August 28

Security Catalyst – 35 – Introducting Security 2.0

14  comments

Recorded! From a hotel room in Phoenix (sure, it’s hot, but it’s a dry heat – try taking a tumble in your clothes dryer)… it’s another Security Catalyst Podcast (I know, about time!).

I’m actually excited to share something I’ve been quietly working on now for over a year – the evolution of security I have been calling Security 2.0. Wait! Look past the name and check out what I think the future for information security holds. I have started to collaborate with Ron Woerner on what this would entail, and we have submitted a proposal to speak at RSA 2007 in February – if selected, we hope that will be where the concepts really get grounded and introduced.

Until then, you can count on Ron and I to start to advance the concepts and the ideas covered in Security 2.0. Basically, security 2.0 comes down to three elements:

  • leveraging web 2.0 to improve the way we practice information security
  • taking the knowledge we have and securing web 2.0 offerings
  • the tools, skills, attitudes and experiences of a Security 2.0 professional

Basically, I believe it’s time to completely shift the way we practice information security. We have to change the focus, make it more convenient, more simple and more, well, secure. It’s not that simple – but in this podcast, I introduce the concepts in a condensed fashion. More details will emerge and evolve in the coming weeks and months.

I look forward to your ideas, insights, passions and excitement as we work together to celebrate the positives and truly blaze a new trail in the future of information security. By learning our history and studying other fields, we will advance!

If you’re new to Web 2.0, here are some links to get you started:

Start Here:

What Is Web 2.0

http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html

This is a good summary: http://www.squidoo.com/introtoweb20/ 

I found this useful, too: http://en.wikipedia.org/wiki/Web_2

As we prepare to relaunch the Security Catalyst Community, we’ll incorporate a section for Security 2.0 so we can work collaboratively, leveraging Web 2.0 tools (!) to evolve this concept.

Help spread the word by linking to the Security Catalyst and share these ideas and concepts with others!


Tags


You may also like

Are you using frameworks properly?

Leadership and communication are actually layers, not levels

  1. Pingback: BitRatchet » Blog Archive » [security] security catalyst
  2. Pingback: BitRatchet » Blog Archive » [security] security catalyst
  3. Pingback: The Security Catalyst » Blog Archive » Why the magazines keep getting it wrong - the answer to data breaches is not technology and legislation
  4. Pingback: The Security Catalyst » Blog Archive » Why the magazines keep getting it wrong - the answer to data breaches is not technology and legislation
  5. Ron,

    Thanks for the welcome! I am very excited to be joining the catalyst community and look forward to getting to know everyone as we work together in the future.

    Adam

  6. Ron,

    Thanks for the welcome! I am very excited to be joining the catalyst community and look forward to getting to know everyone as we work together in the future.

    Adam

  7. I like your thoughts… and the name. I was surfing the web and ran across you site and now I’m hooked.

    As for security 2.0, I do agree that we need to find better, simpler ways to implement security. It shouldn’t be a “add on”, but a “built in”. When I think simple, I always think of E=MC2. Why? Because it’s an equation that can help explain the mysteries of the universe and yet it’s only an inch long! That’s just incredible to me. So simple but yet so powerful. That’s the way security need to be.

    Yekim

  8. I like your thoughts… and the name. I was surfing the web and ran across you site and now I’m hooked.

    As for security 2.0, I do agree that we need to find better, simpler ways to implement security. It shouldn’t be a “add on”, but a “built in”. When I think simple, I always think of E=MC2. Why? Because it’s an equation that can help explain the mysteries of the universe and yet it’s only an inch long! That’s just incredible to me. So simple but yet so powerful. That’s the way security need to be.

    Yekim

  9. Yekim,

    Agreed. Anytime we “bolt on” – it’s the first thing to go. I really think that we need to shift focus to experience of our users (and perhaps even ourselves). We need to streamline, streamline, streamline. I really like the concept of finding our own e=mc^2. We’ll figure it out, glad you’re here to help.

    Santa

  10. Yekim,

    Agreed. Anytime we “bolt on” – it’s the first thing to go. I really think that we need to shift focus to experience of our users (and perhaps even ourselves). We need to streamline, streamline, streamline. I really like the concept of finding our own e=mc^2. We’ll figure it out, glad you’re here to help.

    Santa

Comments are closed.
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Subscribe to our newsletter now!