Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/27/2013
02:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Splunk Appoints Tim Mather As CISO And VP of Security And Compliance Markets

Mather will serve as the team leader for the company’s initiatives in security and compliance

SAN FRANCISCO--(BUSINESS WIRE)--RSA CONFERENCE 2013 – Splunk Inc. (NASDAQ: SPLK), the leading software platform for real-time operational intelligence, today announced the appointment of Tim Mather as chief information security officer (CISO) and vice president of security and compliance markets. With nearly 18 years of experience, Mather will serve as the team leader for the company's initiatives in security and compliance, leading the charge to help Splunk customers secure their organizations by using machine data to gain operational intelligence. Mather will report to Steve Sommer, Splunk's chief marketing officer.

"Tim is a valuable addition to the Splunk team as we continue to strengthen our position and invest in the security market," said Sommer. "Tim will also help further secure Splunk's own IT infrastructure, information and intellectual property--using Splunk software. His insight and experience will play an important role in accelerating the company's security initiatives."

"Splunk is at the forefront of security intelligence, helping organizations of all sizes analyze their machine data in real time to uncover the increasing number of known and unknown threats," said Mather. "More than 1,500 organizations, many with multiple use cases, already rely on Splunk technology to address the growing threats in security. These are threats that Security Information and Event Management solutions (SIEMs) are often times ill-equipped to combat in today's dynamic environment in which scale, file types and attack methods are constantly changing."

Prior to Splunk, Mather spent three years as senior advisor at I-4 (International Information Integrity Institute) – a KPMG UK entity focused on information security, including the use of big data for security and securing the cloud. A long-time information security practitioner, Mather has served in senior roles at RSA Security, Symantec, VeriSign and Apple. During his career, he has attained such credentials as CISSP, CISA and CISM, and he is a member of several security associations. Mather has also co-authored two books on security: "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance" (O'Reilly) and "The Executive Guide to Information Security: Threats, Challenges, and Solutions" (Addison-Wesley).

Mather holds multiple Master's degrees, including a M.S. in Information Assurance from Brandeis University, a M.S. in National Security Studies from Georgetown University and a M.S. in International Policy Studies from Monterey Institute. He earned a Bachelor's Degree in Political Economics from the University of California, Berkeley.

Mather is leading two speaking sessions at RSA Conference 2013 this week at Moscone Center in San Francisco. 'Cloud Assurance Frameworks – Which One's Really Relevant?' is scheduled for Wednesday, February 27 at 8:00 a.m. PT in room 305. 'Stateless Architecture for Smaller IT and Risk Footprint' is scheduled for Thursday, February 28 at 1:40 p.m. PT in room 105.

Visit the Splunk booth (#1917) to see demos of Splunk Enterprise, the Splunk App for Enterprise Security and the Splunk App for PCI Compliance.

About Splunk Inc.

Splunk Inc. (NASDAQ: SPLK) provides the engine for machine data&trade. Splunk® software collects, indexes and harnesses the machine-generated big data coming from the websites, applications, servers, networks and mobile devices that power business. Splunk software enables organizations to monitor, search, analyze, visualize and act on massive streams of real-time and historical machine data. More than 4,800 enterprises, universities, government agencies and service providers in over 80 countries use Splunk Enterprise to gain Operational Intelligence that deepens business and customer understanding, improves service and uptime, reduces cost and mitigates cybersecurity risk. Splunk Storm, a cloud-based subscription service, is used by organizations developing applications in the cloud.

To learn more, please visit www.splunk.com/company.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.MJPqHcuX.dpuf

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.