As part of the discipline around The Great Conversation, we seek true case studies of our executive community. A case study to us communicates a problem or opportunity the executive is facing, how they mustered internal and external teams to assess it, and then how they approached rectifying it, including the performance measures that supported the effort. This can be thought provoking and meaningful to our community. How our peers are addressing issues may give us guidance on our own core processes.
After each case study, we like to have a technology discussion. There are two parts to this which can be very helpful. One is to understand how others are evaluating the technology against similar problems. Two is to understand the roadmap for the category. For example: How is the access control technology category evolving? What can we expect to see and how will it change the way we manage our future program?
We asked Ewa several questions before she meets with us on March 4 & 5 in Seattle.
Why Do you participate in the Great Conversation?
I would love to share my perspective on the state of the security industry and specifically as it relates to access control. I also see it as a great opportunity to hear other industry professionals on this topic, interact with various security influencers and help to shape the future of the industry.
What do you hope to learn?
I hope to learn how existing solutions are applied to help customers solve real world problems, what gaps still exist that industry manufacturers can focus on, and how to better connect security to the overall business value.
What was your presentation about?
My presentation touches on the Enterprise Security Platform, it’s current state, roadmap, future trends, and key points that end-users should be aware of when evaluating the state of their overall security risk management strategy.
What is the most common constraint you hear from end users?
The most common constraint I hear form end-users is how to justify security funding as part of the overall risk management budget. I believe that as we connect security and business processes together, we will be much more successful in opening up more funding for those types of projects.
How are they addressing this constraint today?
End users are looking at various ways to overcome the funding obstacle. They are embracing multi-generational approach towards introduction of newer security models into their environments. They are also leveraging the solutions interoperability capabilities to drive greater business reward from security investments, and they are introducing more self-service capabilities to their users in order to drive increased productivity with their security staff.