Remove Authentication Remove Development Remove Information Security Remove Presentation
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

The summit features presentations, panel discussions, and workshops on up-to-the-minute trends and issues faced by those in charge of sharing, analyzing, and defending government data through Enterprise Forensics, E-Discovery and Cybersecurity in the U.S. Whitenoise Laboratories, Secure Exchange Technology Innovations.

Software 257
article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

"Preparing for a Post-Quantum World" is the topic of a panel presentation at SecureWorld Denver on September 19, and with good reason. As for the panel presentation at SecureWorld Denver , it features Edgar Acosta, Experienced Cybersecurity Professional (former CISO at DCP Midstream ); Craig Hurter, Sr.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Spotlight on Cybersecurity Leaders: Women in Cybersecurity Delaware Valley

SecureWorld News

After spending 25 years of her career in IT, including more than 17 years in information security, Nancy considers joining the Federal Reserve Bank in 2017 as the highlight of her career. At Comcast as a DevSecOps Transformation Coach, she fosters continuous improvement and sustained adoption of Secure Development Lifecycle practices.

article thumbnail

What makes a CIO truly great?

CIO Business Intelligence

Receivers of messages are paying increasingly deeper attention to the authenticity and substance of the narrative being presented. Of course, I do have to add a qualifier here because it is not enough to be a great communicator. Twenty years ago, CIOs had to be knowledgeable about enterprise systems. Today, it’s all about data.

article thumbnail

Bad Actor Using New Method to Avert Detection, Google Discovers

SecureWorld News

In a blog post, Neel Mehta, Information Security lead for Google, explains how a hacker has managed to break certificate code parsing to invade email inboxes and infect users with malware. This new hacking technique makes use of the OpenSUpdater software, a program developed for vicious purposes.

Google 63
article thumbnail

How CIOs Are Addressing The “Unsustainable” Security Challenge

CIO Business Intelligence

What this means is that every company, and every sector, will be facing different security challenges, and a successful response will be down to how the IT security leaders interpret and tailor the response to their specific situation. Data and Information Security

article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are they?

Airlines 100