article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Cyber Security and the Data Protection Act (acunetix.com). manufacturing program (bizjournals.com).

article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

It is driven by changes in customer expectations, opportunities to evolve employee experiences, and building differentiating capabilities with data, analytics, and artificial intelligence — all of which have no clear end point, nor are exclusively technology-focused. Digital transformation isn’t dead — it’s becoming table stakes.

Agile 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

Investigate FedRAMP and its role in standardizing cloud security and what the program means to federal agencies. Event attendees will also hear about how to securely manage big data, cloud computing, mobility, social networking, critical infrastructure and more! Visit [link] symposium for more information.

Symantec 261
article thumbnail

Spotlight on Cybersecurity Leaders: Diego Maldonado

SecureWorld News

Q : If you could pass or change one regulation/law in cybersecurity and data protection, what would it be and why? A : Stopping the tracking, sharing, and selling of individuals' information in any means. Too much data is publicly available to anyone or any entity willing to pay for it.

article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

What are the criteria for prioritizing and discriminating among classes, categories and scales of discrete or aggregated sensor data? Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices?

article thumbnail

Tech Moves: Zulily hires Nike exec as new CTO; Google vet Phil Bogle joins Kalshi; Auth0 adds CISO

GeekWire

Kissler said Zulily is focused on using its data more effectively for personalization and predictive analytics. He will lead the startup’s product management and engineering, program management, and UX. Jameeka Green Aaron. Auth0 Photo). Green Aaron is a veteran of Nike, Hurley, Lockheed Martin, and the U.S.

CTO Hire 129
article thumbnail

Spotlight on Cybersecurity Leaders: Krista Arndt

SecureWorld News

Krista Arndt is the Chief Information Security Officer for United Musculoskeletal Partners (UMP). She has worked in and around security, risk, and governance since 2008 in various roles. In taking on a leadership role as a program manager in the U.S. A : Multi-factor- authentication (MFA) on personal accounts.