article thumbnail

IT Security Entrepreneurs Forum (ITSEF) 2015 Speakers: A 17-18 March gathering of community-minded business and technology leaders

CTOvision

Chief Security Officer. Deputy Chief Information Security Officer. Information and Cyber Security. Corporate and Information Security Services, Exelon. Chief Information Security Officer. Deputy Chief Information Officer for Cybersecurity, Department of Defense. INTEL CORPORATION.

CTO 150
article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook. White, VP Senior Information Security Officer, Global Information Security, Bank of America. Heather Adkins, Founding member of the Google Security Team. Find the full program here. Margaret N.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Managing Director Security. Chief Information Security Officer. Deputy Chief Information Officer. Deputy Director for Intelligence for Strategic Programs. Chief Information Security Officer. Deputy Program Manager. Office of the Program Manager, Information Sharing Environment.

article thumbnail

Aligning security and business strategies

CIO Business Intelligence

So when an organization starts cutting back on its cybersecurity program, it can take many years to build back up to the level of cyber maturity it had before the belt-tightening. Before this, Sean was involved in software development, technical support, and consulting services for a range of Internet security solutions.

Strategy 105
article thumbnail

Threat Intelligence and Security Awareness?

SecureWorld News

In our exclusive Behind the Scenes interview series, we take a deeper look at a topic that is relevant to the information security community. Today's conversation answers this question: How can threat intelligence strengthen security awareness? Will you give us some information on each one? What are you seeing?

article thumbnail

The Human Side of a Ransomware Attack

SecureWorld News

In the first hour alone, this can include activating your Incident Response (IR) plan and team, starting security triage to limit the damage if possible, and evaluating basic intel regarding the attack. The IR list is lengthy and extends on and on over the following days, weeks, and sometimes longer.

article thumbnail

What has NIST done for me lately?

Cloud Musings

In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries. NIST was really trying to say ‘This wasn’t a government program or mandate;’ it’s just good practice.” Wouldn’t you know it, but such an independent study was actually conducted earlier this year.

Dell 70