This post is authored by Deb Bubb—Vice President of Human Resources and Director of Global Leadership & Learning at Intel Corporation. Like most of you, I’ve watched many companies with iconic brands struggle to evolve. Despite their impressive histories and … Read more >
Recent Blog Posts
The environment is where we can successfully connect audience and purpose not only to leverage the technology’s strengths but also to minimize its weaknesses within a supported infrastructure.
We need to go beyond just identifying the basic parts of our environment and instead taking a holistic view of the entire system in order to deliver an integrated mobile solution that is consistent and predictable at each layer.
Many of the considerations for the environment may largely be influenced by your organization’s build vs. buy decision on mobile analytics solutions. A close review of the key components that make up the mobile analytics environment can prove to be beneficial.
Mobile device is the host
This is where the mobile analytics journey starts for end users. It’s critical to know and understand:
- Which kind of mobile device (smartphone or tablet) is targeted? This influences both how we design the actual mobile asset user interface, and how we improve the steps of mobile consumption.
- What the users will do in case of an issue. So they won’t be confused and discouraged right at the onset of their mobile analytics journey, there must be a commitment for end-user support and the required resources for the project to succeed.
Mobile app is where the action takes place
Once the user successfully gets through the setup and configuration steps, the mobile app is where they will spend most of their time. We need to:
- Gauge our users’ overall mobile readiness. They will need to get used to standard mobile features (smaller screen and different functionality) in addition to unique mobile app components such as navigation, personalization, or custom query execution.
- Consider if there are also opportunities to supplement with additional mobile assets that may be executed outside the app. These may be in the form of a simple PDF document or as complicated as integration with another mobile apps or systems.
- Be aware of the strengths and weaknesses of our solution (app or otherwise). Instead of using cookie cutter solutions, we need to take into account the unique elements of our environment.
Mobile network is what makes it live
The mobile network is the equivalent of a “digital bridge” that allows us to connect to our platform and execute our mobile analytics assets. However, people frequently forget that this digital bridge can be made up of multiple networks.
Different conditions will directly impact the availability as well as the performance of our solution:
- In office environments where we have direct access to our corporate networks through local Wi-Fi, we can enjoy a fast connection.
- When we are connecting remotely (like using VPN), the bandwidth may be limited.
- With remote access conditions (limited Wi-Fi at the airport or lack thereof), we may not even have access to the network.
This is, again, why understanding your audience becomes crucial— so you can provide additional options both on the software (such as offline viewing once the mobile asset is downloaded) or on the hardware (such as mobile hotspot through the wireless service carrier).
Bottom line: Your environment dictates your design
Understanding your environment at all levels—not just what happens within the app or device but also how the device is used—is critical to mobile analytics design because it gives us a chance to validate our assumptions and proactively manage both user perceptions and expectations.
If you’re delivering the solution and you’re the face of mobile analytics, your users may not necessarily differentiate between what’s in your control and what isn’t. When you better understand your environment and how your users will operate in that unique environment, you set your mobile analytics project up for success.
Stay tuned for my next blog in the Mobile Analytics Design series.
Intel® Tamper Protection Toolkit, which is currently in beta, is a product focusing on runtime code integrity verification and preventing observation and reverse-engineering for… Read more
By Jennifer Mulveny One extremely painful way to pass the time on the 14.5 hour flight from San Francisco to Sydney is to check the in-flight map after three movies and a nap of questionable duration. As I watch the … Read more >
The post The TPP: Helping Overcome Australia’s Tyranny of Distance appeared first on Policy@Intel.
Topic: Apache Spark* and the Trusted Analytics Platform (TAP) – Join this discussion with the engineering team behind integrating Spark capabilities into TAP.
When: March 3, 2015 @ 08:00 – 09:00… Read more
When you look around the DistribuTECH show floor, there’s one area that you can see is clearly growing in the energy industry: the Internet of Things (IoT). Companies are offering IoT solutions for nearly every aspect of the power grid. … Read more >
The post Thoughts from DistribuTECH Day 2: Situational Awareness and IoT appeared first on Grid Insights by Intel.
