article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Steve Bennett , CEO, Symantec.

Symantec 261
article thumbnail

CIT Hires Robert Stratton as MACH37 General Partner

CTOvision

Stratton adds experience in information security and entrepreneurship to MACH37™. His experience in the information security industry will be highly valuable as we move forward with the first cohort session.”. Stratton comes to MACH37™ from Polymathics, a technology startup advisory and security strategy firm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Invincea Names Former Verizon Terremark CISO as Chief Operating Officer

CTOvision

He also oversaw managed services as a vice president at VeriSign and Symantec, as a result of the company’s acquisition of Riptech. Laudermilch has held the highest level of national security clearances and has experience in numerous classified environments.

Symantec 266
article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. See promising young companies who are developing the next generation of cyber security solutions.

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

Corporate employees frequently utilize the vast resources of the internet to address various business issues on a daily basis. Traffic goes through filtering and security policies to ensure the user is only exposed to safe information. With remote browser isolation, internet traffic is prevented from accessing the user's device.

article thumbnail

The Sony Hack in Context

CTOvision

Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. The federal government ought to do so.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. Physical war.

System 52