As President, Amit Yoran is responsible for developing RSA’s strategic vision and operational execution across the business.
Prior to his appointment as President, Mr. Yoran served as Senior Vice President of Products at RSA, where he provided leadership for RSA’s product development and product management organizations.
Mr. Yoran founded and served as the CEO of NetWitness, the market-leading network forensic product provider, which was acquired by RSA in 2011. In 2003 and 2004, Mr. Yoran served as founding director of the US-CERT program. Prior to that role, Mr. Yoran was co-founder and CEO of market-leading managed security services provider Riptech, which was acquired by Symantec in 2002, and where he subsequently served as Vice President of Worldwide Managed Security Services.
Mr. Yoran is a graduate of the United States Military Academy at West Point and George Washington University.
Senior Vice President and Chief Operating Officer
Mark Quigley is Senior Vice President and Chief Operating Officer of RSA, The Security Division of EMC.
As COO, Quigley is responsible for operational execution across the entire business unit and leads its Services, IT, Public Sector, Manufacturing and Legal teams, as well as M&A. In 2013, Quigley rejoined RSA, where he previously oversaw corporate development, operations, information technology, product security, customer services and integration with EMC following EMC’s acquisition of RSA in 2006.
Prior to returning to RSA in 2013, Quigley served as Chief of Staff for EMC’s President and COO, David Goulden, where he helped to align and coordinate execution across EMC’s business units and functional organizations. Prior to that, he led Integration Management, responsible for working with senior leaders across the company to ensure that EMC’s acquisitions, new ventures and joint ventures are well structured, well executed and well integrated. At the same time, he also led Human Resources for EMC’s Information Infrastructure Products group, where he oversaw leadership development, acquisition integration and operational responsibilities for the division then-led by EMC President and Chief Operating Officer Pat Gelsinger.
Prior to that, Quigley served as EMC’s Chief Information Officer, responsible for leading EMC’s global Information Technology operations which encompassed Applications Development, Global Technology, Global Client Services, Portfolio Management, and Information Security. By ensuring a close partnership with EMC’s externally-facing organizations, the IT organization under Quigley’s leadership delivered quality technology solutions and services that facilitated the ability of customers and partners to do business with the company. Under his direction, EMC IT effectively integrated more than two dozen mergers and acquisitions into core EMC infrastructure and business processes, allowing EMC to realize rapid strategic gain associated with the acquisitions.
Before that, Quigley oversaw Global Customer Business Operations. He started his career at EMC in 1994 as a Sales and Marketing Controller and his responsibilities expanded over the years to North American Sales Operations, Global Sales Operations, and Global Business Operations for Sales and Service. Before joining EMC, Quigley served as Controller for Digital Equipment Corporation in several departments, including its software distribution business, U.S. manufacturing operations, and the PC business group.
Quigley holds a B.S. in finance from Babson College.
STRATEGY: INTELLIGENCE DRIVEN SECURITY
Today, information security is threatened as never before due to a convergence of business and technology developments that’s created a “perfect storm” for your adversaries.
- Organizations are now running mission-critical applications and core business functions in public clouds, which may or may not offer adequate data protection.
- BYOD has exploded, requiring IT to protect information that resides on devices the company doesn’t own, manage, or control.
- With the advent of “Big Data,” the sheer amount of information that must be managed and secured has exploded as well.
- Organizations are granting systems access not only to employees but to third parties such as contractors, vendors, and partners.
Meanwhile, your opponents have also matured, enabling them to take advantage of this expanded attack surface with zero-day malware, advanced persistent threats, and other forms of malicious infiltration. Today, it’s not a question of whether you will be breached – but when. And the stakes are high. One devastating attack can wipe out years of steady revenue, cutting-edge research, or a trusted brand.
The legacy security model, which defends a static perimeter and static infrastructure, has become ineffective for maintaining trust in our IT systems and digital businesses. What’s needed is an accelerated ability to detect and resolve intrusions that minimizes attacker free time in the network.
An Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world by enabling them to detect, investigate, and respond to advanced threats; confirm and manage identities; and prevent online fraud and cybercrime.
To prevent inevitable breaches from causing damage or loss, Intelligence Driven Security delivers three essential capabilities: visibility, analysis, and action.
To design optimal defense strategies and prioritize activities, organizations need more visibility into risk. This includes network and endpoint visibility, which must go from today’s limited emphasis on logs and events down to the packet and session level in order to spot faint signals that indicate advanced threats. Digital identities are also key; organizations need to understand who and what are on their networks, what they are doing, and whether that behavior is appropriate. Finally, enterprises need transaction visibility: an understanding of what’s happening inside key applications.