A CIO’s official title doesn’t include “Person Keeping the Computers Running.” Yes, you help ensure that happens, but according to CIO.com’s 2015 State of the CIO, an alarming 13 percent of IT professionals don’t see CIOs as industry leaders, despite the fact that 44 percent of those CIOs report directly to the CEO.
In previous blogs, I’ve discussed how CIOs can use social media to continue learning about the industry and raise awareness of the CIO as an influential business leader. But how can a CIO grow their social media presence to become more than the face of their business’s tech? By taking advantage of social media’s wealth of knowledge to truly innovate for their company and share successes to inspire industry change.
Engage With Fellow Innovators
One way CIOs can improve the face of social IT is by collaborating and engaging with some of the most influential CIOs on social media. This sort of teamwork adds value and vision to the industry and champions adoption of new technologies.
If you’ve been experimenting on social media lately by retweeting IT influencers or reposting articles on LinkedIn, it’s time to up your game and actually engage. Challenge insights, compare notes, and share stories about trying new tech or processes others have adopted. Here are a few ways to improve your engagement with industry leaders:
- Retweet content and give your reaction or insight.
- Comment on LinkedIn posts to initiate conversations.
- Tag influencers in posts discussing new tech.
- Share success stories of your own tech adoptions.
- Source help from industry leaders when you have a question.
By increasing your social media engagement, you’ll foster new relationships. Discussing topics important to your company and possible solutions not only raises IT awareness, it also puts your brand at the forefront of the conversation.
Sourcing Innovation From Social Channels
Your everlasting role as a social CIO is to continue learning. If you’re learning from social media, you should also be applying what you learn. A social CIO knows how to rise from reactive facilitator to proactive leader.
A reactive facilitator sources solutions that might already be in motion in their own IT group or social connections. That’s a step in the right direction toward staying current and relevant in the tech conversation. But a proactive leader stays one step ahead of the game by keeping an eye out for needs and seeking (or creating) solutions. As you become more knowledgeable, you’ll notice trends and be actively in tune with where the industry is headed.
I’m constantly impressed by CIO collaboration on social media. It’s becoming less about marketing and more about improving the industry itself with true innovation. There’s too much opacity today among enterprises. When IT decision makers begin to show a little bit of transparency and share solutions, they improve global technology for the better.
Now that you know how to connect and engage with the IT greats, get out there and collaborate with others to improve your own business and solutions. As you gain more notoriety on social media, you’ll have people coming to you with questions and suggestions of their own — which is a great segue to my next blog post on using social media for talent acquisition. Stay tuned …
Sepsis is one of the leading causes of hospital readmissions and death in the United States, impacting some 750,000 patients per year at a cost of $16.7 billion annually to the healthcare system. Reducing the impact of sepsis cases even slightly would significantly enhance patient outcomes and reduce unnecessary expenses.
While the understanding and treatment of sepsis is improving, early detection and diagnosis of the condition continues to be an issue. In the above video, see how Cerner developed a solution to the sepsis challenge – the St. John Sepsis Agent, which uses Intel technology and to date has helped save more than 2,700 lives by identifying sepsis in the early stages. According to Cerner, organizations can achieve $5,882 in medical savings per treated patient, a 21 percent reduction in length of stay, and a 24 percent reduction in in-hospital patient mortality rates by implementing the St. John’s Sepsis Agent.
Also in the case study video, see how Cerner aggregates big data and utilizes analytics to enable population health, and how Intel and Cloudera allow Cerner to provide a technology platform to support massive amounts of storage capacity, scalable parallel processing with near real-time alerts, as well as high levels of security.
DRIVER VERSION: 18.104.22.168.4380 & 22.214.171.124.4380
DATE: February 5, 2016
This driver is in zip format intended for developers and IT professionals.
32bit – win32_154018.4380.zip
64bit -… Read more
DistribuTECH 2016 is off to a strong start with lots of activity on the show floor, particularly around mobility and collaboration tools. Workforce transformation is a key business driver in the energy industry, given that 50 percent of current field … Read more >
The post Thoughts from DistribuTECH Day 1: Mobility and Collaboration appeared first on Grid Insights by Intel.
