Home » The Art of Data Protection » Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?
Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?
February 17, 2012, 01:30 pm EDT
David Etue and Joshua Corman have flipped ROI on its head, looking not from the company’s perspective, but from the adversary’s – the cybercriminal seeking to steal valuable corporate assets. In their session at the RSA Conference, Josh and David will introduce the “Adversary ROI” model, and show how it can change how you evaluate cyber security investment. Attend their session on Wednesday, February 29th at 9:30am, room 309.
Want a session preview? Listen to this podcast where they explain more about Adversary ROI.
Joshua Corman is Director of Security Intelligence for Akamai Technologies. Corman has more than a decade of security experience, most recently serving as Research Director for The 451 Group. His research cuts across sectors to the core challenges of the industry, and drives adaptive strategies amidst changing landscapes. He is a candid and highly coveted speaker and has spoken at leading industry events such as RSA, Interop, ISACA, SANS, DEFCON, and ShmooCon – and was recognized by NetworkWorld as a top Influencer of IT for 2009. As a staunch advocate for CISOs, he serves as a Ponemon Institute Fellow, as an IANS Faculty, and co-founded www.ruggedsoftware.org. He received a bachelor’s degree in philosophy, Phi Beta Kappa, summa cum laude, from the University of New Hampshire.
David Etue brings experience including security program leadership, management consulting, product management, and technical implementation. David is the vice president of corporate development strategy at SafeNet, where he is responsible for SafeNet’s strategic decisions regarding product and solution partnerships, as well as mergers and acquisitions. He was previously the cyber security practice lead at management consultancy PRTM, VP of Products & Markets at Fidelis Security Systems, led General Electric’s global computer security program, and held various positions in technology strategy, operations and product management. He is a Certified Information Privacy Professional, a graduate of GE’s Information Management Leadership Program, and a certified Six Sigma Green Belt.
Go back to The Art of Data Protection blog homepage.
This entry was posted in Compliance, Crypto, Cybersecurity and tagged adversary ROI, Akamai, data breach, data compliance, RSA, RSA conference, SafeNet by Cheryl Shoults. Bookmark the permalink.
Mor Ahuvia July 29, 2015, 12:29 pm UTC
Sharon Ginga July 27, 2015, 11:00 am UTC
Mor Ahuvia July 22, 2015, 11:20 am UTC
Stephen Helm July 21, 2015, 04:07 pm UTC
Rana Gupta June 15, 2015, 10:55 am UTC
Mor Ahuvia April 1, 2015, 11:00 am UTC
Cheryl Barto Shoults March 19, 2012, 10:05 am UTC
Cheryl Barto Shoults January 24, 2012, 08:30 am UTC