CAREER OUTLOOK
Rollins Inc.
Ken Poinsette Vice President—Technology U.S. Military Academy
MBA, Emory University Goizueta Business School
Ken Poinsette, 50, says that Rollins, the parent firm of pest control companies including Orkin, faces the normal internet threats. But lately, mass mailer attacks and intrusion attempts have been the most frequent assaults, and phishing attempts con- tinue to be a problem. Fixing those issues is right in Poinsette’s sweet spot, as he leads and manages Rollins’ infrastructure tech- nology group, oversees maintenance and operation of all data processing systems and has responsibility for information and data security of corporate data. Before being hired by Rollins, Poinsette was Second Vice President of Infrastructure Services and Second Vice President of Support Services for Aflac. He has also managed desktop services and storage systems for the General Electric Corporation. Poinsette is a member of the Technology Association of Georgia and Information Technology Senior Management Forum. It is a national organization dedi- cated exclusively to cultivating executive talent among African- American IT professionals. After graduating from West Point, Poinsette served 11 years of active duty service in command and staff capacities.
directs the integration of the information security policy with the implementation of enterprise IT systems and business operations including retail and distribution centers. SUPERVALU protects credit card transactions in more than 5,000 corporate and independent stores by implementing end-to-end encryption for every customer transaction, which has allowed the company to meet and exceed its PCI certification requirements. Under the Health Insurance and Portability and Accountability Act for its 800-plus pharmacies, SUPERVALU must protect customer medical and pharmacy information and transactions, and does so by developing its own proprietary applications to protect the pharmacy environment. Eppinger is a board member for the SUPERVALU Diversity Council and the Black Leadership Network which drive corporate diversity strat- egies. He provides direction and mentorship opportunities for potential and current employees. He is also on the Kappa Alpha Psi Foundation that provides scholarship for diverse minorities.
The Boeing Company
Olivia T. Butler Manager, Information Technology Operations Center
B.S.—Computer Science, Jackson State University
M.S.—Systems Engineering, University of Maryland
SUPERVALU
Gary Eppinger V.P. and Chief Information Security Officer V.P.—Real Estate, Market Development, Legal and Pharmacy B.S.—Data Processing, Campbell University
Olivia Butler says that Boeing like many organizations faces similar digital attacks related to control of on-line informa- tion, global network penetration and operating system vulner- abilities. In preparation, her team, at The Boeing Company, the world’s leading aerospace firm and the largest maker of commer- cial jetliners and military aircraft, works to ensure that a security monitoring network and infrastructure is deployed to provide comprehensive situational awareness.
The National Society of Black Engineers, and Society of
Gary Eppinger has implemented an enterprise identity management system that covers more than 100,000 employees, customers and vendors’ access for business to business, busi- ness to customer, and business to associate applications. At $37 billion SUPERVALU’s vast retail network stores, Eppinger
60 USBE&IT I WINTER 2011
Women Engineers member’s favorite cyber security applications protect against virus attacks and spyware; assist in the genera- tion of randomly-generated passwords for account access; and provide processes that send alerts regarding hacker attempts to break in. When it comes to evaluating cloud computing’s security, Butler is a cyber realist. She says cloud users rely on technologies including web browsers, which may lead to breach- es. Butler adds that while she personally does not use cloud com- puting, if she did it would have safeguards to protect data, and include sound privacy policies and strong security controls. She also owns an iPad and iPhone, which she protects with security products and a lock code for access.
www.blackengineer.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88