Unlike software components operating within an enterprise, the Web services model establishes a loosely coupled relationship between a service producer and a service consumer. Service consumers have little control over services that they employ within their applications. A service is … Read more >
The post Web Services-based Development: Challenges and Opportunities appeared first on Intel Software and Services.
It’s seems like just yesterday that we were leaving Chicago and basking in the innovation on display at HIMSS 15. Actually, since the last show was in April and now the biggest event in healthcare technology is back in its usual calendar slot, we’re ready for the second HIMSS in less than 12 months.
This year, the healthcare technology community is headed to Las Vegas February 29 to March 3, 2016, to see what innovation will be on the healthcare horizon in 2016 and beyond. You should expect to see more conversations around how the patient, and their user generated data, plays into healthcare going forward.
At Intel, we’re approaching HIMSS 16 with a critical eye on three areas that we feel are focal points for CMIOs: precision medicine, health IT and medical devices, and consumer health. All are patient-focused.
To learn more about these pillars, you’re invited to the Intel booth (#3032) to view the latest technology platforms that focus on the rise of patient engagement and consumer generated health data. We encourage you to stop by and take a guided tour, where you’ll see these demonstrations:
- Precision Medicine: From genome sequencing to targeted treatment plan all in one day
- Health IT and Medical Devices: Securely connecting patients, clinicians and their data for proactive healthcare wherever you are
- Consumer Health: Engaging connections among people, their data and care community to empower health ownership
Outside of the Intel booth, you will find our technology in a number of HIMSS Kiosks that showcase real solutions available today:
- Population Health Zone Kiosk #14099: IOT Big Cloud Analytics will share how analytics are helping to proactively improve healthcare
- Connected Health Zone Kiosk #15208: Fujitsu will showcase a communication tool integrated EMR used at the National Cancer Center, personal health record for pregnant women and personal health records for dental solutions
- Intel Security Kiosk and Cyber Security Challenge #9908: Come take the Security Breach Challenge and learn how to combat cybercrime through efficient breach detection and response
Finally, be sure to follow @IntelHealth on Twitter to keep up-to-date on all the happenings going on at the event. We’ll be live tweeting from the show floor and sharing pictures of new health IT products/services that we discover. We’ll also be giving away a Basis Peak watch every day during HIMSS through a Twitter contest so be on the lookout for how you can win.
HIMSS is always a great event and we are looking forward to seeing you in Las Vegas.
What are you most looking forward to seeing at HIMSS16? Tweet us @IntelHealth.
Based on reports in recent news, some forms of insider threat get a lot of attention. Just about everyone has heard of examples of damage caused by a disgruntled employee, workplace violence, or theft of intellectual property. But insider threat is actually much larger than those common examples. At Intel, we’ve been studying this situation and have documented our findings in a white paper we call the Insider Threat Field Guide. In this field guide, we discuss 13 distinct insider threat agent types and the insider events they are most likely to cause, providing a comprehensive approach to identifying the most likely insider threat vectors. We are sharing this guide so other companies can improve their security stance too.
For example, one threat agent type we identified is the “outward sympathizer.” Our identification of this character is unique in the industry—we were unable to find any published analysis of this type of insider threat. We define an outward sympathizer as a person who knowingly misuses the enterprise’s systems to attack others in support of a cause external to the enterprise.
As we developed the field guide, we characterized the outward sympathizer threat as follows:
- An insider of any status that acts in a manner harmful to the enterprise when reacting to external triggering events.
- Harm may occur incidentally (nonhostile) or intentionally (hostile) and may take any form, including violence.
- Actions are most likely reactive and emotional, episodic rather than ongoing.
- Triggering events can be of any scale, from personal to worldwide, and related to any cause.
- Collusion is more likely to occur if the triggering event has wide applicability within the worker population, such as a regional conflict.
- The probability of attack is directly proportional to the impact and intensity of the triggering event, and inversely proportional to the general morale and the security awareness of the employee population.
The outward sympathizer is a complex threat agent and triggering events can vary widely. Perhaps there is conflict in a country in which family resides, or an environmental issue that the insider feels strongly about. It can be difficult to predict what will trigger an outward sympathizer attack because the reason for the attack may be entirely unique to the sympathizer and not obvious to others.
