Security 2020: Reduce Security Risks This Decade
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
Copyright 2011 by Doug Howard and Kevin Prince
Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-0-470-63955-9
ISBN: 978-1-118-00831-7 (ebk)
ISBN: 978-1-118-00832-4 (ebk)
ISBN: 978-1-118-00833-1 (ebk)
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or website may provide or recommendations it may make. Further, readers should be aware that Internet websites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services please contact our Customer Care Department within the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Library of Congress Control Number: 2010932423
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc. is not associated with any product or vendor mentioned in this book.
I have been fortunate to work with many professionals in the world. Some were business experts, others contributed through capital investments, and many were technology leaders. Equally important were those that I worked alongside of and had the pleasure of supporting in the day-to-day activity of protecting our clients. You know who you are, and to each of you I say THANKS. Special thanks to Bruce Schneier, who was the CTO and founder of Counterpane and who I worked with for over four years. He graciously offered to write the forward to Security 2020 and provide some thoughts throughout. Thanks also to Toby Weir-Jones who contributed his expert review. In good conscience I must recognize my family, for without their support, and the continuous encouragement and consideration of my loving wife, I would not have had the energy to complete this time-consuming goal.
Doug Howard
To my mom, a single mother with five children, who allowed me as a young boy to max out her only credit card with the purchase of my first computer, which I had to work to pay off with one full year of paper route money. Opportunity often comes when others believe in us and our dreams. That single act by my mother has led to more opportunity, fortune, travel, and other experiences than I could have ever possibly imagined. Thanks for believing in me, mom.
Kevin Prince
About the Authors
Doug Howard , the CEO of VBrick Systems, leads a team of professionals that has a stated goal of being the world leader within the streaming video industry. In 2010, after over 20 years in the IT security industry, Doug decided to put his historic criticisms to work and try to build security within an IT product. He admits it's a challenging career change, but one he hopes he can look back on when he returns to the IT security industry and say security can truly be built within the core of a product, as well as bring back to the security industry more experience on how non-security product and application providers can improve their products and services.
When he took his sabbatical from the IT security industry in 2010 to join VBrick, Doug was the chief strategy officer of Perimeter, responsible for the mergers and acquisitions and the service strategy for the company. In addition to his position with Perimeter, he was the president of USA.NET, a company focused on delivering secure unified communications and which was a wholly owned subsidiary of Perimeter.
Prior to joining Perimeter, Doug served as COO of BT Counterpane where he was responsible for the business's ongoing operations. He led the teams responsible for the development, implementation, operations, and marketing of BT Counterpane's product and service line. Earlier he served as vice president of security and business continuity for AT&T Corp. There, he formed an organization that developed and launched new security services for each of the company's business lines of servicecommercial, government, wholesaleas well as provided direction for the business continuity practice that delivered solutions for AT&T and its clients.
Doug started his career in the U.S. Air Force, where he worked for the Joint Chiefs of Staff at the Pentagon and had a temporary duty assignment to Cheyenne Mountain. After the military, he moved into the private sector and held positions in sales, operations, engineering, product management, and business development for companies such as Sprint, FLAG Telecom, Telenet, and Computer Sciences Corporation (CSC). He founded Technology Research International, Inc. in 1989, which was purchased by NBC Broadcasting in 1991.
Doug attended K-12 in eastern North Carolina where he grew up. Like the coauthor of this book, Kevin Prince, Doug came from a humble beginning, and while his family lived in a trailer park (not even a doublewide), his divorced parents never left him wanting for technology. In high school he received his first computer for Christmas, a Radio Shack TRS80 Color. Basic programming was all it did, and he was able to save his work on an attached cassette tape. Looking back, it's hard to believe it all began with a Christmas gift from his parents.
You can find a complete copy of his resume at:
http://www.linkedin.com/in/doughoward
The most valuable information I convey in this book is based on my interactions with some of the leading experts in the security field. My career strategy has always been simply to work with the smartest people I could find. If I can't be the smartest guy in an area of focus, then I'll befriend the smartest guy. I have been very fortunate to work with some real legends, befriend some of the most impressive intellects, and to have countless meetings and dinners with the most knowledgeable CISOs, CSOs, CIOs, and business people in the world.