#AskTheCEO Podcast artwork

Secure Computing Endpoints With Rob Kirk

#AskTheCEO Podcast

English - November 15, 2019 14:00 - 27 minutes - 918 MB - ★★★★★ - 3 ratings
Business Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed


Rob Kirk has been with IBM and Lenovo for a combined 32 years of experience in the PC industry.

As currently a member of Lenovo's Technical Client Advisor unit, Rob covers Corporate and Healthcare customers, providing technical expertise regarding Lenovo's end-user services, products, and capabilities. With a strong focus on Lenovo's security products and solutions, Rob has been a part of the team representing Lenovo at conferences like BlackHat and Ignite, among other public events. Lenovo makes some of the best and most secure products in the PC industry, and Rob Kirk is part of the team that presents them to the marketplace and educates customers in their use.

Lenovo site filled with imaging and security information, plus much more! https://pcsupport.lenovo.com/us/en/solutions/HT504220

Read more about Lenovo Thinkshield:
http://bit.ly/ThinkShield

Contact Avrohom:
Web: https://asktheceo.biz
Twitter: @avrohomg
Instagram: @avrohomg

INTERVIEW HIGHLIGHTS:

[00:25] Rob, I’m so excited to be speaking with you today, because not a day goes by without us hearing about the dreaded Data Breach. Whether it’s a computer getting hacked, or someone’s laptop getting stolen, it seems like CIOs and CISOs have their work cut out for them. What are some of the considerations CIOs should be having when thinking about selecting their next refresh of computing endpoints without having that additional worry about data breaches?

[00:55] Securing against a data breach starts way before assets even come into the company!

[01:05] Cybersecurity is a holistic process which starts with a vetted secure supply chain.

[02:45] Step 2 of Cybersecurity is ensuring that all software has been updated to the latest release level.

[03:00] How Lenovo helps companies maintain the Cybersecurity status of their assets, even when the customer’s IT department removes the pre-loaded OS.

[04:00] What client security advisory process does Lenovo have in place, in the event they get hacked and breached?

[05:50] A docking station is a Cybersecurity vulnerability!

[08:40] The process of security needs to extend to cover the full life cycle of the product.

[09:28] One of the things that keep me up at night, as a person who is very active in the Cybersecurity industry, is the fact that no matter how secure your technology is today – even if it’s a veritable Fort Knox; impervious to any and all attacks known to man – you and I both know that in 6 months from now, a new vulnerability will either be discovered, or created by new technology that’s unimaginable, even today. I’m certain that CISCOs around the world are concerned about that as well. How can we EVER be secure from threats that don’t even exist yet?!

[11:00] Manufacturers that have few updates on their website should be taken as a warning sign.

[11:20] Manufacturers that have many updates, listed on their websites, means that they’re paying attention.

[12:50] Even if you have a secure device, end-users are a major Cybersecurity vulnerability!

[14:30] Facial recognition and biometrics help with Cybersecurity by preventing people from seeing you type a password.

[15:19] When using a laptop in a public area, facial recognition can trigger your monitor to blur when it detects someone looking over your shoulder.

[16:49] As a global leader in secure computing endpoints, can you share some best practices on how businesses can be Cyber-Safe without slowing people down or sacrificing on productivity?

[19:31] What are some of the considerations business executives need to have when selecting their next computing assets, to cut down on occurrences of end-users disabling security software?

[22:11] How do people connect with you?

[26:18] Do you have any parting words of wisdom that you’d like to share with the audience?

[26:30] “If it ain’t broke, don’t fix it” is the wrong philosophy when it comes to Cybersecurity!