Outward sympathizer activity can occur at three escalating levels. Even the most benign level could potentially have devastating consequences for the enterprise.
- Level 1 – Insider misuses company resources (nonhostile). In this scenario, the insider inappropriately uses company resources to independently support a cause, but the company itself is not attacked. For example, the insider is upset about something so he or she downloads hacker tools onto company servers and uses them to attack someone else. There is no intent to harm the enterprise; in fact the insider probably hopes the company never finds out about it and may assume that his or her identity is protected by firewalls from outside detection. In any case, the attacked entity may believe the enterprise itself is attacking them, and may retaliate in many ways.
- Level 2 – Insider inappropriately discloses company information to directly support an external cause. The information may be posted publicly to embarrass the company, or may be directed to an activist organization to support their intelligence gathering. The actor may be a planted agent.
- Level 3 – Insider directly attacks the company from the inside or enables an attack from the outside. The attack can take any form, including data theft, destruction of hardware or facilities, or internal violence or sabotage. The actor is most likely a disgruntled insider but may be a planted agent. Note that at this level, the line blurs between outward sympathizer and disgruntled insider. The important difference is that outward sympathizers are not triggered to action by something that happened to them personally but instead are upset about something external to the enterprise.
Enterprises should include outward sympathizers in their own insider threat models and plan for mitigation. Because this type of threat agent presents differently than most other characters, particularly at the benign level, it can be hard to detect—in fact, some of their methods may not be traceable back to the individual. The unique aspects of the outward sympathizer are motivation and timing, so the most effective mitigations will target those.
Research by CERT and others suggests that strong tone-from-the-top security messaging is an effective behavioral deterrent, especially for non-professional threat actors. In addition, we use the following techniques to help minimize the likelihood of outward sympathizer events:
- Providing specific examples during annual security training
- Training managers to detect and appropriately handle warning signs
- In conflict regions, ensuring managers and HR communicate quickly and regularly about personal safety and any available corporate support
The technical methods used by outward sympathizers are not unique (as a class) and follow classic attack patterns. Technical controls are environmental, not specific. In particular, although it is common to monitor networks for incoming attacks, it is less common to monitor for outgoing attacks. Other effective technical controls include the following:
- Limiting access to least-privilege
- Checking the internal environment for hacking tools such as Low Orbit Ion Cannon (LOIC)
- Watching for misuse such as outgoing distributed denial-of-service (DDOS) attacks
Intel IT’s Insider Threat Field Guide—including our understanding of the outward sympathizer threat agent—is an innovative way of looking at the full scope of insider threats. I believe other security professionals can use the field guide to identify and prioritize insider threats, communicate the risk of these threats, and optimize the use of information security resources to develop an effective defense strategy. I encourage you to share your feedback on the field guide by leaving a comment below. In addition, if you are looking for more information about our other security solutions, check out the 2015-2016 Intel IT Annual Performance Report. We hope you will join the conversation!
If you are a fan of PHP for developing web applications (as I am), you could feel the world shift a bit as it was announced that WordPress was switching from PHP to Node.js. Don’t think of WordPress as a blog … Read more >
A growth hacking is a process of building a strategic synergy to get the job done which won’t be possible or that effective otherwise. Startups come up with great ideas in the market. The entrepreneurial world keeps an eye on the budding entrepreneurs and scalable startup ideas. The mobile app-based startups might be an eye-catching proposition for investors as well as enterprises.
The world is changing rapidly. People are getting more and more tech-savvy. Smartphones are a kind of NEED. People take help from mobile apps. The Cortana, Siri, and the Google Now have become the popular personal assistants in today’s world.
Why not dig a little deeper in order to understand what it takes to build a professionally sound and socially viral mobile app?
Before hitting that chord of making a successful mobile app-based startup, it won’t be bad to understand the stages of building a mobile app. After all, once you want to build next Snapchat, Instagram, or Periscope, you must have a clear idea of what it takes to build a mobile app.
