Intellectual Property Theft

Intellectual Property Theft

Aug 32017

New Perils of Public Cloud Compliance: Vendor Management Best Practices

| Chief Information Security Officer

“Know thyself.” It’s a mindset more cloud-ready organizations should adopt before they even consider bringing in a cloud vendor. However, far too many are still content to look before they leap, sometimes to disastrous results. Learn why self-discovery before vendor implementation can keep you more compliant, efficient and, more importantly, safe in the cloud.

Kurt Hagerman

Chief Information Security Officer

Kurt Hagerman has over twenty-five years in the field of information technology, including over 6 years as Chief Information Security Officer at Armor. He is responsible for the governance, risk and compliance side of the security mission for customer facing products. He regularly consults with Armor prospects and customers on PCI, HIPAA and financial services regulations and helps them understand how these regulations impact their business and how Armor can help them meet their regulatory responsibilities. Kurt regularly speaks and writes on information security topics in the payments and health care spaces as well as on cloud security. He holds CISA and CISSP certifications and is an active participant with local chapters of ISACA, CSA and ISSA.

Prior to joining Armor, he was a Managing Director and national PCI Practice Director for Coalfire Systems, Inc., a leading IT Security GRC company. Kurt has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. During his twenty-five plus years in the field of information technology, he has held a wide number of positions encompassing many IT and security disciplines including: network engineering; systems engineering; security engineering; and IT/Security auditing and compliance.

Mar 12017

Armor Analysis – Cloudbleed: Lessons learned

About two weeks ago, the Google Project Zero team found a buffer overflow problem with a Cloudflare product that helps its customers protect against content scraping programs that pulls copyrighted material to aggregators. According to published reports, a line of code should have had an “=<” instead of an “==.” While seemingly innocuous, this single […]

Dec 202016

Case Study: Armored Info

Despite what the news cycle might lead you to believe, PHI, credit card data and health records are not the only targets for threat actors. One of the most rapidly growing areas of cyber crime is the theft of intellectual property (IP). Deloitte conducted a poll in which 58% of respondents said they believe IP […]