Vulnerabilities / Threats
12/20/2012
10:58 AM
Connect Directly
RSS
E-Mail
50%
50%

BestBuy.Com Chief Leaves For Symantec

Former Starbucks CIO and 2011 InformationWeek Chief of The Year Stephen Gillett heads to Silicon Valley.

After less than nine months on the job as head of Best Buy's online operation, Stephen Gillett has left the struggling retailer to take a senior position at Symantec, which is in the midst of its own reorganization as it tries to adapt to changes in the security software market.

Symantec named Gillett executive VP and COO on Wednesday. His responsibilities will include oversight of the company's IT, marketing, and communications operations. "Stephen is the perfect fit for the direction we are taking Symantec," said Steve Bennett, Symantec chairman and CEO, in a statement. "He has been deeply involved in the transformation of a number of high-profile companies at the executive level and is highly respected in the CIO community worldwide."

Gillett has been on Symantec's board since January, and will relinquish that position. He is a former CIO of Starbucks, and was named InformationWeek's Chief of The Year for 2011.

[ Where is Symantec headed next? Read Symantec Security Has Become Forgotten Child, Critics Say. ]

His departure from Best Buy was unexpected and seen as somewhat of a surprise, given that he was brought in as recently as March to bolster and add credibility to Best Buy's e-commerce efforts. Best Buy has been struggling to convert visits to its website into sales. It's also challenged by the fact that consumers are increasingly using its stores to check out the latest gadgets, while making actual purchases online at discounters like Amazon.

Gillett's departure marks the latest high-level exit at Best Buy. CEO Brian Dunn left in April after allegations of an inappropriate relationship with a female employee. He was replaced by former Vivendi Universal Games CEO Hubert Joly. Joly recently brought in his own team of senior executives, a fact that some observers believe contributed to Gillett's departure.

"I will miss the wonderful teams at Best Buy," Gillett tweeted on Wednesday. "Our time together was short, but our friendships and experiences lifelong. Thank you."

Gillett will have his work cut out at Symantec. The company's stock was downgraded earlier this month by Standpoint Research, amid concerns about increased competition. Microsoft is beefing up free security software for Windows PCs, as well as enterprise offerings like EndPoint. Symantec is expected to unveil a new strategic plan in January.

"Great companies are defined by their market position, customer base, brand awareness, the quality of their products and by the type of industry they're involved in," said Gillett, in a statement. "Symantec is strong in all of these areas. I look forward to working with everyone at Symantec to help the company achieve its full potential." Gillett did not immediately respond to a request for further comment.

Tech spending is looking up, but IT must focus more on customers and less on internal systems. Also in the new, all-digital Outlook 2013 issue of InformationWeek: Five painless rules for encryption. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.