Take a look at the different stages of mobile app development:
Research and Development
R&D is, of course, the start of the app building process. When you’re looking to start an app-based startup, your priority would be finding the potential idea before beginning the process. R&D process will help you explore the market. Let’s not barge into the new discussion what could be the ideal R&D process layout, because every business has its own style of moving on. Moreover, it depends on the demographics of the audience that app is intended for. The important part is that before doing anything on the mobile app idea, the point should come first is the ‘Research and Development’, because it would enable you to identify the market need, target audience, and the competitors.
The prototype designing is a process of creating the mockups of any procedure to help guide the team, customer, or the audience. In mobile app development, the prototype designing does help when different stages of an app are described on the layout. The prototype designing comes at the point where you have a clear idea to pull off. You won’t be able to design the prototype unless you haven’t done your homework for creating the next big thing on mobile.
The feature alignment could be the next vital stage in your app development process. At this point, you may have developed a few parts of your app’s software, meaning this stage could give you a glimpse of how your app would look like after completion. During this stage, the source code isn’t at the final point which gives you an opportunity to alter the concept of your mobile app and fill in new ideas (if necessary).
Once the features get aligned and the mobile app moves towards the development, meaning that it would be in the shape now. During this stage, you will be able to see or use the product (app) partially. Let’s say it the beta version of your app. The important part of this stage is that you can see the app and you still have a few chances to make major changes. Although, it’s not ideal to say that, but it would be better off to do right here before coming backward after the launch.
Testing and Analysis
Once there is nothing to change in the concept and idea of the app. It’s almost finished with the major development. What comes next could be minor touchups which are totally normal during any kind of code-based product. Testing and Analysis would definitely remove the small hiccups in the mobile app.
Refining the Core
The core refining is sort of giving the final proofing before the app hits the marketplace. Normally, it is used by the team members first or sometimes a company releases the invite-based beta testers to help analyze the product before making it public. This could be essential, because the feedback funnel is quite clear when you have a select number of people trying and analyzing the product.
Releasing the App
At last, once things are good to go. Your mobile app hits the marketplace. Once a company follows the simple procedure of developing a mobile app, things would be a whole lot better at the end. In this way, the release of an app would ensure that app is quite bugs free and users are likely to experience the flawless interface. Obviously, bugs and feature failures are parts of the process. Once the users increase, the user-experience and interface testing increase, which could highlight some weaknesses and bugs, and they are likely to be pointed out to bring more perfection.
Are you going to launch your App-based startup?
Startups is a huge trend. The tech giants keep an eye on the budding startups. Once you find something relevant and interesting, they reach out to those startups to acquire those startups. Crunchbase keeps the entrepreneurs, investors, and the startups updated with the latest news on startups acquisition.
The question of the day is, when will you build your mobile-based startup?
The year 2016 is certainly the year of mobile apps and technology, which is why CitrusBits is gearing up to provide the best mobile app solutions. Contact us for advice on your mobile app development.
A rise in the use of mobile devices and applications has heightened the demand for organizations to elevate their plans to deliver mobile analytics solutions. However, designing mobile analytics solutions without understanding your audience and purpose can sometimes backfire.
I frequently discover that in mobile analytics projects, understanding the purpose is where we take things for granted and fall short—not because we don’t have the right resources to understand it better, but because we tend to form the wrong assumptions. Better understanding of the “mobile purpose” is critical for success and we need to go beyond just accepting the initial request at the onset of our engagements.
The Merriam-Webster dictionary defines the purpose as “the reason why something is done or used: the aim or intention of something.” Although the reasons for a mobile analytics projects may appear obvious on the surface, a re-evaluation of the initial assumptions can often prove to be invaluable both for the design and longevity of mobile projects.
Here are a few points to keep in mind before you schedule your first meeting or lay down a single line of code.
Confirm link to strategy
I often talk about the importance of executive sponsorship. There’s no better person than the executive sponsor to provide guidance and validation. When it comes to technology projects (and mobile analytics is no different), our engagements need to be linked directly to our strategy. We must make sure that everything we do contributes to our overall business goal.
Consider the relevance
Is it relevant? It’s a simple question, yet we have a tendency to take it for granted and overlook its significance. It doesn’t matter whether we’re designing a strategy for mobile analytics or a simple mobile report—relevance matters.
