article thumbnail

Keynotes and Networking Highlight SecureWorld Denver Conference

SecureWorld News

So as security leaders, as security managers, or maybe a team lead, we want to make sure we instill a culture of being able to fail fast, incremental failures, so we can continue to iterate and continue to learn." The closing keynote panel tackled the topic of career pathing and was recorded for a Colorado = Security podcast episode.

article thumbnail

Global Cyber Alliance Release: Perhaps the most important of the 2018 RSA Conference Season

CTOvision

Every year the RSA conference brings together members of the cybersecurity community for a week of presentations, discussions, tech demos and socials. Concurrent with the event there is always a flurry of press releases. Many are designed to highlight a company’s product or service.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Could Your Next Security Analyst Be A Computer?

Forrester IT

We depend on the knowledge of our security analysts to recognize and stop threats. Analysts may also look outside the organization at threat intelligence feeds, security blogs, social media sites, threat reports and other resources for information. Security analysts are expensive resources. data security.

Security 262
article thumbnail

Can AI be holistic in spirit, soul, body, and mind? Insights from the PowerHER conference in Seattle

GeekWire

At the JPMorgan Chase’s PowerHER conference on Wednesday in Seattle, moderator Monika Panpaliya, left, head of the Global Technology Product & Agility Office for JPMorgan Chase & Co., Sinead O’Donovan, a Microsoft vice president of product management, at JPMorgan Chase’s PowerHER conference.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO Business Intelligence

This analysis isn’t just a statistical exercise but a crucial necessity in our interconnected world, where the security of our digital infrastructure is intertwined with our physical safety and economic stability. It’s easy to envision the outcomes that could arise from a major assault on our vital infrastructure.

Security 130
article thumbnail

Faults in Our Security: 6 Common Misconceptions in Cybersecurity

SecureWorld News

In the ever-evolving landscape of computer security, many innovations flood the market, each boasting its efficacy. As a regular attendee of security conferences and contributor to security books, it's evident to me that the field remains a hot topic.

article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.