7th March 2017
Mr. Lauderdale has presented the strategic innovation vision of tying IT Asset Management (software and hardware) with Cybersecurity data breeches to U.S. Federal government agencies, Fortune 500 companies and numerous foreign private and commercial companies.
As the Innovation Architect for the U.S. Department of Energy, Mr. Rick Lauderdale is responsible for leading and defining the Enterprise Architecture (EA) strategic goals and objectives, by helping to develop, maintain, and govern the overall EA requirements across the organisation. Mr. Lauderdale’s position is responsible for defining the EA methodologies, architecture review process, and for leading the change and integration of those processes with related business and Information Technology (IT) stakeholders.
Mr. Lauderdale’s innovation vision has been instrumental in establishing the DOE IT Asset Cybersecurity initiative that is a proactive solution to assist and forecast possible software data breaches. Mr. Lauderdale’s strategic vision and implementation has been recognised by IDC “IT Security: World-Class Enterprise Eases Cybersecurity Mandates” October 2014, IDC #251741 and IDC “Peerscape: Practice for IT Asset Management” July 2015, IDC #257845. IDC commented, “Validation of these practices has come in the form of multiple peer investigations by both government agencies and commercial enterprises, which have consistently stated that this strategic solution is at least one to two years ahead of investigating the organisations’ own ITAM initiatives”.
Mr. Lauderdale’s efforts have been recognised by Federal News Radio, Fed Scoop; Architecture and Governance magazine, Forbes, MIT, Troux and BNDA. Mr. Lauderdale efforts were acknowledged in 2015 with the Troux Innovation Award for advancements in IT Asset Cybersecurity planning and execution. The expert panel of judges at Corporate Livewire have awarded Mr Lauderdale with the Innovation in Enterprise Architecture award because of his expertise in embedding innovation into the very thinking of the organisation, from executives to project leaders. He has been able to capture brand new ideas, and then leverage that input to develop innovative solutions and solve the most complex challenges. His work following a 2013 cyber breach provided business leaders with the data to make better risk-based cyber decisions, and was particularly notable in its transformation of a bad event into a positive one.
Mr. Lauderdale has presented the strategic innovation vision of tying IT Asset Management (software and hardware) with Cybersecurity data breeches to U.S. Federal government agencies, Fortune 500 companies and numerous foreign private and commercial companies. He is a retired U.S. Naval Officer (Aerospace Maintenance Duty Officer) and currently resides in Alexandria, VA.
17th April 2015
The Cybersecurity Risk That Dwarfs All Others
If you’re in a large enterprise, the answer is likely to be I have no idea – or worse, perhaps you have a number in mind that in reality is woefully inaccurate.
I’m singling out Windows Server 2003 because that venerable workhorse of enterprise tech is going out of support this July – in spite of the fact that there are still untold thousands of running copies out there, frequently off the radar of IT management.
Leveraging IT Asset Management (ITAM) for Cybersecurity
CIOs are constantly looking for ways to enhance enterprise security programs. The rapidly escalating cyberthreat environment has heightened the risk posed by obsolete devices and software within the IT infrastructure. IT asset management (ITAM) is an operational practice that traditionally has been focused on improving operational cost eff ectiveness through disciplined portfolio, contract, and device management. However, IDC believes it is time to rethink the role and contribution of ITAM within overall IT governance and effectiveness. This IDC Buyer Case Study documents the successful initiation and delivery of the first stage of an IT asset “lifecycle” management schema that assists in combating the increasing number of cyberattacks on the proprietary data of a world-class enterprise.