Moreover, it isn’t enough just to study its current application. We need to ask: Will it be relevant by the time we deliver? Even with rapid deployment solutions and the use of agile project methodologies, there’s a risk that certain requirements may become irrelevant if current business processes that mobile analytics depends on change or your mobile analytics solution highlights gaps that may require a redesign of your business processes. In the end, what we do must be relevant both now and when we Go Live.
Understand the context
Understanding the context is crucial, because everything we do and design will be interpreted according to the context in which the mobile analytics project is managed or the mobile solutions are delivered. When we talk about context in mobile analytics, we mustn’t think only about the data consumed on the mobile device, but also how that data is consumed and why it was required in the first place.
We’re also interested in going beyond the what to further examine the why and how. Why is this data or report relevant? How can I make it more relevant?
Finding these answers requires that you get closer to current or potential customers (mobile users) by involving them actively in the process from day one. You need to closely observe their mobile interactions so you can validate your assumptions about the use cases and effectively identify gaps where they may exist.
Bottom line: Focus on the business value
Ultimately, it all boils down to this: What is the business value?
Is it insight into operations so we can improve productivity? Is it cost savings through early detection and preventive actions? Is it increased sales as a result of identifying new opportunities?
What we design and how we design will directly guide and influence many of these outcomes. If we have confirmed the link to strategy, considered the relevance, and understood the context, then we have all the right ingredients to effectively deliver business value.
In the absence of these pieces, our value proposition won’t pass muster.
Stay tuned for my next blog in the Mobile Analytics Design series.
I was delighted to be invited to speak at Microsoft’s Empowering Health event in Brussels, Belgium recently, which brought together some 200 thought-leaders from across the world to discuss health IT issues in a ‘Mobile First and Cloud First World’.
I was looking forward to hearing about how some of the more progressive countries in Europe were utilising technology to deliver more personal, productive and predictive health to its citizens so it was pleasing to hear examples from the Netherlands around patient portals and from Sweden where virtual care rooms are helping to deliver a more efficient healthcare system through patient self-diagnosis. From these very real examples of today to discussions around the future of machine learning and robotics, the narratives were underpinned by the absolute need for clinical staff to have input into the technology solution they would be asked to use as early as possible.
Data: One Size Does Not Fit All
Some great statistics from Tom Lawry, Director of Worldwide Health Analytics, Microsoft, generated a real buzz in the room. Tom started his presentation by stating that ‘we spend a lot of money ONCE people are sick, while most money is spent on small numbers of people who are VERY sick.’ Clearly there are a lot of areas where technology is helping to move the needle from cure to prevention while all-in-one-day genome sequencing to personalised medicine is something we are working towards here at Intel as we look ahead to 2020. I was interested to hear examples from across the world on how healthcare providers are dealing with increasingly large amounts of data. Within the European Union there are very different takes on what data is classed as secure and what is not. For providers and vendors, this requires a keen eye on the latest legislation, but it’s clear that it’s a case of one size does not necessarily fit all.
Digital Education of Nurses
The breakout nursing session brought together a dedicated group of nurses with a real interest in how technology can, and will, help make nursing even better. We kicked off by discussing what level of digital education nurses have today, and what they need to equip them for the future. The consensus was that more needs to be done in helping nurses be prepared for the technology they’ll be asked to use, in essence making technology a core part of the nursing curriculum from day one.
The move towards distributed care generated some fantastic thoughts on how technology can help nurses working in the community – read my recent blog for more thoughts on that. We all agreed that access to healthcare is changing, it has to if we are to meet the demands of an ageing population. For example, millennials don’t necessarily think that they need to see a medical practitioner in a hospital setting or a doctor’s surgery, they are happy to call a clinician on the phone or sit in a kiosk for a virtual consultation, the priority being quick and easy access.
Nurses Actively Championing Technology
I was particularly impressed by a new app showcased by Odense University Hospital called Talk2Care – in short, it enables patients in ICU to ‘talk’ to nurses using an icon-based dashboard on a mobile device. This new way for patients to communicate, who would in some cases only be able to nod or shake their head, has been invaluable not only for nurses but the patient’s family too. What really pleased me was that nurses were actively championing this technology, encouraging patients to utilise it to help nurses deliver a better care experience.
