Discover Performance

HP Software's community for IT leaders // July 2014

Security strategy

A simple plan for secure DevOps

IT’s push to break down the development and operations silos is an opportunity for security to add value, says InfoSec expert James Wickett.

Read more

CISO insight

Where are all the security professionals?

CISO insight

Minnesota State University Professor Chris Veltsos talks about why 40 percent of security jobs are vacant in this episode of Discover Performance Weekly.

Watch now

‘Trained intuition’: HP’s approach to security analyst training

SEC Chris Calvert

It’s about a lot more than tools, says HP Enterprise Security’s director of solutions innovation, Chris Calvert.  It’s about knowing how your adversary moves, and getting there first.

Watch now


IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.

Let's get started

Please select an answer.


Your answer:
Your score:
Average score:
Revenue leaders' score:


Please select an answer.



Your score:
Average score:
Revenue leaders' score:

Get detailed results:


Popular tags

Most read articles

Discover Performance


Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more


Ponemon’s 2014 Cost of Cyber Crime study

Security analyst Larry Ponemon discusses his 2014 findings in a series of region-specific webinars covering Europe, the Americas and Asia.

HP Discover 2014

Join thousands of IT execs, engineers, and solution experts to explore IT trends, strategies, and best practices. (Barcelona,
Dec. 2–4)

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

One question

Q: How does a security team take the initiative with attackers?

A: It’s worth discussing the question: “What, exactly, does it mean to have the initiative?” If you are waiting on your adversary to do something, at which point you will respond, you do not have the initiative. If you are building static defenses to protect yourself and your key assets, you still do not have the initiative. To have the initiative, you must be actively creating the scenarios where you intend to draw-in your adversaries and demolish them. Once they make contact with your network, if they are responding to your tripwires and traps, or are being unknowingly mined for intelligence, then you have the initiative. This is an active defense.

Chris Calvert, Director of Solutions Innovation for HP Enterprise Security, on the Enterprise Security Products blog

Security poll

HP Security Research blog

Tweets @ HPSecurity