Navigation Links
The Security Consortium Announces Support for White House Cyber Chief Schmidt
Date:1/10/2010

Security “Czar” Wrote Foreword For TSC CEO Mark Kadrich’s Leading Security Book Endpoint Security

San Jose, CA (PRWEB) January 10, 2010 -- The Security Consortium, (TSC) a leading IT security testing, research and corporate counsel services organization, today announced its support for recently appointed White House cyber-security “czar” Howard Schmidt. A former chief security executive at Microsoft with 31 years' experience in law enforcement and the military, Schmidt is one of the world's leading authorities on computer security according to John Brennan, the White House counter-terrorism advisor. Schmidt also wrote the foreword for the leading security book, Endpoint Security, written by TSC CEO Mark Kadrich.

Similar to the goals Schmidt wants to accomplish in his newly created position, three years ago, Schmidt wrote in the book’s introduction that “moving forward… is the direction that information security needs to move today to have an even more secure cyberspace tomorrow. Moving forward means that we need to continue to innovate and be creative. In the past, people have innovated when they believed that they had a better way of doing something and they thought that they could make a difference. This book (Endpoint Security) is about security innovation – it’s about doing something new and making a difference.”

Published in 2007 by Addison-Wesley, Endpoint Security provides a comprehensive proven approach to securing network endpoints which is where the typical enterprise conducts most of its business. Disruption to these endpoints, a traditional target point for hackers and corporate criminals, can cause a huge impact to enterprises in terms of cost and lost productivity. As a result, today’s organizations are forced by necessity to confront endpoint security as a core business issue.

The cyber security initiatives Schmidt will unveil to secure the country’s way of doing business are described as well in the forward where he wrote “we need new tools if we are to continue to secure our critical infrastructure from those who would do us harm. …How we innovate is going to be the key to success in this battle, and part of that innovation is going to involve looking at things a little differently than how we have in the past.”

In the endpoint security battle, this innovation is revealed in Kadrich’s book where he illustrates a breakthrough strategy on how to protect endpoint devices from attack. Drawing on powerful process control techniques, the text shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’s newest threats, and prepare for tomorrow’s attacks. Unlike traditional “one-size-fits-all” solutions, Kadrich’s approach reflects the unique features of every endpoint, from its applications to its environment. Specific, customized strategies are presented on how to protect Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more, which is one of the key reasons Schmidt chose to endorse the book.

"Obama has displayed extraordinary vision by appointing Schmidt to this position in order to further the cybersecurity vision displayed in his campaign and the Cyberspace Policy Review unveiled in his May 29, 2009 speech,” said Mark Kadrich, TSC founder and CEO. “The power of this appointment will help to drive IT innovation at the highest levels of our government and our industry to take a strategic and proactive approach focused on securing our nation’s digital infrastructure.”

One of the early pioneers in the field of computer forensics and computer evidence collection, Schmidt established the first dedicated computer forensics lab in the government. His other government experience includes working for President George W. Bush as chair of the President's Critical Infrastructure Protection Board, where he reported to Condoleezza Rice, National Security Advisor and Governor Tom Ridge, Director of Homeland Security. In 2002, he helped develop the National Strategy to Secure Cyberspace, the first document of its kind in the government. He is a member of the American Academy of Forensic Scientists and has testified before congressional committees on computer security and cyber crime. He has also been instrumental in the creation of public and private partnerships and information-sharing initiatives. Schmidt previously served as the international president of the Information Systems Security Association (ISSA) where Kadrich currently serves as president of the Silicon Valley chapter.

"Schmidt will be a huge asset to this country," Kadrich continued. "His vast knowledge and understanding of the technology, business, and political issues will help keep the U.S. at the front edge of cyber security, and we are looking forward to working with him in this effort.”

About The Security Consortium:
Design, testing, counsel and leadership services from The Security Consortium (TSC) provide companies with the ability to balance the need for security with business objectives. TSC brings together design, network and product expertise with testing and process feedback to create competitive advantage for companies. By focusing on overall business results instead of narrow test requirements, TSC helps companies improve the processes used to create, purchase, and operate security products. The result is competitive advantage for both buyers and sellers through lower TCO, better quality and usability, fewer security vulnerabilities and more successful deployments. TSC is a privately held company, founded in 2007 and based in San Jose, California.

