Remove Information Security Remove Network Remove Programming Remove Strategy
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

Aligning security and business strategies

CIO Business Intelligence

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. For example, suppose an organization has multiple teams or departments responsible for different parts of its cybersecurity strategy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

2024 CSO30 Middle East Awards: Nominations are now open

CIO Business Intelligence

The CSO30 Awards ceremony is an exclusive invitation-only event for leading security decision-makers in enterprises across the Middle East who have demonstrated the highest standards of competence in the domain of cyber and information security. Europe, ASEAN, Asia/Pacific, India, and a host of other countries.

Hotels 59
article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. Responsibilities.

Security 293
article thumbnail

Learn from IT Thought Leaders at FutureIT D.C.

CIO Business Intelligence

Niki Allen, chief information technology and operations officer and vice president of infrastructure and operations, for Boeing Information Technology & Data Analytics, and Rona Bunn, CIO of NACD will offer practical strategies to lead the digital journey and avoid burnout, as well as answer audience questions in an open discussion.

article thumbnail

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? Something that could include, but really goes to a place that is beyond awareness training? If you answered no, you’re not alone Employee privacy is a big reason why not.

Meeting 327
article thumbnail

Tech Moves: Startup Haven grows team to lead new fund; PSL promotions; F5 Networks adds execs

GeekWire

Mehta joined PSL in 2018 from ExtraHop Networks, where she was CFO. F5 Networks Photos). — F5 Networks hired Microsoft CVP Yvette Smith as SVP of customer success and business transformation and promoted Gail Coury to SVP and chief information security officer. He joined PSL in 2015 as chief design officer.

Network 96