Next-Generation Technologies & Secure Development , Security Operations , Technology

A Fresh Look at Outsourcing

Datashield's President and CISO on Re-Thinking Your Core Business Competencies
A Fresh Look at Outsourcing
Michael Malone and Ben Johnson of Datashield, an ADT company

The biggest security budget in the business cannot save you from also suffering one of the biggest breaches. The key is: Do you have the right skills and technology deployed to defend your critical assets? Michael Malone and Ben Johnson of Datashield, an ADT company, make the case for outsourcing.

Malone, president of Datashield, says enterprise leaders need to take a fresh look at the notion of outsourcing elements of cybersecurity.

"A lot of these companies that we deal with outsource their payroll, outsource their legal, outsource different parts of their businesses that aren't core, and [then] try to be in the security business," Malone says. "And a lot of them quite frankly fail, which is why we see all the breaches we see in the news."

In an interview about the business case for outsourcing, Malone and Johnson discuss:

  • Where organizations are making poor strategic decisions about security;
  • How to re-think their concepts about outsourcing;
  • How to sell the strategy to senior management and the board.

Malone is President of Datashield, an ADT company. Datashield was acquired by ADT in November 2017. Prior to the acquisition Malone served as the CEO of Datashield, one of the fastest growing data and Internet security firms In North America.

Johnson began his Information Technology career in early 1996 and has since held key technical and leadership positions at entities such as Morgan Stanley, Zions Bancorporation, and Harman International. Prior to joining Datashield, he served as global head of Information Security for Harman International. Johnson currently serves as Chief Information Security Officer for Datashield and is responsible for ensuring Datashield and its clients have best-in-class solutions to solve today's Information Security related challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.