Welcome!

News Feed Item

IID Expands Executive Team to Keep Up With Demand for New Cyberthreat Sharing Platform

Names First Ever Chief Financial Officer and Chief Information Security Officer, and New Vice President of Marketing

TACOMA, WA -- (Marketwired) -- 01/31/14 -- IID, securing the Internet with shared cyber intelligence, today announced that it is expanding its executive staff with the addition of three new executives. Ben King will serve as IID's first ever CFO, Merike Kaeo as its first ever CISO and Mark Foege as its new Vice President of Marketing.

"It is an exciting time here at IID. Since the beginning of 2012, we've grown by 21 employees to a total of 72 today," said IID CEO Lars Harvey. "In order to help manage our expansive growth and continue launching innovative offerings, we are turning to Ben, Merike and Mark -- who have a history of taking businesses and security programs to the next level."

The appointments will enable IID to strategically support the growing demand for its cyber intelligence collaboration platform, ActiveTrust, which is selectively available today. ActiveTrust enables enterprises and government agencies to combat the rising frequency and sophistication of cyberattacks by sharing cyber incident data in real time.

"IID's expansion demonstrates the opportunity for growth of the global cybersecurity sector in Tacoma," said Tacoma Mayor Marilyn Strickland. "With the University of Washington Tacoma's advancements in cyberdefense education, a globally recognized firm in cybersecurity product development in IID and our close proximity to Joint Base Lewis McChord, Tacoma is quickly becoming a hub for cyber technology research and development."

Ben King -- CFO
Ben King most recently was the CFO and COO at PhaseOne Communications, a marketing research and strategic communications company acquired by the SI Organization/Veritas Capital in 2012. Prior to PhaseOne, King held leadership roles at the Fox Broadcasting Company Digital Group and PricewaterhouseCoopers LLP. He also has served as adjunct faculty at UCLA's Henry Samueli School of Engineering.

Merike Kaeo -- CISO
Merike Kaeo has served as IID's Security Evangelist for the past year. Prior to joining IID Kaeo founded Double Shot Security, which provided strategic and operational guidance to secure Fortune 100 companies. She led the first security initiative for Cisco Systems in the mid 1990s and authored the first Cisco book on security -- translated into more than eight languages and leveraged for prominent security accreditation programs such as CISSP. Kaeo sits on varying security company technical advisory boards, is a frequent contributor to IETF standards and is a sought after speaker in global ISP and security-related forums. She has been on ICANN's Security and Stability Advisory Council (SSAC) since 2010 and the FCC's Communications Security, Reliability and Interoperability Council (CSRIC) as of 2012.

Mark Foege -- Vice President of Marketing
Mark Foege has decades of leadership experience at emerging technology companies. Prior to IID, Foege was at encryption and data security company Townsend Security and founded mobile device management company Perlego Systems, Inc., which was eventually acquired.

About IID
IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. For more information about IID, go to www.internetidentity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Andrew Goss
VOXUS Inc. (for IID)
253.444.5446
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…