We closed with thoughts on how taking care into the community was being revolutionized by technology. We’ve got some great examples of the role Intel is playing in the advance towards more distributed care, from the use of Intel IoT Gateways to help the elderly live more independent lives at home through to the KU Wellness car which empowers nurses to take advanced care into the community using mobile devices.
Virtual Reality Nursing
After a short break we returned to the main auditorium where I was pleased to be on stage with nurses from across the world. The future of the workforce was discussed in some detail, particularly around how the nursing and the wider healthcare community will manage the anticipated future global shortage of nurses. Technology will go some way to alleviating this shortfall through improved workflows but I like to think in a more visionary way, perhaps we will see the use of avatars, virtual reality and (thinking of discussions earlier in the day) robots. What’s clear is that nursing is changing in response to the move to distributed care, we need to skill not only nurses but other caregivers too, i.e. families, to make better use of the technology that is available today and tomorrow.
Even after nearly 25 years, I continue to be excited and passionate about security. I enjoy discussing my experiences, opinions, and crazy ideas with the community. I often respond to questions and comments on my blogs and in LinkedIn, as … Read more >
The post Advice to a Network Admin Seeking a Career in Cybersecurity appeared first on Intel Software and Services.
Even after nearly 25 years, I continue to be excited and passionate about security. I enjoy discussing my experiences, opinions, and crazy ideas with the community. I often respond to questions and comments on my blogs and in LinkedIn, as it is a great platform to share ideas and communicate with others in the industry. Recently I had responded to a Network Admin seeking a career in cybersecurity. With their permission, I thought I would share a bit of the discussion as it might be helpful to others.
Mr. Rosenquist – I have been in the Information Technology field as a network administrator for some 16 years and am looking to get into the Cyber Security field but the opportunity for someone that lacks experience in this specialized field is quite difficult. I too recognize the importance of education and believe it is critical to optimum performance in your field. What would your recommendation of suggested potential solutions be to break into this field? Thank you for your time and expertise.
Glad to hear you want to join the ranks of cybersecurity professionals! The industry needs people like you. You have a number of things going for you. The market is hungry for talent and network administration is a great background for several areas of cybersecurity.
Depending on what you want to do, you can travel down several different paths. If you want to stay in the networking aspects, I would recommend either a certification from SANS (or other reputable training organization with recognizable certifications) or dive into becoming a certified expert for a particular firewall/gateway/VPN product (ex. PaloAlto, CISCO, Check Point, Intel/McAfee, etc.). The former will give you the necessary network security credentials to work on architecture, configuration, analysis, operations, policy generation, audit, and incident response. The latter are in very high demand and specialize in the deployment, configuration, operation, and maintenance of these specific products. If you want to throw caution to the wind and explore areas outside of your networking experience, you can go for a university degree and/or security credentials. Both is better but may not be necessary.
I recommend you work backwards. Find job postings for your ‘dream job’ and see what the requirements are. Make inquiries about preferred background and experience. This should give you the insights to how best fill your academic foundation. Hope this helps. – Matthew Rosenquist
The cybersecurity industry is in tremendous need of more people with greater diversity to fill the growing number of open positions. Recent college graduates, new to the workforce, will play a role in satiating the need, but there remain significant opportunities across a wide range of roles. Experienced professionals with a technical, investigative, audit, program management, military, and analysis background can pivot into the cybersecurity domain with reasonable effort. This can be a great prospect for people who are seeking new challenges, very competitive compensation, and excellent growth paths. The world needs people from a wide range of backgrounds, experiences, and skills to be a part of the next generation of cybersecurity professionals.
An open question to my peers; what advice would you give to workers in adjacent fields who are interested in the opportunities of cybersecurity?
Today in Auckland, New Zealand, U.S. Trade Representative Michael Froman will take a critical step to advancing U.S. economic and innovation leadership around the world, while breaking down trade barriers with some of the fastest growing markets for U.S. businesses. … Read more >
The post Intel Commends the Signing of Trans-Pacific Partnership appeared first on Policy@Intel.