article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

This event is designed as a forum for speakers and guests to exchange knowledge, experience, networking, and mentoring, with the ultimate goal of raising interest in the important, fascinating and lucrative field of cybersecurity. Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook.

article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

This episode of the “The Endpoint Imperative” podcast series from Intel, Kevin L. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users. With me is Yasser Rasheed Director of Business Client Security with Intel. Yasser welcome back. Yasser: Hi Kevin, happy to be back.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. Seven hours of high level networking. Palo Alto Networks Federal Forum 20 May 2015 (ctovision.com).

article thumbnail

Aligning security and business strategies

CIO Business Intelligence

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. About Sean Duca: Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks.

Strategy 105
article thumbnail

The Endpoint Imperative: Global Security Compliance. Are you ready?

Cloud Musings

Tune into this episode of “ The End Point Imperative: A Podcast Series from Intel ,” to hear from Intel’s Yasser Rasheed , Director of Business Client Security on how a combination of protection at the hardware and software level can help organizations gain compliance and avoid breaches, fines, and financial impact.

article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

The #SonyHack is the equivalent of detonating a nuclear bomb on a network that employed four key stratagems: capture, destroy, extort, and publish. The hackers captured and exfiltrated hundreds of terabytes of data then torched the network with wiper malware. It is different because the networks were torched. Game Change.

Security 282
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? Managing Director Security. Chief Information Security Officer. Intel Corporation.