Q&A: George Kurtz, CTO, McAfee

We met with the chief technology officer (CTO) of McAfee, the largest dedicated security vendor, to discuss the growing information security threats facing business, and how IT professionals can respond.

If you think about the consumerisation of IT, IT departments can no longer say no. If you have an iPad, an iPhone, or an Android [device] and want to bring it in, you will do it. What we've found is the IT departments that say no, people will still bring the devices in and people will start forwarding their work mail to their personal accounts, and read it there.

We have to embrace consumerisation as these devices are more powerful than some enterprise devices. So the question is how do you secure them and how do you enable them? We are focusing on being able to manage and provide security policies on all these devices, whether it's an iPhone, a slate or Windows Mobile. We bought Trust Digital to help organisations to manage these devices.

All IT budgets are under pressure. How do chief information security officers defend their corner, and ensure that if they do make cuts, it doesn't create new vulnerabilities?

One of the most important things is having meaningful metrics. That is lacking in the security world. There is really no way to see how company A compares to company B, in security terms, and in terms of how much money they are spending.

What we see is fairly useless metrics how many hits on our IDS how many viruses. From a CSO's perspective they need to be able to put real metrics into to business terms. Putting it into business terms allows you to articulate the value. This is the security paradox: the more nothing happens, the more secure you are.

You need metrics that can show how you reduced risk and support the business. They can't put it in terms that a business person doesn't understand: viruses, registry entries and all kinds of gobbledygook.

A business person cares about time, money, and not going to jail because of a regulatory requirement.

If chief security officers can put it in those terms they have a much better chance of being able to pursue their agenda, and reduce risk from a business perspective.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020