Program Participant

Program Participant

Mark Chun

Associate Dean, Executive Programs, & Associate Professor, Information Systems, Graziadio School of Business and Management, Pepperdine University
USA

Dr. Mark Chun is the Associate Dean for Executive Programs at Pepperdine University’s Graziadio School of Business & Management. He recently served as the Department Chair for the Management Strategy, Information Systems, Decision Sciences, and Entrepreneurship disciplines. He has also served the school in the capacity of the Director for the Center of Applied Research (2010-2014), the Denney Academic Chair (2011-2013), and an Associate Professor at Pepperdine University’s Graziadio School of Business and Management. From 2008 – 2010 he held the title of the Julian Virtue Professor, and from 2006 – 2007 he was awarded the Rothschild Research Endowment for his research. 

His research, teaching, and consulting expertise focus falls within the domain of innovation, process innovation & re-engineering, CIO Leadership roles & responsibilities, knowledge management, IS integration, and the use of IS to create value and to transform organizations. 

You can find Mark Chun in:

Young Scholar 1
Tuesday, 19 January 2016
14.00–15.15

Research Topical Session 12: Policy Regulation
Wednesday, 20 January 2016
09.00–10.15

Proceedings:

Securing an Environment without a Perimeter: How Can Executives Deal with Cybersecurity Threats in the Mixed Legacy, Multi-Cloud and Virtual Environments?

Download

Slides

Abstract

Businesses are taking advantage of the benefits provided by virtualization and cloud computing to build flexible, agile, and cost-effective IT architecture. These elastic capabilities help companies compete by accelerating the delivery of internal and customer facing applications and services. Many companies are building enterprise architecture by combining legacy, multi-cloud and virtual environments. The critical security problem is that these new opportunities to align with business resulted in a co-mingled architecture which effectively eliminates a formal architectural perimeter. Based on interviews with boards of directors and executive leadership teams facing these new environments, we explored the question: How do we secure increasingly dynamic architecture amidst increasingly coordinated and sophisticated threats? Based on this qualitative analysis we describe a number of security, compliance, and risk-based approaches that are effectively being used. Critical approaches identified and presented include, a risk evaluation of new technologies analyzing how they are aligned to emerging threats and remediation. In addition, agile development, user behavioral analytics and automaton must be tied to a big data platform. Importantly, user-behavior analytics must be architected into all future design. In an environment without a perimeter, these solutions and lessons are critical for telecommunications companies, internet service providers, and public cloud hosting providers and decision-makers.

CONFERENCE SPONSORS hide▲show▼

  • ADVA Optical Networking
  • CITIC Telecom International CPC Limited
  • CITIC Telecom International
  • Biznet
  • CenturyLink
  • Colt Technology Services
  • Shaw Business
  • Comcast Wholesale
  • China Telecom
  • MegaSys
  • Harris
  • Verizon Wholesale
  • China Unicom Global Limited
  • BTI Systems
  • Paul Hastings
  • Level 3 Communications
  • Vodafone
  • REDCOM
  • Arbor Networks
  • Wolfe
  • PCCW Global
  • Telus
  • ATLANTIC-ACM
  • Infinera
  • CoreSite
  • TNZI
  • Digital Realty
  • World Hub Communications Limited
  • Ciena
  • GTT
  • Telstra
  • Lumen Networks

PLATINUM SPONSORS

GOLD SPONSORS

GOLD SPONSORS

GOLD SPONSORS

SILVER SPONSORS

BRONZE SPONSORS

BRONZE SPONSORS

BRONZE SPONSORS

  • ADVA Optical Networking
  • CITIC Telecom International CPC Limited
  • CITIC Telecom International
  • Biznet
  • CenturyLink
  • Colt Technology Services
  • Shaw Business
  • Comcast Wholesale
  • China Telecom
  • MegaSys
  • Harris
  • Verizon Wholesale
  • China Unicom Global Limited
  • BTI Systems
  • Paul Hastings
  • Level 3 Communications
  • Vodafone
  • REDCOM
  • Arbor Networks
  • Wolfe
  • PCCW Global
  • Telus
  • ATLANTIC-ACM
  • Infinera
  • CoreSite
  • TNZI
  • Digital Realty
  • World Hub Communications Limited
  • Ciena
  • GTT
  • Telstra
  • Lumen Networks
Top of page