Remove 2017 Remove Cloud Remove Information Security Remove Security
article thumbnail

See You At RSA Conference 2017!

Cloud Musings

I am personally excited to be delivering the (ISC)² CCSP Two-Day Crash Course at RSA Conference 2017 ! RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. Looking forward to seeing you in San Francisco!!

article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Endpoint Imperative: Global Security Compliance. Are you ready?

Cloud Musings

Tune into this episode of “ The End Point Imperative: A Podcast Series from Intel ,” to hear from Intel’s Yasser Rasheed , Director of Business Client Security on how a combination of protection at the hardware and software level can help organizations gain compliance and avoid breaches, fines, and financial impact. Are you ready?

article thumbnail

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

Network World

It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals. By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016.

article thumbnail

Cybersecurity remains an elusive business priority

Network World

The year 2017 continues to follow a pattern: Cybersecurity is a high business and IT priority for most organizations. As far as cybersecurity spending goes, 48% will make their most significant cybersecurity technology investments in cloud security, 39% will in network security, 30% in endpoint security, and 29% in security analytics. .

Survey 92
article thumbnail

Business transformation proves to be catalyst for cybersecurity spending

ComputerWorld IT Management

As enterprises accelerate their use of cloud computing, online services, and ready themselves for internet of things deployments, they are finding themselves strained to find the cybersecurity talent and security tools needed to secure these efforts. The survey was conducted online from April 4, 2016 to June 3, 2016.

article thumbnail

Class of 2017 Yearbook: The Premier 100 Technology Leaders

ComputerWorld IT Management

Class of 2017 Yearbook: The Honorees. Daniel Bosman Managing director and associate vice president TD Securities. Michal Cenkl Director of innovation and technology, Center for Information and Technology Mitre. Greg Hart Vice president, cloud services McKesson. Department of Homeland Security. Dimitris K.