Ed Amoroso Chief Security Officer AT&T

<p>Dr. Edward G. Amoroso serves as Senior Vice President and Chief Security Officer for AT&T Services, Inc. His responsibilities include real-time security protection of AT&T's network and computing infrastructure – including mobility services; security policy, planning,and architecture for AT&T's enterprise; security support for AT&T's IPTV initiatives; and leaddesign, development, and operations support for AT&T's managed and network-based security services.</p>

<p>Ed's twenty six-year career at AT&T began at Bell Laboratories, where he worked on securing the Unix operating system, as well as numerous federal government security initiatives. More recently, he has championed AT&T's network-based security strategy, centered around emerging in-the cloud protection services such as Network- Based Firewall and DDoS Defense.</p>

<p>Ed has authored numerous research papers, articles, and five books on information security, including the recently published “Cyber Attacks: Protecting National Infrastructure”.</p>

<p>He is the 1999 winner of the AT&T Labs Technology Medal for his contributions to large-scale intrusion detection and in 2010, Ed was elected an AT&T Fellow.</p>

<p>Ed holds M.S. and Ph.D. degrees in computer science from the Stevens Institute of Technology and is a graduate of the Senior Executive Program at the Columbia Business School. He has served as an Adjunct Professor in the Computer Science Department at Stevens for the past twenty two years, and his work has been featured by the Wall Street Journal, CNBC, Network World and the New York Times.</p>

Read the Latest

Content Type

MOBILE BUSINESS TECHNOLOGY

Small Business Mobile Security And A River Named Denial

11/30/12 video
MOBILE BUSINESS TECHNOLOGY

4 Key IT Concerns about BYOD

05/09/12 blog
CLOUD ENABLED BUSINESS

Hybrid Clouds Need Security Models

11/03/11 video
SECURITY IN THE ENTERPRISE

Describe Complex Security Issues in Non-Technical Ways – An AT&T Security Tip

08/19/11 video
SECURITY IN THE ENTERPRISE

Phishing Requires Rethinking System Management

08/12/11 video
SECURITY IN THE ENTERPRISE

Removable Media Can Cause Information Leakage

07/29/11 video
SECURITY IN THE ENTERPRISE

Role-based Access Controls Are Effective

07/22/11 video
SECURITY IN THE ENTERPRISE

Security Tip for Passwords

07/08/11 video
WORKFORCE COLLABORATION

Colleges and Universities Should Review Networking Policies

07/01/11 video

Watch Your Scanning Licenses

06/23/11 video
SECURITY IN THE ENTERPRISE

Empower Your Staff to Stop the Line

06/16/11 video
SECURITY IN THE ENTERPRISE

Make the Most of Threat Management

06/09/11 video