article thumbnail

E-Government: A Graduate Class

CIO Musings

One thing I am working on for this fall that I am very excited about is a class at VCU that is near and dear to me: E-Government. The class title is INFO 691 Topics in Information Systems – Digital Government This class is about using information and communication technologies to provide government services.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. – 10:25 a.m. of State.

Symantec 261
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
article thumbnail

8 data strategy mistakes to avoid

CIO Business Intelligence

“Similar to disaster recovery, business continuity, and information security, data strategy needs to be well thought out and defined to inform the rest, while providing a foundation from which to build a strong business.” They also need to establish clear privacy, regulatory compliance, and data governance policies.

Strategy 135
article thumbnail

Net Threats: Internet Openness in Danger

CTOvision

Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “ Net Threats ”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security. By Shannon Perry. Wheeler a letter opposing his proposal.

.Net 269
article thumbnail

Why is Cybersecurity at a Crossroads?

SecureWorld News

Russia's International Information Security Director spoke just last week about how he believes the war in cyberspace is in full swing and that it has been called the Third World War for legitimate reasons. Brooks has been named a Top 5 Cybersecurity Executive to Watch and a Top Tech Person to Follow by LinkedIn.