article thumbnail

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

The 2014 Trusted Cyber Collaboration Workshop is being held 24-26 Sep in DC. This gathering, facilitated by the Transglobal Secure Collaboration Participation (TSCP) pulls together leaders in real secure information exchange, including information exchange across and between enterprises. More from: [link].

Security 258
article thumbnail

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA

CTOvision

If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals. One of the most virtuous groups enhancing the ability to execute on trusted collaboration is the TSCP: The Transglobal Secure Collaboration Participation (TSCP). By Bob Gourley.

CTO 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

5 pillars of a cloud-conscious culture

CIO Business Intelligence

Most CIOs recognize the advantages of cloud, the global reach it provides, and the ease with which services can be scaled up and back down again. Your customers don’t care about your data centers,” says Drew Firment, chief cloud strategist at online education company Pluralsight. They care about value.

Cloud 134
article thumbnail

Exploiting IT Analytics to Create a ‘Human Layer’ Security Initiative

CTOvision

Wednesday, August 5th, join FireMon at Black Hat for their sponsored workshop. There are four workshop times: 10:00 am, 11:30 am, 1:50 pm and 3:00 pm. This workshop will discuss the final understanding and verification of a security incident that ultimately requires human interpretation and decision. Related articles.

Security 150
article thumbnail

The Balancing Act: Strategies for Integrating Innovation and Security in EdTech

Kitaboo

It is imperative that Educational Technology , popularly termed as EdTech introduces stringent and robust security measures so that the safety of data and development is not compromised. The security of educational technology depends on the platform or application it uses.

article thumbnail

‘The key is the cloud’: How to keep up with the speed of innovation

CIO Business Intelligence

At DISH Network , cloud-adoption strategies vary by when the parts of its business started – from those born in the cloud to legacy sectors deploying cloud on an opportunistic basis. But one thing is clear to Atilla Tinic, the company’s EVP and CIO: “I do think the key is the cloud.” And hear how the U.S.

Cloud 129
article thumbnail

NIST To Hold 2nd Cloud Computing Forum & Workshop

Cloud Musings

Cloud Musings by Kevin L. Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Cloud Musings on Forbes. NJVC Cloud Computing. Get "Cloud Musings" by RSS. NIST To Hold 2nd Cloud Computing Forum & Workshop.

Cloud 90