article thumbnail

Rob Ferrill on His Tech Career, Integrated Solutions, and Raising Security Awareness

Information Week

AVP and CISO Rob Ferrill details his 30-year IT and Information Security background developing and operating security tools, processes, and policies, and previews his upcoming keynote presentation on our ‘Innovation and Cyber Resilience’ live webinar on Wednesday, November 29.

Security 106
article thumbnail

5 challenges for securing the future

CIO Business Intelligence

Information security has been an intriguing part of our past, is a critical part of our present, and will be a defining factor in our future. The economics of security are clear: “There is no financial stability without cybersecurity,” writes Loretta J. To have a future requires mastering information security.

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

research and education organizations to solve common technology challenges, and to develop innovative solutions in support of their educational, research, clinical and community service missions. Bachelor’s Degree in Computer Science, Information Systems, Business, or related field or equivalent work experience. Responsibilities.

Security 293
article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

We have so much change happening and we can drive it to happen in a more positive way to reduce the resource needs for organizations and actually scale security for businesses of all sizes.". Don't miss Kathleen Moriarty's complete presentation, as well as those of other cybersecurity leaders, at our upcoming digital events.

CTO 70
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. By Albert Fruz. Write Policies. Implement policies.

Policies 268
article thumbnail

How to Develop an IT Vulnerability Assessment

Galido

Information Technology Blog - - How to Develop an IT Vulnerability Assessment - Information Technology Blog. In terms of information security, vulnerability is a weakness that is found in an asset or a control and that can be exploited by one or more threats, which becomes a security risk.

article thumbnail

‘The key is the cloud’: How to keep up with the speed of innovation

CIO Business Intelligence

will offer insights on designing hybrid cloud environments for security and flexibility. Shamim Mohammad, EVP and chief information and technology officer at CarMax , will present a case study on how the cloud enables the company’s signature “Instant Offer” feature. And hear how the U.S.

Cloud 131