Analysis involves understanding normal state behavior and then looking for anomalies. By knowing what is “normal,” an organization can spot, investigate, and root out abnormalities that result from malicious activity. Once an anomaly is discovered, contextual analysis determines the appropriate response.
Action is the response to confirmed malicious anomalies. Rapid action allows organizations to mitigate potential threats by enforcing such controls as access restrictions or additional authentication. Action also includes remediation processes and activity. The key to success is consistency, so that each time an analysis finds something potentially threatening the organization can “operationalize” the response.
Along with the crucial ability to combat today’s increasingly dangerous threat landscape, Intelligence Driven Security provides additional benefits.
Focus: Intelligence Driven Security drives action based on mitigating the most pressing risks, ensuring that organizations prioritize activities and resources optimally.
Efficiency: Intelligence Driven Security reduces the number of point products and fuses otherwise disjointed data sets and tools, increasing both security and operational efficiency.
Savings: Because it identifies attacks more rapidly, Intelligence Driven Security reduces bottom-line losses that often result from an undetected breach.
Competitiveness: An organization that effectively manages its digital risks can confidently channel resources into growing, expanding, and differentiating the business through value-added initiatives.
Staffing: Intelligence Driven Security empowers top performers with cutting-edge technologies that extend their efforts throughout the organization. Automation can free overburdened employees to add more value, and elevate average performers into vital contributors.
It’s Your Move
Regardless of your current technologies or strategies, your organization can move towards Intelligence Driven Security. Current investments can be used as the building blocks of a more sophisticated model. A roadmap across people, process, and technology can increase security maturity. What’s important is not where you are today, but the steps you take to improve.
RSA Solutions for Intelligence-Driven Security
RSA provides products and solutions in four key areas to help organizations adopt intelligence-driven security:
ANTI-FRAUD: Fighting online fraud and cybercrime by diminishing or eliminating losses through the prevention of unauthorized use and/or acquisition of critical information such as credentials and identities.
IDENTITY: Reducing risks to business operations related to digital data and systems by securing interactions between people and information. Protecting the organization’s processes, ensuring confidentiality, integrity, and availability related to information, identities, and infrastructure.
GOVERNANCE, RISK, AND COMPLIANCE: Ensuring the organization is compliant in a cost-effective and efficient way that is aligned with both risk and business objectives.
SECURITY OPERATIONS: Preparing for, identifying, coordinating, and responding to threats, including Advanced Persistent Threats (APT).
Worldwide Service and Support
RSA provides customers with timely responses to their requests and inquiries with 24x7 support from offices worldwide. Additionally, our RSA SecurCare online portal offers anytime, anywhere access to thousands of documents containing the latest critical support information to help organizations optimize their investment in RSA technology.
RSA Professional Services helps organizations successfully implement high-value security solutions based on RSA technology. Leveraging the expertise of its organization, RSA brings together the technology, services, and know-how necessary to develop and implement a comprehensive information-security strategy.
The RSA Security Practice of EMC Consulting approaches security from a business context that prioritizes security investments. Services from the Practice specialize in both security policy and compliance areas such as PCI DSS and HIPAA/HITECH and span areas such as data classification, information risk management, GRC and policy management, fraud mitigation, identity assurance, virtualization, and security operations.
Training and Certification
As organizations implement new technologies, add new functionality to existing systems, or orient new staff, education is a crucial element. RSA provides consistent training that helps to maintain the security of a computing environment, improve the end-user experience, and increase productivity and job satisfaction.
RSA has two centers – RSA Laboratories and the RSA Anti-Fraud Command Center – dedicated to advancing security research and intelligence and staying up-to-date on the latest global threats.
Established in 1991, RSA Laboratories is the research center of RSA and the security research group within the EMC Innovation Network. Through its applied research program and academic connections, RSA Laboratories provides state-of-the-art expertise in cryptography and data security for the benefit of RSA, EMC, and their customers.
The RSA Anti-Fraud Command Center (AFCC) addresses online fraud threats such as phishing, pharming, and Trojan attacks on behalf of RSA customers. The AFCC is staffed with more than 130 analysts and operates 24x365. The group has relationships with over 13,000 web-hosting service partners and some of the world’s leading browser developers, ISPs, e-mail providers, and anti-virus, anti-spam, and firewall firms including Microsoft, AOL, Netscape, EarthLink, Google, Mozilla, and Safari. RSA FraudAction Research Labs works alongside AFCC fraud analysts to build tools and processes that enable analysts to handle the newest threats.