article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

With the CSO50 Conference + Awards coming to the We-Ko-Pa Casino Resort in Fort McDowell, Arizona, October 2-4, we asked Bill Tsoukatos, Information Technology Director at Fort McDowell Enterprises, which owns the resort, to tell us what it’s like to manage IT security at a casino property.

article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

These attacks can come from malicious instructions, social engineering, or authentication attacks, as well as heavy network traffic. Firewalls and VPNs can't hurt but won't offer as much as an EDR ( Endpoint Detection and Response) or intrusion detection will. Malware and attackers can "break in" in various ways.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Pandemic Planning - CIO Style

CIO Musings

Conference calls, bridge lines, cell phones, call forwarding and other services will be in high demand when employees start staying home to work. Can your firewall/IDS/IPS support more bandwidth? Get purchase orders entered/approved/signed before you need them. Can We Talk Don't forget about voice communications.

Meeting 195
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

Mr. Marshall has been a keynote speaker on cyber executive leadership issues recently at conferences held in Germany, England, the United States, India, Moldova, China, Thailand and Switzerland. He is a nationally and internationally recognized thought leader on cyber related policy, legal and technical issues. Cyber Security'

Software 257
article thumbnail

Tear the walls down: Jericho and the future of enterprise tech

Trends in the Living Networks

Yesterday I gave the keynote on The Future of Information Technology at the Local Government IT2011 conference in Coffs Harbour, which this year had the theme of mobility. Data-level authentication. Authentication, authorization, and accountability must interoperate/exchange outside of your locus/area of control.

article thumbnail

Talking Zero Trust and SASE with CISOs at the Summit

CIO Business Intelligence

NAC works well and has evolved to provide a rich set of solutions that range from automated device discovery and fingerprinting, AAA and non-AAA authentication, automated guest onboarding, and end point posture assessment—with full integration into the broader security ecosystem. See you there.

WAN 104
article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. Here are key takeaways from my week at both conferences. . That also means offering common ways to authenticate, run reports, and check for threats.