With the IoT, we must ask ourselves where traditional security begins and logical security ends. With the generational shift in the use of technology such as vast use of mobile and wearables devices, as attackers and adversaries become more sophisticated in their efforts, we are increasingly seeing exploits that involve both traditional and logical attack vectors. Fewer and fewer people understand how all of this works. How do they work together – what are the devices doing, collecting, and transmitting what to whom. In a sentence, technology is being adopted faster than our ability to secure it.
Mr. Wesley Simpson
Chief Operating Officer
International Information System Security Certification Consortium, Inc., (ISC)²®
Mr. Simpson has more than 25 years of business experience including positions in IT, product management, policy and procedure development, budgeting, vendor negotiations, and client development and relationships for Turner Broadcasting System, Delta Airlines, Bank of America, IBM and Fidelity Investments. Mr. Simpson has been responsible for leading the development of IT organizations and global services, while also working in the field of software development and digital asset management for various Fortune 500 companies. As COO, Mr. Simpson oversees the operational aspects of contracts with all business partners, collaborates with the Chief Executive Officer and senior management to support (ISC)2 programs and services, and is responsible for the development and implementation of a business template for the regional offices. Mr. Simpson holds a B.S. in Accounting from the University of Massachusetts and various technical certifications.