Further information on TSC is available at www.thesecurityconsortium.net or contact
Robin Lutchansky, Lutchansky Communications at 408/607-7118 or at robinL(at)Lcomm(dot)com.

Copyright © 2009 The Security Consortium, Inc. All rights reserved. TSC, TSC Wireless, The Security Consortium, and other TSC products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of The Security Consortium, Inc. All other product and service names mentioned are trademarks of their respective companies. Information in this document, including data, is for informational purposes only and is subject to change without notice. These materials are provided by The Security Consortium and its partners or affiliated companies without representation or warranty of any kind, and neither The Security Consortium, its affiliates or partners will be liable for any errors or omissions. The only warranties for The Security Consortium products or services are those set forth in the express warranty statements accompanying such products or services, if any.

# # #

Read the full story at http://www.prweb.com/releases/2010/01/prweb3428714.htm.


'/>"/>
Source: PRWeb
Copyright©2010 Vocus, Inc.
All rights reserved

Related medicine news :

1. National Disability Lawyer Gets 2010 Social Security Website Upgrade
2. 5th Annual Homeland Security Professionals Conference and Exposition in Vegas on October 25-29 2010
3. BlockMaster Launches SafeConsole 4.0 To Enhance Usability and Security of USB Devices
4. Rush Limbaugh & Michael Steele Join Tea Party Support & Social Security Institute-Demand GOP Senate Stop ObamaCare by Any Means Possible
5. Hard to Treat Diseases (HTDS) Comments on Recent Movement Of Its Security
6. Lumension Webinar Discusses How to Effectively Streamline Security and Compliance Initiatives
7. New Lumension Endpoint Management and Security Suite To Deliver End-to-End Endpoint Management Capabilities
8. Food Security to be the Top Issue for EUs Science Chief
9. NCL Security Launches EyeCentral Video Platform for the Security Industry to Generate Recurring Monthly Revenue for Central Stations and Security Dealers
10. Lumension Endpoint Management Platform Strategy to Reduce Complexity, Enhance Security & Compliance, and Expand Visibility across IT Operations and Security Functions
11. New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:2/13/2016)... ... 2016 , ... Hidden Cypress in Sun City is the place to be on March 3rd ... Frederick Weniger will be hosting this educational seminar from 5:30 p.m. – 7:00 p.m. ... special pricing on offers. In addition, prizes will be given away and light refreshments will ...
(Date:2/13/2016)... ... ... individuals looking to lead a healthy lifestyle have decreased carbohydrate consumption and increased their ... delved into this niche allowing those giving up their beloved pasta a chance to ... of protein and only 7 grams of carbohydrates per 50 gram serving--a ratio that ...
(Date:2/13/2016)... Tennessee (PRWEB) , ... February 13, 2016 , ... ... the Infusion Nurses Society (INS) states that vein visualization technology should be used ... by healthcare facilities around the world, the INS Standards mandate the use of ...
(Date:2/13/2016)... ... , ... In the early or “honeymoon” stage of a relationship, couples strive ... their way to be romantic, and may exaggerate a strength or two in an ... profile. , A recent study from Queendom.com , however, suggests that new ...
(Date:2/12/2016)... Antonio, TX (PRWEB) , ... February 12, 2016 , ... ... love, as expressed in Blue SKies Buddha, the biography of Rama - Dr. Frederick ... fact a love story, the love of a Buddhist teacher for teaching and helping ...
Breaking Medicine News(10 mins):
(Date:2/11/2016)... IRVINE, Calif., Feb. 11, 2016 PRO-DEX, INC. (NasdaqCM: ... quarter ended December 31, 2015. The Company also filed its ... fiscal year 2016 with the Securities and Exchange Commission today. ... December 31, 2015 --> --> ... 2015 increased $2.6 million, or 95%, to $5.4 million from ...
(Date:2/11/2016)... , Feb. 11, 2016   Health 2.0 , ... new health technologies, announced today " 10 Year Global ... health tech over the past ten years.   ... a decade, Health 2.0 has served as the preeminent ... connected with thousands of technologies, companies, innovators, and patient-activists ...
(Date:2/11/2016)... , Feb. 11, 2016  AfterPill.com is reporting that ... alcohol abstinence for all women who are at risk ... U.S. each year and raises the risks of unprotected ... --> According to the Guttmacher Institute, there ... women of child-bearing age, who have sex without the ...
Breaking Medicine Technology: