Remove Banking Remove Information Security Remove Intel Remove Security
article thumbnail

IT Security Entrepreneurs Forum (ITSEF) 2015 Speakers: A 17-18 March gathering of community-minded business and technology leaders

CTOvision

To register for the 2015 IT Security Entrepreneurs Forum (ITSEF) see: [link]. Here are key players Robert has lined up this year: IT Security Entrepreneurs Forum (ITSEF) 2015. Senior Director, Product Security & Privacy. Pindrop Security. Chief Security Officer. Deputy Chief Information Security Officer.

CTO 150
article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

The White House declares it’s a national security issue and leaks intelligence that North Korea is behind the attack. Most corporate hacks we see are focused on either customer data (credit cards, medical records, social security numbers, passwords, bank account information, email addresses) or company proprietary documents.

Security 282
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

CyberPoint International is committed to encouraging women to choose and have successful careers in cyber security,” said Sherri Ramsay, Senior Advisor, CyberPoint International and a past WiCyS keynote presenter. Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook. Margaret N.

article thumbnail

What has NIST done for me lately?

Cloud Musings

According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government.

Dell 70
article thumbnail

Report Reveals Top Cyber Threats, Trends of 2023 First Half

SecureWorld News

The report also includes actionable insights to help organizations strengthen their security posture and proactively mitigate potential risk. Emotet, originally a banking trojan, has transformed into a versatile piece of malware that relies on massive spam email campaigns. It's estimated LockBit had nearly 1,100 victims in 2022 alone.

Trends 71
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. ” Then my friend gestured to a bank of elevators where the door had just closed on three men in suits. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. ” Then my friend gestured to a bank of elevators where the door had just closed on three men in suits. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work.