article thumbnail

IT Security Entrepreneurs Forum (ITSEF) 2015 Speakers: A 17-18 March gathering of community-minded business and technology leaders

CTOvision

To register for the 2015 IT Security Entrepreneurs Forum (ITSEF) see: [link]. Here are key players Robert has lined up this year: IT Security Entrepreneurs Forum (ITSEF) 2015. Senior Director, Product Security & Privacy. Pindrop Security. Chief Security Officer. Deputy Chief Information Security Officer.

CTO 150
article thumbnail

Cloud Security Alliance Federal Summit 5 May in DC

CTOvision

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure and highly functional cloud computing environment. Presenting: Jim Reavis, CEO, Cloud Security Alliance. Cognitio has tracked and supported the CSA since the beginning.

Cloud 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

CyberPoint International is committed to encouraging women to choose and have successful careers in cyber security,” said Sherri Ramsay, Senior Advisor, CyberPoint International and a past WiCyS keynote presenter. Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook. Margaret N.

article thumbnail

Employee Spotlight – Bob Salmans, Security Training Architect

Linux Academy

Hear from one of our Security Training Architects, Bob Salmans, below and see why he loves working at Linux Academy. Security Training Architect. I create training courses related to information security. Prior to coming to Linux Academy, I was a security engineer at an MSP/MSSP. Podcast – Risky.Biz.

article thumbnail

CISA Releases 300 Exploited Vulnerabilities for Organizations to Patch

SecureWorld News

The Cybersecurity and Infrastructure Security Agency (CISA) has compiled Knowing Exploited Vulnerabilities Catalog, which lists at least 300 vulnerabilities and will be updated continuously. Companies listed in the catalog include major tech companies such as Adobe, Apple, Cisco, Google, and so many more.

article thumbnail

Expanding the Cloud – The Second AWS GovCloud (US) Region, AWS GovCloud (US-East)

All Things Distributed

Federal Information Security Management Act (FISMA) Low, Moderate, and High baselines. Department of Justice's Criminal Justice Information Services (CJIS) Security Policy. Payment Card Industry (PCI) Security. US International Traffic in Arms Regulations (ITAR).

Cloud 117
article thumbnail

Regulatory uncertainty overshadows gen AI despite pace of adoption

CIO Business Intelligence

The company is also training its employees about how to use AI safely, especially tools not yet vetted and approved for secure use. You can reduce the risks by combining different technologies, creating layers of safety and security,” says Fix. Insight used the Azure OpenAI Service to do this. This seems to be working well,” he says.