article thumbnail

IT Security Entrepreneurs Forum (ITSEF) 2015 Speakers: A 17-18 March gathering of community-minded business and technology leaders

CTOvision

Senior Director, Product Security & Privacy. Pindrop Security. Chief Security Officer. Deputy Chief Information Security Officer. Information and Cyber Security. Corporate and Information Security Services, Exelon. Chief Information Security Officer. Robert Rodriguez.

CTO 150
article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook. White, VP Senior Information Security Officer, Global Information Security, Bank of America. Heather Adkins, Founding member of the Google Security Team. Margaret N.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cloud Security Alliance Federal Summit 5 May in DC

CTOvision

Cloud Security Alliance has put together a stellar program of thought leaders from government and the private sector to provide key insights into security compliance, architecture, technology and defending the latest threats. 12:00PM – 1:00PM. 1:00PM – 1:30PM. Industry Insights: Compliance is More than a “Documentation effort”.

Cloud 150
article thumbnail

CISA Releases 300 Exploited Vulnerabilities for Organizations to Patch

SecureWorld News

The Cybersecurity and Infrastructure Security Agency (CISA) has compiled Knowing Exploited Vulnerabilities Catalog, which lists at least 300 vulnerabilities and will be updated continuously. Companies listed in the catalog include major tech companies such as Adobe, Apple, Cisco, Google, and so many more.

article thumbnail

Expanding the Cloud – The Second AWS GovCloud (US) Region, AWS GovCloud (US-East)

All Things Distributed

Federal Information Security Management Act (FISMA) Low, Moderate, and High baselines. Department of Justice's Criminal Justice Information Services (CJIS) Security Policy. US International Traffic in Arms Regulations (ITAR). Department of Defense (DoD) Impact Levels 2, 4, and 5.

Cloud 117
article thumbnail

Employee Spotlight – Bob Salmans, Security Training Architect

Linux Academy

Security Training Architect. I create training courses related to information security. Prior to coming to Linux Academy, I was a security engineer at an MSP/MSSP. There, I worked with clients to perform penetration testing, risk assessments, incident response, and to increase the security of their infrastructures.

article thumbnail

Regulatory uncertainty overshadows gen AI despite pace of adoption

CIO Business Intelligence

Enterprises will need to set up controls for AI models similar to those they already have for other software projects, and information security and compliance teams need to be aware of what data science teams are doing.