article thumbnail

Learn from IT Thought Leaders at FutureIT D.C.

CIO Business Intelligence

Throughout the day, attendees will have opportunities to learn about new solutions from technology partners and to network with peers. Attendees will also have the chance to participate in a guided networking session as more casual networking breaks. The day will wrap with a networking reception.

article thumbnail

How OPM Could Have Avoided the Data Breach

CTOvision

Visualizing traffic flow can help to discover unexpected paths in and out of systems to pinpoint unexpected ingress and egress points for systems and the network. Good security hygiene, going forward, can assist in preventing further attacks. Finally, if an actual breach does occur, it’s important to be able to find it quickly.

Data 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Disruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.

CIO Business Intelligence

Assess the impact for remote access, VPN, server, network capacity, and utilization thresholds. Continuously monitor utilization and uptime of applications, servers, and network resources. Her project delivery experience includes IT consolidations, secure internet banking, infrastructure security, and identity management projects.

article thumbnail

Steps to Improve Your Security Posture during Technology Modernization

CIO Business Intelligence

It also has led to a de-emphasis of perimeter-based controls wrapped around the corporate network as the focus shifts more to identity and data-centric approaches. Chief Information Security Officer (CISO) ?– Resilience as a foundation . Each C-suite member is uniquely impacted by cyber technology: . Employees ?–

article thumbnail

What digital business acceleration means for Gulfstream Aerospace’s CIO

CIO Business Intelligence

We need to dedicate our time, treasure and change management to getting transformation done.” We do almost everything insource, so we manage our environment. Third is my information security cyber team. We have a full plate for the next four years and that’s our focus because otherwise, you can get distracted.

Agile 87
article thumbnail

- A Taxpayer Network Lock Out

Chief Seattle Greek Blog

Terry Childs, a network administrator for the City / County of San Francisco, was arrested last week on four counts of computer fraud. Childs apparently configured the City’s Cisco-based network so he along had the password(s) to control and manage that network. Original post: 20 July 2008. Can I cite a specific example?

Network 28
article thumbnail

Achieving sustainable PCI security excellence

CIO Business Intelligence

Think of your PCI security compliance program as analogous to the intricate workings of an automobile, where various interconnected parts—engine, transmission, brakes, and electronics—must function seamlessly for optimal performance. Data and Information Security