Remove IBM Remove Information Security Remove Network Remove Program Management
article thumbnail

Spotlight on Cybersecurity Leaders: Diego Maldonado

SecureWorld News

From R&D, configuration management, network engineering, systems engineering, leading teams, and management, moving naturally through those realms as they developed and progressed into cybersecurity as it is now known.

article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? Managing Director Security. Chief Information Security Officer. Deputy Program Manager.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business. Before that, he was the chief information security advisor at Microsoft India. . Since then, he has worked in startups and consulting.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.