Remove Events Remove Fractional CTO Remove Information Security Remove Internet
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

For the next two days in DC over 1000 key leaders from the national security community will be converging in a dynamic examination of intelligence and national security issues at the Intelligence and National Security Summit. And it features and expo floor of the hottest technologies in the nation. Independent Consultant.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. How do you pick the right events? My recommendation is to look for events that have a good mix of thought leaders from a variety of organizations and sectors of the economy, since that is an indicator that there will be a good sharing of lessons learned.

Symantec 261
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

World's First Hybrid War in Ukraine Holds Important Cyber Lessons

SecureWorld News

To watch the full presentation, check out the event's agenda and register today. Kathleen Moriarty, CTO, Center for Internet Security, talking about "Transforming Information Security for Businesses of All Sizes". And 9 more informative sessions. Attendees can earn 5 CPE credits.

article thumbnail

Savvis Announces Availability of Rebuilt Cloud Data Center » Data.

Data Center Knowledge

and Cisco’s Unified Data Center technologies, it’s aimed at enterprise hybrid needs. Businesses are looking to migrate applications hosted on-premise into the cloud using a variety of hybrid solutions,” said Andrew Higginbotham, chief technology officer at Savvis. Events Calendar. By: Jason Verge July 25th, 2013.

article thumbnail

The Sony Hack in Context

CTOvision

If the target is clean, no problem, having gained access to their machine the perpetrators can simply use it to visit child porno sites or chat rooms then, while still concealing their role, ensure that the information is provided to law enforcement officials or the press. CTO cyber conflict cyberattack Cybersecurity'

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Which then I could configure to get on the internet, you know.

article thumbnail

6 warning signs CIOs should look out for in 2024

CIO Business Intelligence

“One of the biggest lessons from 2023 was the need for adaptability,” says Peter Bilyk, chief innovation officer at Ukrainian law firm Juscutum. Companies that were able to pivot quickly in response to new technologies, market demands, or global events fared better.” Remaining adaptable will be key as we step into 2024.