Remove IBM Remove Information Security Remove Program Management Remove Social
article thumbnail

Spotlight on Cybersecurity Leaders: Diego Maldonado

SecureWorld News

A : Regulatory action restricting the need for an individual to provide so much PII or sensitive information in order to operate within the social media or in some cases business realm. Even though some of the fields are optional, via some other form of social engineering your PII becomes available.

article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

It is very hard to catch the gist of an event like this by tracking social media, but if that is your only way of staying engaged on this one you can track the Twitter hashtag #Intelligence2014. Managing Director Security. Chief Information Security Officer. Executive Director CyberSkills Management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business. Before that, he was the chief information security advisor at Microsoft India. . Since then, he has worked in startups and consulting.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.