Posts by Bill Mann

Bill Mann is Senior Vice President of Products and Chief Product Officer for Centrify. Mann is responsible for the innovation and evolution of all Centrify solutions, running product strategy and product management, as well as playing a lead role in M&A as the company scales to its next phase. Mann is an enterprise software security executive with both large company and startup experience.

Hot Topics

Data Breaches Plague Organizations for Years

By , January 22, 2018

Once an organization’s network is breached, extinguishing the flames is just the first step in a long, painful and costly journey to recovery. There’s still the wreckage to sift through, investigators to perform analyses, insurance claims and, of course, a business to reconstruct and secure. It isn’t business as usual once operations are restored; a breach can plague an organization for years. Financial Aftermath Smolders Not long after the event, the breach’s impact on stock price and earnings becomes clear. In July, just weeks after it was breached by the NotPetya malware, FedEx announced it expected a material loss associated…

It's All About Identity

Three Discussions CISOs Should Expect When Attending CyberConnect

By , October 23, 2017

I’m really excited to announce that CyberConnect 2017 is nearly sold out! And, I’m even more excited to attend the 30+ keynotes and panels, and collaborate with over 40 thought leader speakers during the event. In fact, collaboration is at the core of CyberConnect. Unlike traditional events, CyberConnect integrates thought leadership, collaborative roundtable sessions and in-depth training designed to arm executives and practitioners alike with the tools and confidence needed to defend their organizations against today’s hyper evolving adversary. So, with collaboration in mind, I’d like to share three topics that CISOs can expect to discuss at the conference. How…

Centrify Perspective

Reevaluate Your Cybersecurity Spend in 2017

By , October 17, 2017

Without a doubt, the most frustrating fact I face every day is this: Companies spend a meager 4.7% of their total security budgets on identity and access management (IAM) – while compromised identities are responsible for 80 percent of all data breaches. Eighty percent. This glaring disconnect is almost more than I can wrap my head around. Here’s the math: According to Gartner’s “Forecast: Information Security, Worldwide, 2015-2021, 2Q17 Update,” in 2015, companies spent nearly $84 billion on security. Approximately 4.7 percent of that ($4 billion) went towards identity and access management. This year, the total security spend is projected to…

Hot Topics

Equifax Data Breach: Stock Drops More Than Five Percent

By , September 7, 2017

Equifax announced today that it was hit by a cyber security incident, potentially impacting 143 million consumers in the U.S. According to the company’s press release, “criminals exploited a U.S. website application vulnerability to gain access to certain files.” The “information accessed primarily includes names, Social Security numbers, birth dates, addresses… [and] credit card numbers.” After news of the breach broke, Equifax’s stock price dropped five percent. This is directly in line with a recent Centrify-commissioned Ponemon study, which found this to be the historic average on Day One. Moreover, Equifax’s stock price dropped 13-14 percent the day after its breach…

Centrify Perspective

Four Things You Don’t Know About Cybersecurity… That You Should

By , July 25, 2017

Ponemon Institute recently conducted a survey, sponsored by Centrify, designed to more deeply understand the current state of cybersecurity. The Impact of Data Breaches on Reputation & Share Value: A Study of U.S. Marketers, IT Practitioners and Consumers examines differing perspectives across a number of security topics. I’d like to focus on IT professionals at this time, as I believe the results are enlightening, to say the least. 43 Percent of IT practitioners said their organization had a data breach involving sensitive customer or business information in the past two years. This tells us that more than one in five organizations…

Hot Topics

RSA: Centrify Survey Reveals Almost Half of Respondents Lack Confidence in Their Company’s Cybersecurity Strategies

By , February 16, 2017

Yesterday, we conducted an onsite survey of IT professionals attending the RSA Conference, being held this week at Moscone Center, San Francisco. The poll asked respondents how their companies secure applications and infrastructures in the age of access, and it revealed that only slightly more than half (55%) believe their company’s current technology investment ensures their company’s cybersecurity. This leaves about half of respondents with a lack of confidence in their own organization’s corporate security! While this fact is startling, it shouldn’t be too surprising, since a recent Forrester study, commissioned by Centrify, confirms that in the past two years, two-thirds…

Centrify Perspective

Top Three New Year’s Security Resolutions

By , January 4, 2017

When it comes to setting New Year’s resolutions, most people shoot for the moon. We tell ourselves we will give up carbs, go running every morning, become a vegan or even give up drinking alcohol. Inevitability, three weeks later, we find ourselves right back where we started. As security professionals, responsible for keeping the bad guys out and reducing the risk of data breaches, we find ourselves right back where we started too — we fundamentally do not really improve our security posture, and then wonder why not. We are very similar to our consumer counterparts, because we set lofty…

Hot Topics

Centrify Consumer Trust Survey: The Corporate Cost of Compromised Credentials

By , June 8, 2016

We recently conducted a survey to find out what happens to consumer trust when a business is breached. The study examined consumer attitudes toward corporate hacking, and surveyed 2,400 people across the U.S., U.K. and Germany. To our surprise, more than half (66 percent) of U.S. respondents said they are likely to stop doing business with a hacked organization, and fewer than half of Americans are very satisfied with how corporations handle cyberbreaches. Our data shows that when companies put customer data at risk, they are putting the entire business at risk. We found most consumers believe the burden of…

Centrify Perspective

How to Cook Up a Great MFA Strategy

By , May 12, 2016

Have you ever attempted to assemble do-it-yourself furniture—or for that matter throw together a meal—without following the instructions or recipes closely? You end up with furniture that looks like it was thrown off a truck or food that’s barely edible. When it comes to deploying multi-factor authentication (MFA), the same kind of philosophy applies. If you don’t follow some basic guidelines and practices, you’ll end up with a “solution” that doesn’t really solve the problem of protecting data. MFA solutions provide the kind of protection that organizations need in today’s increasingly complex IT and security environment—mitigating password risk by requiring…