Posts by Tim Hill
Tim Hill, is an Air Force Veteran with over 20 years of experience as Information Security Leader in large fortune 50 companies in industrial electronics as well as consumer health insurance. Tim has a depth of experience regarding large mergers and acquisitions and large outsourced IT operations both representing the consultant side as well as the customer of outsourced IT operations. Tim’s experience correcting the flaws of corporate Identity and Access Management implementation and practices, through the use of commercial products and holistic corrections to the business processes best described as the life cycles of IT, Business, and non-human users. Tim brings real world experience to Centrify, as well as the insights of Identity Leader who has responded to and helped correct multiple industry breaches.
By Tim Hill, October 30, 2017
It is interesting and at times bewildering, that in the many years following the failures of 9/11, we still have not found a way to share threat intelligence information without exposing classified information which may compromise the source. Look at these five primary pieces of infrastructure, which exist in every modern society, consider the interdependencies, and how a persist threat or disruption to one dependency can cascade throughout these infrastructure dominos. Primary Role: Electrical Power Generation/Distribution Dependencies on: Above and below ground electrical distribution wires. Network Access to connect power generation and distribution systems. Backup generation systems for internal systems….