This page contains a Flash digital edition of a book.
CAREER OUTLOOK


Georgia Institute of Technology


James S. Logan Manager of Quality Assurance


B.S.—Management and Computer Science Option, University of Massachussetts at Lowell


M.B.A., Rivier College


Ph.D.—Computer Information Systems and Information Science, Nova Southeastern University


James Logan understands the critical links between aca- demia, commerce and local communities and helps to protect them. The Georgia Institute of Technology (GT), ranked among the top 10 in research expenditures among universi- ties without a medical school, is a powerhouse in scientific and tech exploration and education. Each year, GT pumps about $2.15 billion into the metro Atlanta economy, which at- tracts accolades, and web thieves. Last year, Tech published Emerging Cyber Threats Report 2012. It detailed “advanced and large-scale botnet attacks, mobile application exploits, and manipulation of online information,” as the intellectual and personal property threats GT faces. In response, Logan’s team directs quality assurance and development for web- based issues, errors, test cases, and provides similar support to departments, both internal and external to the Office of In- formation Technology. He has also worked with GT’s director of Homeland Security- Emergency Preparedness and Office of Information Security. Logan, who served previously at Alltel, MITRE, and Wang Labs, is a member of the Internet Society and the Information Systems Security Association.


Blue Cross and Blue Shield plans in Illinois, New Mexico, Oklahoma and Texas. It also uses evolving defenses to halt invasions of its electronic health records and customer infor- mation. HCSC encrypts portable storage devices including thumb drives to protect information, uses enterprise forensics to perform investigations and deploys an in-house team to perform proactive risk assessments on programs. Among the security applications that HCSC uses Coleman cites ArcSight for event monitoring, Checkpoint for disk and portable device encryption and Symantec for anti-virus. He advises students interested in IT security that they must understand how busi- ness works to connect its needs to technical essentials. While currently hooked on an electronic game called “Words with Friends,” Coleman says “I perform the same cyber discipline at home as I do at work. I never take anything for granted.”


Leviathan Security Group


Andre Mintz Senior Vice President Chief Security Strategist


Health Care Service Corporation


Wheeler Coleman Vice President and Chief Technology Officer B.S.—Computer Science, Northern Illinois University


M.B.A., University of Notre Dame


Andre Mintz knows that many organizations are com- placent about IT security. They meet legal and regulatory security compliance rules, but do not improve their actual risk posture, and use present breaches to predict future ones. This is a reactionary approach that means a security disaster must occur before business responds. Instead, Mintz says organiza- tions must answer prescient questions when assessing risk management strategies. What are the customer expectations and/or industry standards? What are the legal and regulatory requirements involved? What is an organization’s self-defined desired risk posture?


In 1983, Wheeler Coleman’s first job at Health Care Service Corp. (HCSC) was writing code. Now he works with others to implement cyber defense at the country’s fourth largest health insurance company and the largest customer- owned health insurer. HCSC employs 16,000 people and provides coverage to more than 13 million members through


58 USBE&IT I WINTER 2011


Mintz, a former police officer, places security aware- ness training atop his corporate to do list, embraces full disk encryption to address the “lost laptop” problems and advo- cates network frisk technology to deter unauthorized and/ or compromised devices and entities. As a cyber evangelist, he supports education events with an IT focus, especially if geared toward black students. Previously, at Microsoft he built the company’s Chief Security Officer Councils and sought to engage black CSO/CISO’s. At Seattle’s Leviathan, an information security consulting and training firm, Mintz stays abreast of IT security news through CSO Online and podcasts. When not working, he is known as an accomplished Mambo dancer and teacher.


www.blackengineer.com


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88