Vendor Security Practices: Turn the Rocks Over Early and Often

Too often security is reviewed at the end of the vendor selection process. It ends up blocking projects moving forward as you identify issues with already selected vendors. Reverse the process with security considered early and business teams can avoid investing precious time on unsuitable vendor candidates and get rankings for suitable ones. This session will show you how using real examples.

Speakers

Martin Andrews; Michael Hammer@MichaelHammer ) 

Director of Web Operations, American Greetings

Martin Andrews has spent over 20 years managing computer environments and negotiating with wily vendors. When not dealing with vendors he prefers promoting collaboration and application performance management. Andrews currently leads the web operations team at American Greetings, where he ensures the reliability of sites that create happiness, laughter and love.

Michael Hammer ( @MichaelHammer ) 

Web Operations Security, AG Interactive/American Greetings 


Mike Hammer has been with AG for 16 years and is responsible for overall security, email operations, anti-phishing/fraud and compliance such as PCI-DSS at AG Interactive, the online division of American Greetings. Hammer is responsible for AGI-CSIRT and managing incident response for AGI. His 25+ years of online experience includes stints at the American Marketing Association and Advanstar Communications. While at AMA he helped develop their Code of Ethics for Online Marketers. He is a longtime participant in IETF working groups developing mail authentication standards such as SPF, DKIM and ADSP. He represents American Greetings at DMARC.org, is Co-Chair of the Brand SIG at the Messaging Anti-Abuse Working Group and was 2012 Member of the Year of the Online Trust Alliance.

Detailed Presentation:

(Source: RSA USA 2016, San Francisco)

8669803085?profile=original

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform