article thumbnail

Rubbernecking, INFOSEC, and South Carolina. - CIO Musings

CIO Musings

A blog about things that interest me as a Chief Information Officer (CIO) working for a local government. Sunday, November 11, 2012. Million social security numbers and 387,000 credit/debit card numbers were stolen through an internet attack on the state Commissioner of Revenue systems. 3 - Review your INFOSEC program.

article thumbnail

Tech Moves: Delivery giant Gopuff adds Seattle-area execs; Wheels Up names president; and more

GeekWire

She was most recently CEO of NetHope, a consortium helping NGOs secure funding and apply technology to their missions. Founded in 2012, DataKind connects organizations with pro bono data science and AI experts to tackle social issues. based BitTitan appointed Joseph Nguye n as its first director of information security.

CTO Hire 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Moves: Delivery giant Gopuff adds Seattle-area execs; Wheels Up names CEO; and more

GeekWire

She was most recently CEO of NetHope, a consortium helping NGOs secure funding and apply technology to their missions. Founded in 2012, DataKind connects organizations with pro bono data science and AI experts to tackle social issues. based BitTitan appointed Joseph Nguye n as its first director of information security.

article thumbnail

NJVC® Unveils Cloudcuity? Umbrella Framework for NJVC Cloud

Cloud Musings

Thursday, September 13, 2012. NJVC is partnering with an innovative company, Gravitant, to provide federal departments and agencies with on-demand, one-stop-shopping for vendor-neutral, secure cloud solutions that enable customers to test, configure, provision and manage cloud services from start to finish using a single online interface.”

Cloud 116
article thumbnail

Fear Hackers? First invest in an IT security culture change

Cloud Musings

Creating a risk-conscious and security-aware culture is key to protecting an organization’s information infrastructure and data assets, risk management expert John P. Pironti wrote in 2012 ISACA Journal article. This would involve the adoption and expansion of automated security control point monitoring and reporting.

article thumbnail

Implementation of Cloud Computing Solutions in Federal Agencies

Cloud Musings

A benefit as well as a challenge, security concerns have also slowed the widespread adoption of cloud computing. A variety of security concerns exist. This policy is part of the 2012 budget process. delays to capabilities and other inefficiencies) that have negatively impacted IT implementations.

Cloud 115
article thumbnail

Cloud Musings by Kevin L. Jackson: GSA Awards Eleven US.

Cloud Musings

Under the BPA, each of the vendors will have to go through the certification and accreditation (C&A) process at the moderate level under the Federal Information Security Management Act (FISMA). GSA will run the C&A process through the Federal Risk and Authorization Management Program (FedRAMP). ► 2012. (27).

Cloud 90