• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Author / Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)

Greg Young

Vice President for Cybersecurity

Greg Young Vice President for Cybersecurity Experience: 30 years cybersecurity Specialty: Securing networks, architectures, and data. About: Greg’s focus is on enterprise class security. Greg is keen on sharing the reality of security in larger organizations, and how business can be done securely in those environments. As a Research Vice President with Gartner for 13 years Greg advised thousands of companies and governments on how to better secure themselves, evaluated and advised hundreds of security vendors, and has seen those same technologies successfully used, abused, put on a shelf, or pushed into a deep hole and never to be spoken of again. At Gartner he led research for network security, threat trends, data center security, cloud netsec and microsegmentation. He authored more than 20 Magic Quadrants for firewall, IPS, WAF, and UTM, and was Conference Chair for 4 Security Summits. He headed several large security consulting practices, was CISO for the Department of Communications, and was Chief Security Architect for a security product company. He was a commissioned officer in the military police and counter-intelligence branch working as a Certifier/Accreditor at the national authority, and received the Confederation Medal from the Governor General of Canada for his work with smart card security. Greg was named in the ā€œ12 Most Powerful Security Companiesā€ and as one of ā€œ100 Most Powerful Voices In Worldwide Securityā€. Greg too often mentions he was an extra in 2 episodes of Airwolf. Favorite Quote: ā€œKnowledge is of no value unless you put it into practiceā€ – Anton Chekov Chat with Greg on Twitter via @OrangeKlaxon and on LinkedIn

Not Just Good Security Products, But a Good Partner

  • Posted on:June 9, 2020
  • Posted in:Partners, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0
cybersecurity champion badge of honor

The analyst firm Canalys annually produces their Cybersecurity Leadership Matrix. Whereas many third-party assessments are looking at just the security product, this one focuses on the value to channel partners. Sidebar: what is the channel? If you aren’t actively buying or selling cybersecurity and aren’t familiar with the term, the short answer is that the…

Read More

Getting ATT&CKed By A Cozy Bear And Being Really Happy About It: What MITRE Evaluations Are, and How To Read Them

  • Posted on:April 23, 2020
  • Posted in:MITRE
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Full disclosure: I am a security product testing nerd*.   I’ve been following the MITRE ATT&CK Framework for a while, and this week the results were released of the most recent evaluation using APT29 otherwise known as COZY BEAR. First, here’s a snapshot of the Trend eval results as I understand them (rounded down): 91.79%…

Read More
Tags: end pointMITREsecurityuser protection

Cloud Transformation Is The Biggest Opportunity To Fix Security

  • Posted on:April 9, 2020
  • Posted in:Cloud, Cloud Computing, Cloud Security, DevOps, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

This overview builds on the recent report from Trend Micro Research on cloud-specific security gaps, which can be found here. Don’t be cloud-weary. Hear us out. Recently, a major tipping point was reached in the IT world when more than half of new IT spending was on cloud over non- cloud. So rather than being…

Read More
Tags: misconfiguration

Suddenly Teleworking, Securely

  • Posted on:March 13, 2020
  • Posted in:Business, Privacy, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

So you suddenly have a lot of staff working remotely. Telework is not new and a good percentage of the workforce already does so. But the companies who have a distributed workforce had time to plan for it, and to plan for it securely. A Lot of New Teleworkers All At Once This event can’t…

Read More
Tags: remote workingteleworking

How To Be An Informed Skeptic About Security Predictions

  • Posted on:November 19, 2019
  • Posted in:Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0
2020 Predictions

It doesn’t take a wily prediction to see that the cycles of tech procurement and planning are increasingly compressed. In enterprise IT, the two largest forces at play are business changes and technology changes. These two major forces are somewhat independent; a lot of tech change happened during the last economic downturn, and in fact…

Read More
Tags: security predictionstechnology predictions

Decrypting What Zero Trust Is, And What It Likely Isn’t

  • Posted on:October 4, 2019
  • Posted in:Current News, Security, Uncategorized
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0
https://blog.trendmicro.com/answers-to-your-questions-on-our-mac-apps-store/

It’s always an indicator of confusion when instead of hearing ā€œI want Qā€ I’m asked ā€œwhat is Q?ā€. In this case the ā€˜Q’ is Zero Trust.Ā  I’ll try and give my best take on what I understand Zero Trust to be. History Repeats Let’s start with the background. Quite a while back the Jericho Forum…

Read More

XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

  • Posted on:August 19, 2019
  • Posted in:Endpoint, Managed Detection and Response, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network….

Read More
Tags: XDR

Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

  • Posted on:August 8, 2019
  • Posted in:Managed Detection and Response, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information beyond endpoint is better. The ā€˜X’ in XDR is essentially ā€˜many’ or whatever we can add to provide a broader,…

Read More

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

  • Posted on:May 7, 2019
  • Posted in:Hacks, Healthcare, Internet of Things, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…

Read More
Tags: Counterfeit DevicescybersecurityIoT

Third Party Testing of Security is a Very Big Deal for Customers

  • Posted on:March 20, 2019
  • Posted in:Business, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

User Reviews + Test Results Peer reviews are an important part of product selection. Everything I buy on Amazon and most other things I buy I check for reviews first. That’s the ā€œdo I like itā€ or the test-drive part of the selection.Ā  But the ā€œhow well does it workā€ part is lab testing. I’m…

Read More
Tags: 3rdĀ party testingAdvanced Endpoint ProtectionAV-TESTEDRInc.NSS Labs
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.