Bob Turner is a Higher Education Chief Information Security Officer and leads the development and delivery of a comprehensive information security and privacy program at the University of Wisconsin-Madison. His team provides a full scope of information and cybersecurity services including risk management and compliance, a full service security operations center and security tools support, cyber intelligence analysis, security awareness, and information technology policy. Previously, Bob managed cybersecurity consultants focused on policy and compliance, information security assessments, and cybersecurity inspection. Bob also served in the U.S. Navy for 23-years as an enlisted telecommunications operator then as a Communications and Information Systems officer. He earned BS and MS degrees in Management and Information Security and is a Certified Information Systems Security Professional.
Reactive and proactive security methods can be “both, and” rather than “either, or”. Enterprises must plan how to respond when an intrusion occurs, whether it comes from worms and viruses, DDOS attacks, social engineering or even from disgruntled former employees with knowledge of the network. For comprehensive defense, a reactive security strategy should be paired with a proactive strategy and effective tools for uncovering, identifying, and responding to potential threats before they have the chance to damage a company. Every business needs to decide the appropriate mix of resources to devote to proactive security measures (to deter attacks), and reactive measures (to respond to attacks that get through).