article thumbnail

Lessons from the Synergy Forum: Affordability of Cybersecurity & Risk Management

CTOvision

For example, if an organization uses an outdated operating system in an effort to cut costs, it is highly unlikely that the same organization will utilize cybersecurity professionals to bolster its information security – it is not even exercising basic cybersecurity hygiene by using outdated software.

article thumbnail

7 common IT training mistakes to avoid

CIO Business Intelligence

Treating training as a checkbox exercise sends the message to your team that you don’t really care all that much about the content they’re learning — and that mindset is contagious,” warns Steve Ryan, a manager at BARR Advisory, a cloud-based security and compliance solutions provider. Ryan points to security training as an example.

Training 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

Director of Information Security, State of Colorado Governor's Office of Information Technology; and Toby Zimmerer, Sr. This reveals how painful of an exercise it can be without a lifecycle understanding of our cryptographic components." Demand and Delivery Director, Optiv.

article thumbnail

Fantastic or Frightening: FBI Accesses [Your?] Exchange Servers to Stop Attacks

SecureWorld News

Tim Wade, Technical Director and Chief Technology Officer at Vectra, says the FBI action answers some questions about the attack, but leaves others to be discussed. We'll need to exercise good judgment and due care to preserve the balance between acting in the public good and affording proper protections for private entities.".

article thumbnail

Cloud Security Alliance Federal Summit 5 May in DC

CTOvision

Cloud Security Alliance has put together a stellar program of thought leaders from government and the private sector to provide key insights into security compliance, architecture, technology and defending the latest threats. 9:30AM – 10:00AM. Industry Insights: Beyond Shadow IT — Turning Concern into Opportunity.

Cloud 150
article thumbnail

MACH37: America’s premier market-centric cybersecurity accelerator

CTOvision

This new generation of technology increases the ability of Chief Information Security Officer’s to train, exercise, test, model and simulate through on demand replication of cyber infrastructure. Analysis CTO Cyber Security DoD and IC'

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

All those exercises, the honeypot or honeynet challenges I think that's what they were called in. the whole system and some of the FBI in general, you know, like, I think that the way that they treat people just in the information security community is a little I don't know, it's entitled. Let's analyze stuff.