Remove Financial Remove Information Security Remove Network Remove Nonprofit
article thumbnail

The ‘Great Retraining’: IT upskills for the future

CIO Business Intelligence

The 300-person shop doesn’t focus on the classic network or data center support roles — those are outsourced to service providers. With a background as a CPA, Carroll started with BioMedRealty in accounting, eventually moving to financial reporting, then joining up with IT for an SAP ERP implementation. “It

Training 136
article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

She succeeds co-founder David Brown, who will remain on the board of the global network for entrepreneurs. The company offers mobile platforms for religious, education and nonprofit organizations. The 9-year old company provides security technology and analysts, with a focus on healthcare, financial and government organizations.

Groups 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

At the same time, seemingly endless scams can financially impact your end-users and even your personal life. If these things are true, how do we share information with others in a way that is proven to work and create a culture of security? Security awareness and how you talk about cybersecurity. Ask me anything.'.

Survey 81
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. What's in there?

System 52
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. And by de I'm an analyst at Javelin strategy and research where I do security risk and fraud for the financial services industry. For example, I have a laptop and it runs Linux so I can get into network security.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You got into a network. CLEMENS: And really I was just starting that in the vein of old DEF CON and 2600 stuff where it was, we should share information. But I was given a Class A network, and I deployed as many snort sensors on it all over. It seems like it was just there to have a network of people to try to approach us.