SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

“We are in a cloud security transition…”

Jay Heiser

2 min read
in Quotes

“We are in a cloud security transition period in which focus is shifting from the provider to the customer. Enterprises are learning that huge amounts of time spent trying to figure out if any particular cloud service provider is ‘secure’ or not has virtually no payback” Jay Heiser – Research VP at Gartner

Source: CSO Online

About of Jay Heiser:

18 years at Gartner ,  35 years industry experience

Roles and Responsibilities

Jay Heiser is a VP analyst and the Chief of Research for the ITL Security and Risk Management team. Mr. Heiser’s recent areas of research include cloud security, SaaS governance, and digital business risks. His most recent research examines the international implications of the public cloud computing business model.

Background

Previous Experience

Mr. Heiser’s background includes several software product management roles involving encryption, secure messaging, antivirus and secure UNIX software. As a consultant, he has performed security assessments for major corporations, multinational internet service providers and the US Department of Defense, as well as writing information security policies for both UBS and Credit Suisse. Co-author of the book “Computer Forensics: Incident Response Fundamentals,” he was a columnist for Information Security magazine for 10 years.

Professional Background

International Network Services/Lucent Technologies, Principal Consultant, 3 years
The Santa Cruz Operation, Product Manager, 6 years
UBS, Associate Director, Group Information Security, 2 years

Industry Awards/Accolades

Mr. Heiser has served on the Editorial Advisory Board for Information Security magazine, the Advisory Board for the London Chapter of ISSA and several (ISC)2 test advisory groups.

Education

B.A., College of Wooster, Ohio (studied computer science, religion and German; awarded honors on senior thesis, a computer-assisted analysis of an ancient document)
Certified Information System Security Professional
M.B.A., International Management, Thunderbird School of Global Management (ASU), Glendale, Arizona

Related

Tags: Cloud Security QuoteJay HeiserQuoteResearch VP at Gartner
21
VIEWS
ADVERTISEMENT

Related Posts

”Since the QA process is conducted…”

”Since the QA process is conducted…”

June 24, 2022
”Since the QA process is conducted…”

”Since the QA process is conducted…”

June 24, 2022
”Not treating security vulnerabilities…”

”Not treating security vulnerabilities…”

June 24, 2022
”A good UX can change the fate…”

”A good UX can change the fate…”

June 23, 2022

More Articles

Unwanted Sexualization

November 19, 2021
Alerts

Phishing Campaigns featuring Ursnif Trojan on the Rise

June 10, 2022
Book

Security for Cloud Computing (Information Security and Privacy)

March 29, 2022
Alerts

CISA Adds One Known Exploited Vulnerability

May 10, 2022
Cyber101

Security Officer – Definition

April 4, 2022
Quotes

“In my experience, KRIs deliver substantially…”

June 3, 2022
Quotes

“As national security and war are being…”

May 6, 2022

Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense

January 12, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....