article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

Most every enterprise with a mature understanding of the importance of protecting their digital assets has a cyber intelligence program underway. Shares information on vulnerabilities via alerts and announcements. Large body of tips and awareness items useful to your cyber threat intelligence program.

article thumbnail

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

Speakers Include: Deven Bhatt - Chief Information Security Officer and Chief Privacy Officer, OCC US Treasury. Martin A Brown – Chief Security Futures Architect, BT Security Enterprise. Cabrera – Deputy Chief Information Security Officer, US Secret Service. and abroad. Supported by the U.S.

Network 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

The event is focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs. Presentations By and For the TSCP Community and Industry.

Security 258
article thumbnail

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA

CTOvision

TSCP’s Trusted Cyber Collaboration Workshop is an opportunity for professional information sharing focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs.

CTO 262
article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

The information is sent to a server for analysis. In terms of computer system event monitoring, UAM tools can track software registry changes, hardware usage, port activity, and program and external IP access. For these workers, being monitored by information security tools can feel intrusive and is often viewed negatively.

Tools 97
article thumbnail

Fed Tech Roundup December 2

CTOvision

Federal Spending on Information Security to Reach $11 Billion by 2020. AI Program Beats Humans On College Acceptance Test - Nextgov. Wins Contract in Support of DoD Information Analysis Center Program. Business Wire (press release). MQ-8C Fire Scout Concludes Operational Assessment.

Malware 150
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Managing Director Security. Chief Information Security Officer. Deputy Chief Information Officer. Deputy Director for Intelligence for Strategic Programs. Chief Information Security Officer. Deputy Program Manager. Office of the Program Manager, Information Sharing Environment.