Artwork

Treść dostarczona przez #AskTheCEO and #AskTheCEO Podcast. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez #AskTheCEO and #AskTheCEO Podcast lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

Secure Computing Endpoints With Rob Kirk

27:32
 
Udostępnij
 

Manage episode 246290854 series 2525701
Treść dostarczona przez #AskTheCEO and #AskTheCEO Podcast. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez #AskTheCEO and #AskTheCEO Podcast lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Rob Kirk has been with IBM and Lenovo for a combined 32 years of experience in the PC industry. As currently a member of Lenovo's Technical Client Advisor unit, Rob covers Corporate and Healthcare customers, providing technical expertise regarding Lenovo's end-user services, products, and capabilities. With a strong focus on Lenovo's security products and solutions, Rob has been a part of the team representing Lenovo at conferences like BlackHat and Ignite, among other public events. Lenovo makes some of the best and most secure products in the PC industry, and Rob Kirk is part of the team that presents them to the marketplace and educates customers in their use. Lenovo site filled with imaging and security information, plus much more! https://pcsupport.lenovo.com/us/en/solutions/HT504220 Read more about Lenovo Thinkshield: http://bit.ly/ThinkShield Contact Avrohom: Web: https://asktheceo.biz Twitter: @avrohomg Instagram: @avrohomg INTERVIEW HIGHLIGHTS: [00:25] Rob, I’m so excited to be speaking with you today, because not a day goes by without us hearing about the dreaded Data Breach. Whether it’s a computer getting hacked, or someone’s laptop getting stolen, it seems like CIOs and CISOs have their work cut out for them. What are some of the considerations CIOs should be having when thinking about selecting their next refresh of computing endpoints without having that additional worry about data breaches? [00:55] Securing against a data breach starts way before assets even come into the company! [01:05] Cybersecurity is a holistic process which starts with a vetted secure supply chain. [02:45] Step 2 of Cybersecurity is ensuring that all software has been updated to the latest release level. [03:00] How Lenovo helps companies maintain the Cybersecurity status of their assets, even when the customer’s IT department removes the pre-loaded OS. [04:00] What client security advisory process does Lenovo have in place, in the event they get hacked and breached? [05:50] A docking station is a Cybersecurity vulnerability! [08:40] The process of security needs to extend to cover the full life cycle of the product. [09:28] One of the things that keep me up at night, as a person who is very active in the Cybersecurity industry, is the fact that no matter how secure your technology is today – even if it’s a veritable Fort Knox; impervious to any and all attacks known to man – you and I both know that in 6 months from now, a new vulnerability will either be discovered, or created by new technology that’s unimaginable, even today. I’m certain that CISCOs around the world are concerned about that as well. How can we EVER be secure from threats that don’t even exist yet?! [11:00] Manufacturers that have few updates on their website should be taken as a warning sign. [11:20] Manufacturers that have many updates, listed on their websites, means that they’re paying attention. [12:50] Even if you have a secure device, end-users are a major Cybersecurity vulnerability! [14:30] Facial recognition and biometrics help with Cybersecurity by preventing people from seeing you type a password. [15:19] When using a laptop in a public area, facial recognition can trigger your monitor to blur when it detects someone looking over your shoulder. [16:49] As a global leader in secure computing endpoints, can you share some best practices on how businesses can be Cyber-Safe without slowing people down or sacrificing on productivity? [19:31] What are some of the considerations business executives need to have when selecting their next computing assets, to cut down on occurrences of end-users disabling security software? [22:11] How do people connect with you? [26:18] Do you have any parting words of wisdom that you’d like to share with the audience? [26:30] “If it ain’t broke, don’t fix it” is the wrong philosophy when it comes to Cybersecurity!
  continue reading

116 odcinków

Artwork
iconUdostępnij
 
Manage episode 246290854 series 2525701
Treść dostarczona przez #AskTheCEO and #AskTheCEO Podcast. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez #AskTheCEO and #AskTheCEO Podcast lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Rob Kirk has been with IBM and Lenovo for a combined 32 years of experience in the PC industry. As currently a member of Lenovo's Technical Client Advisor unit, Rob covers Corporate and Healthcare customers, providing technical expertise regarding Lenovo's end-user services, products, and capabilities. With a strong focus on Lenovo's security products and solutions, Rob has been a part of the team representing Lenovo at conferences like BlackHat and Ignite, among other public events. Lenovo makes some of the best and most secure products in the PC industry, and Rob Kirk is part of the team that presents them to the marketplace and educates customers in their use. Lenovo site filled with imaging and security information, plus much more! https://pcsupport.lenovo.com/us/en/solutions/HT504220 Read more about Lenovo Thinkshield: http://bit.ly/ThinkShield Contact Avrohom: Web: https://asktheceo.biz Twitter: @avrohomg Instagram: @avrohomg INTERVIEW HIGHLIGHTS: [00:25] Rob, I’m so excited to be speaking with you today, because not a day goes by without us hearing about the dreaded Data Breach. Whether it’s a computer getting hacked, or someone’s laptop getting stolen, it seems like CIOs and CISOs have their work cut out for them. What are some of the considerations CIOs should be having when thinking about selecting their next refresh of computing endpoints without having that additional worry about data breaches? [00:55] Securing against a data breach starts way before assets even come into the company! [01:05] Cybersecurity is a holistic process which starts with a vetted secure supply chain. [02:45] Step 2 of Cybersecurity is ensuring that all software has been updated to the latest release level. [03:00] How Lenovo helps companies maintain the Cybersecurity status of their assets, even when the customer’s IT department removes the pre-loaded OS. [04:00] What client security advisory process does Lenovo have in place, in the event they get hacked and breached? [05:50] A docking station is a Cybersecurity vulnerability! [08:40] The process of security needs to extend to cover the full life cycle of the product. [09:28] One of the things that keep me up at night, as a person who is very active in the Cybersecurity industry, is the fact that no matter how secure your technology is today – even if it’s a veritable Fort Knox; impervious to any and all attacks known to man – you and I both know that in 6 months from now, a new vulnerability will either be discovered, or created by new technology that’s unimaginable, even today. I’m certain that CISCOs around the world are concerned about that as well. How can we EVER be secure from threats that don’t even exist yet?! [11:00] Manufacturers that have few updates on their website should be taken as a warning sign. [11:20] Manufacturers that have many updates, listed on their websites, means that they’re paying attention. [12:50] Even if you have a secure device, end-users are a major Cybersecurity vulnerability! [14:30] Facial recognition and biometrics help with Cybersecurity by preventing people from seeing you type a password. [15:19] When using a laptop in a public area, facial recognition can trigger your monitor to blur when it detects someone looking over your shoulder. [16:49] As a global leader in secure computing endpoints, can you share some best practices on how businesses can be Cyber-Safe without slowing people down or sacrificing on productivity? [19:31] What are some of the considerations business executives need to have when selecting their next computing assets, to cut down on occurrences of end-users disabling security software? [22:11] How do people connect with you? [26:18] Do you have any parting words of wisdom that you’d like to share with the audience? [26:30] “If it ain’t broke, don’t fix it” is the wrong philosophy when it comes to Cybersecurity!
  continue reading

116 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi