Security Experts:

Dr. Mike Lloyd's picture

Dr. Mike Lloyd

Dr. Mike Lloyd is Chief Technology Officer at RedSeal Networks. He has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 20 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Dr. Lloyd was CTO at RouteScience Technologies (acquired by Avaya), where he pioneered self-optimizing networks. Lloyd was previously principal architect at Cisco on the technology used to overlay MPLS VPN services across service provider backbones. He joined Cisco through the acquisition of Netsys Technologies. He holds a degree in mathematics from Trinity College, Dublin, Ireland, and a PhD in stochastic epidemic modeling from Heriot-Watt University, Edinburgh, Scotland.

Recent articles by Dr. Mike Lloyd

  • The fact that insurance companies – well respected by every business-centric executive – look at cyber risk and say “no, thanks” is a pretty clear indicator that something is rotten...
  • Every security team that can fog a mirror is asking the question “what just happened at Target, and how do we make sure that doesn’t happen to us?”
  • Security, like every other arena, can benefit from taking a step back to consider what we’ve done, where we’re going, and what we should try to do differently.
  • What is “good enough” security? I suggest it’s more than running a passably sound infrastructure, and it’s more than accumulating data about the security defects in that infrastructure.
  • There are people ready to sell you all manner of intelligence feeds, but what use are they if you can’t pull them into a war room and correlate them with your real situation?
  • Hi, my name is Mike, and I’m a big data skeptic – especially when it comes to security. It’s pretty clear this puts me in the minority, especially among the noise-makers....
  • Risk Management isn’t Just an obligation or something other executives want to see. When done right, it really works.
  • Continuous monitoring is a call for maturity in our risk management and assessment processes – check that we’ve locked the doors and that the barn door is closed before the inevitable attack comes.
  • Many highly security-conscious organizations outside the Fed seem to equate continuous monitoring with “buy more live sensors.”
  • There is a shift going on in the security business. It’s been a slow-moving wave for a while now – a shift from reactive to proactive. It’s increasingly clear that we’re all targets, and we’re easy to breach, so it’s the right time to shift focus to prevention – to risk management.
  • Measuring security posture is hard, but is being done by many network security teams. Of course, once you have meaningful measurement of your situation, you begin to pick up all kinds of bumps in the road you couldn’t even detect before.
  • The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.
  • Dark space is everywhere – it’s a major challenge to security teams everywhere. The good news is the problem can be solved, and complete coverage can be achieved.
  • 2012 was an interesting year in security – publicity around breaches led to greater awareness than we’ve seen in years, encouraging many in the Federal sector to look into our corner of IT. So what will happen in IT Security 2013?
  • Santa doesn’t care if you were naughty or nice on Christmas Eve – what matters is how you did all year. Security is much the same.