Remove Course Remove Fractional CTO Remove Information Security Remove Network
article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

Of course you always need to evaluate the agenda and it pays to be going to an event that has a reputation for advancing key issues. Investigate FedRAMP and its role in standardizing cloud security and what the program means to federal agencies. Visit [link] symposium for more information. Wolf Tombe , CTO, U.S.

Symantec 261
article thumbnail

Fundaments is the First Cloud Solutions and Services Provider in the Netherlands to Achieve the VMware Sovereign Cloud Distinction

CIO Business Intelligence

Verschuren notes that Fundaments, which operates a network of seven tier-3 datacenters across the nation, chose to achieve the VMware Sovereign Cloud distinction after seeing a significant increase in demand for data to be stored in the Netherlands. “The We of course aren’t new at offering sovereign cloud services,” says Verschuren.

Vmware 61
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 common IT training mistakes to avoid

CIO Business Intelligence

This creates a culture of ‘ladder-climbing’ rather than a focus on continuous training, learning, and improvement,” says Nicolás Ávila, CTO for North America at software development firm Globant. To keep teams engaged and reaching toward goals, Ávila suggests individualizing skill-building while periodically creating skill-focused missions.

article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

We are proud to recognize their contributions and honor the influence they have had on the industry at large," said Jacobs, the first Information Assurance Director for the National Security Agency (NSA) and a respected cyber security consultant to government and industry. Lipner is named as an inventor on 12 U.S.

Security 150
article thumbnail

The Sony Hack in Context

CTOvision

If the US is ever forced to confront a major power such as Russia or China on their turf or adjacent seas, and the information technology that underpins this high-tech approach to warfare is compromised, disaster could follow. The method involved hacking into Sony’s computer network and threatening movie distribution companies.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. You got into a network. And then, you know, not pay any fair, fair market prices on any consulting.