Travis Greene

Contact Travis Greene

Member since
11/13/2014

About Travis Greene

I joined NetIQ in July 2005 to focus on understanding the IT operations challenges of our customers, helping to keep the product teams informed and our marketing messages relevant. I work directly with NetIQ customers, industry analysts, partners and product managers. After a 10-year career as a US Naval Officer, I started in IT as a systems engineer for an application development and hosting firm, and eventually I wound up managing four data centers. In early 2002, a Managed Service Provider hired me to begin experimenting with the ITIL framework to improve service quality. I was a key member of the implementation and continuous improvement team, funneling customer feedback into service improvements. Through this experience and formal training I earned the Manager's Certification in IT Service Management. Having delivered a level of ITIL maturity, I brought my experiences to a broader market by founding a consulting firm, ITSM Navigators, where my team specialized in ITIL implementation consulting for financial corporations. Through a blend of IT operations experience, process design, organizational leadership and technical skills, I have an understanding of the challenges IT faces in becoming more productive while trying to improve the value of IT services to the business. I am an active member of the IT Service Management Forum (itSMF) and a regular speaker at Local Interest Groups and national conferences. I am Manager Certified in ITIL and hold a BS in Computer Science from the US Naval Academy.

User Points

0 points earned on legacy (former) Cool Solutions site
0 points earned on this site

Author Archives

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Nov 18, 2016
2:43 pm
Reads:
817
Score:
Unrated

Almost every job includes monotonous—but necessary—tasks that we dread completing. For line of business (LOB) managers, access certification is one of these tasks. Imagine a seemingly endless list or spreadsheet containing lines upon lines of users’ names coupled with their levels of access. In addition to a long list of other responsibilities, LOB managers are…

+ read more

Jul 26, 2016
2:43 am
Reads:
992
Score:
4

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Jul 18, 2016
11:41 am
Reads:
1,493
Score:
Unrated

What does the name “Panama Papers” bring to your mind? Outed tax evaders? Exposed grafters? Money launderers? Or like me, does your mind go straight to the risk and prevention of insider security breaches? For those of you who don’t habitually pore over the financial or security press, the Panama Papers refers to a massive…

+ read more

Jul 14, 2016
10:14 am
Reads:
1,045
Score:
Unrated

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

May 19, 2016
2:11 pm
Reads:
4,205
Score:
Unrated

If you’re attending this year’s Gartner IAM Summit, things might be a bit different than what you’re used to. I’ve attended other Gartner events this year, as well as other industry IAM-related events, and the thing I’ve noticed is that IAM is no longer on an island. Where IAM was seen as black magic by…

+ read more

Nov 20, 2015
4:38 pm
Reads:
1,200
Score:
Unrated

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Aug 25, 2015
8:13 am
Reads:
2,260
Score:
Unrated

Just when we thought we had BYOD under control, the world was introduced to a whole new animal of mobile devices: wearable technology. Whether information security professionals can control this new beast—running rampant and creating significant risk—is the question facing IT security today. BYOD and mobility remind me of the Jurassic Park film franchise. In…

+ read more

Aug 18, 2015
12:03 pm
Reads:
2,099
Score:
Unrated

Recruiting is the life-blood of American college football. Although the word “compliance” may not first come to your mind when you think college football, compliance to recruiting regulations is critical to successful programs. College football is an immensely competitive sport, so getting the best recruits is essential. However, if a college doesn’t comply with recruiting…

+ read more

Aug 13, 2015
7:08 am
Reads:
7,198
Score:
Unrated

You probably know Larry Ellison as the founder and current CTO of Oracle. But he’s also passionate about sailing—although “passionate” may be an understatement. Scuttleboat Sailing News reports that Ellison spent an estimated $500 million competing in the 2013 America’s Cup. While this amount of money is way more than most organizations’ annual security budget,…

+ read more

Jul 28, 2015
7:44 am
Reads:
6,721
Score:
Unrated