Nathan Wenzler is the Chief Security Strategist at AsTech, a leading information security consulting firm. Wenzler has nearly two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management, and the personnel side of a successful security effort.
As the Chief Security Strategist for AsTech, Wenzler brings his expertise on security program development and implementation in both the public and private sector to administrators, auditors, managers, C-Suite executives and security professionals across a wide variety of organizations and companies around the globe.
Wenzler is a whiskey/scotch connoisseur and revels in collecting rare spirits and experimenting as a mixologist.
The opinions expressed in this blog are those of Nathan Wenzler and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.
Organizations have never faced as daunting of a task as securing their critical assets while users bring in uncontrolled and hard-to-monitor mobile devices into their enterprise networks. But it’s not hopeless. Getting back to some basic management...
While security vendors typically put a lot effort into making sure their code is secure, the dependencies they need to run may be the weak link.
Many organizations focus on technology to solve their security woes, while desperately trying to hire more security practitioners. But there are other ways to address social cybersecurity challenges.
Our cultural aversion to failing leads many organizations to avoid building a solid incident response plan. But there are huge benefits to be gained by doing so.
Gone are the days when the largest vendor in their space was the "right" choice when procuring software. The modern age of technology has opened up a world of options for organizations to choose from.
Sponsored Links