the  "2016 Future ...
(Date:11/26/2015)... , November 26, 2015 /PRNewswire/ ... --> adds "Global ... and "Investigation Report on China Repaglinide ... 2021 forecasts data and information to ... . --> ...
Breaking Medicine Technology: