The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. manufacturing program (bizjournals.com).

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. When you accept that jury duty request, you have faith that your PII (personally identifiable information) is being protected. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cybersecurity Mentorship Program Pairs CISOs and Students

SecureWorld News

And this match came up with $300,000 to get things started in a brand new pilot program. Georgia State University cybersecurity mentorship program. How does the cybersecurity mentorship program work? And the program includes a matchmaking system.

DHS Launches Program to Hire 'World-Class Cybertalent'

SecureWorld News

In an effort to get more cybersecurity professionals into government roles, the Department of Homeland Security (DHS) announced its Cybersecurity Talent Management System (CTMS), which will allow DHS to recruit top cybersecurity talent—and pay them much more.

AI will transform information security, but it won’t happen overnight

Network World

These algorithms draw inferences without being explicitly programmed to do so. Although it dates as far back as the 1950s, Artificial Intelligence (AI) is the hottest thing in technology today. An overarching term used to describe a set of technologies such as text-to-speech, natural language processing (NLP) and computer vision, AI essentially enables computers to do things normally done by people.

Our Top Recommendations For Your Security Program: CISOs Get An Offer They Can’t Refuse

Forrester Digital Transformation

The Scorsese classic has a few surprising parallels with today's chief information security officer.

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO reports to the Vice President for Network Services and will have responsibility for security across all Internet2 infrastructure programs. By Bob Gourley.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

FBI Director James Comey consistently underscores the threat of cybercrime to corporate America by repeating what security professionals have long known: “there are two kinds of companies in the United States, those who know they have been hacked and those that don’t know they have been hacked.” Conducting a holistic review of the organization to identify areas of vulnerability and improve network security is a proactive measure that no organization should overlook.

Is your security program based on hard evidence or compliance voodoo?

IT Toolbox

What do you think of when you hear information security ? If you’ve been working in and around IT for a while, I’m guessing that things like documented security policies, network and endpoint controls, user training, disaster recovery plans and the like come to mind. After all, these elements make up the essence of a solid information risk management program.

Continued Controversy over Smartphone Encryptions

CTOvision

With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. Director Comey identifies the new features as a marketing strategy targeting a perceived public demand – a marketing strategy with significant and detrimental consequences for national security.

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

As our companies understand the importance of information technology and acquire more and more valuable information, the bad guys keep trying to find ways to break in and steal customer credit card and personal information. It turns out that regulators have been watching us and they now think that securing the company is important enough that they are starting to create regulations in this area. to require banks to formalize their cybersecurity program.

Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

For healthcare professionals participating in the Centers for Medicare & Medicaid Services electronic health record (EHR) incentive program, you’ll soon need to demonstrate compliance with the Stage 2 Meaningful Use requirements in order to continue receiving incentive payments. Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care.

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Learn how agencies are turning to BYOD to ensure security and ROI. Investigate FedRAMP and its role in standardizing cloud security and what the program means to federal agencies.

How to craft a security awareness program that works

Network World

Employees are often considered the weakest link in organizations' efforts to create a strong security posture. Even organizations with security awareness programs in place struggle to instill strong security behaviors. Steve Conrad, managing director of MediaPro , a learning services company that specializes in information security, data privacy and compliance, says organizations can and should do better.

Cyber Catalyst Brings Minimal Value To Businesses

Forrester's Customer Insights

In late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services. cybersecurity information security Insurance security & risk Cyberinsurance

Building The Language Bridge Between Security and the C-Suite

Forrester's Customer Insights

If you had half an hour with a board member, and you wanted to get coaching from them about how to communicate with them about security, what would you ask them? age of the customer cybersecurity information security security & risk security operations & program governance #boardsecurity #cyberinfluence #ciso #executivesecuirtyinfluence #securitycommunication

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester's Customer Insights

Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Explaining discrepancies in different security assessment reports

IT Toolbox

In my work performing independent information security assessments , I love seeing when my clients’ network environments become more secure over time. Steady and predictable progress is key to building a solid information security program and minimizing the risk of incidents and breaches. One thing that comes up every now and then

IT Security Entrepreneurs Forum (ITSEF) 2015 Speakers: A 17-18 March gathering of community-minded business and technology leaders

CTOvision

To register for the 2015 IT Security Entrepreneurs Forum (ITSEF) see: [link]. Here are key players Robert has lined up this year: IT Security Entrepreneurs Forum (ITSEF) 2015. Senior Director, Product Security & Privacy. Pindrop Security. Chief Security Officer. Deputy Chief Information Security Officer. Information and Cyber Security. Corporate and Information Security Services, Exelon. Chief Security Officer.

Embracing mistakes in security

IT Toolbox

Managing an effective information security program isn't about avoiding mistakes. No security program in the history of IT has ever been perfect and free of setbacks. Some people will try to make you think that all is well – safe and secure – in IT but that's hardly the case. Instead, you have to look at what has happened as feedback on what works and what doesn’t.

Why you have to look past security policies for real improvements

IT Toolbox

Why you have to look past security policies for real improvements Security policies are all the rage these days. I think an outsider looking in at what it takes to build and run a solid information security program, it would be to have a set of well-written policies. After all, that's what the auditors ask for when they show up. It's also what the standards bodies emphasize. It's what the regulators

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

Information Technology Blog - - Best IT and Tech Blogs – Must Read Information Technology Resources 2019 - Information Technology Blog. Information Technology is constantly changing. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following rss feeds and blogs, tutorials or going back to school. What is Information Technology? Our Information Technology Blog Picks. Security IT Blogs.

Tech Blogs – Best Must Read Tech Resources 2019

Galido

Information Technology Blog - - Tech Blogs – Best Must Read Tech Resources 2019 - Information Technology Blog. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following RSS feeds and blogs, tutorials or going back to school. These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs.

Best Tech Blogs – Must Read Tech Resources 2019

Galido

Information Technology Blog - - Best Tech Blogs – Must Read Tech Resources 2019 - Information Technology Blog. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following RSS feeds and blogs, tutorials or going back to school. These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs.

Hottest tech skills to hire for in 2020

Hacker Earth Developers Blog

The benefits of honing technical skills go far beyond the Information Technology industry. Here are some of the hottest tech skills (a mix of programming languages, tools, and frameworks; in random order) to hire for in 2020, which will help you thrive in the workplace of tomorrow.

Bob Lord Joins CISA as Senior Technical Advisor

SecureWorld News

Cybersecurity and Infrastructure Security Agency (CISA) continues to make significant strides in improving the United States cybersecurity posture. Before that, he led Twitter's information security program as its first security hire.

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. This event helps highlight emerging technologies with potential dramatic positive impact on enterprise missions and also helps advance the exchange of ideas around mission needs and concepts of operation on enterprise cyber security. Networking Lunch – Information Sharing Hour.

Top Tech Websites 2019

Galido

Information Technology Blog - - Top Tech Websites 2019 - Information Technology Blog. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following RSS feeds and blogs, tutorials or going back to school. These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs.

Home Depot Data Breach Settlement: 5 Things It Must Do Now

SecureWorld News

The data breach compromised payment card information of roughly 40 million customers. It has also agreed to strengthen its information security program through a series of steps, which must be done within 180 days of the agreement.

Five Things Your Startup Has to Do, Even After Your App Is Built

Galido

Information Technology Blog - - Five Things Your Startup Has to Do, Even After Your App Is Built - Information Technology Blog. Security. Security is a big deal. Security is a big concern for mobile apps, and you’ll pay for firewalls, encryptions, and compliance,” according to BuildFire. They drive home the importance of security by adding, “A data leak can leave you fined in the millions in court.”. Mobile Programming Software

E-Government: A Graduate Class

CIO Musings

The class title is INFO 691 Topics in Information Systems – Digital Government This class is about using information and communication technologies to provide government services. I have guest lectured for the FTEMS program as well as other graduate MIS classes. Information security, leadership, coding and networking are primary interests of mine. It has been 6 months since I posted anything to this blog. Not setting a very good example I am afraid.

Fed Tech Roundup September 30

CTOvision

Northrop Grumman to Feature Maritime Security Capabilities at Pacific 2015. Costly blimp surveillance program is looking a little deflated - GCN.com. Federal Information Security: Agencies Need to Correct Weaknesses and Fully Implement Security Programs, September 29, 2015. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker.

Spotlight on Cybersecurity Leaders: Tammy Klotz

SecureWorld News

Tammy Klotz is the Chief Information Security Officer at Covanta. She is a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and is also Certified in Risk and Information Systems Control (CRISC).

Best IT Blogs – Must Read Information Technology Resources 2019

Galido

Information Technology Blog - - Best IT Blogs – Must Read Information Technology Resources 2019 - Information Technology Blog. Information Technology is constantly changing. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following rss feeds and blogs, tutorials or going back to school. What is Information Technology? Our Information Technology Blog Picks. Security IT Blogs.

Spotlight on Cybersecurity Leaders: Randy Raw

SecureWorld News

He is the Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up.

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

This gathering, facilitated by the Transglobal Secure Collaboration Participation (TSCP) pulls together leaders in real secure information exchange, including information exchange across and between enterprises. Join the Leaders in Secure Collaboration. TSCP is proud to present the Trusted Cyber Collaboration Workshop, an opportunity for professional information sharing, and a vendor exhibition. Organized by the Industry Leader in Secure Collaboration.

Biden's COVID Plan Includes Billion$ For Cybersecurity

SecureWorld News

The bulk of the nearly $2 trillion plan includes a national vaccination program, emergency relief to families, and supporting communities hit hardest by the pandemic. Because of this, the President-elect is calling upon Congress to modernize and secure federal IT and its networks.

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

A new security audit reveals that cyber bad actors hit the National Aeronautics and Space Administration (NASA) with more than 6,000 attacks during the last four years. 6 key areas where NASA's information security is failing. Featured NASA Network Security Original Content

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA

CTOvision

If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals. One of the most virtuous groups enhancing the ability to execute on trusted collaboration is the TSCP: The Transglobal Secure Collaboration Participation (TSCP). This non profit is a collective forum of worldwide stakeholders in the defense industry seeking to address security issues in the collaboration space. By Bob Gourley.

Fed Tech Roundup December 2

CTOvision

Federal Spending on Information Security to Reach $11 Billion by 2020. AI Program Beats Humans On College Acceptance Test - Nextgov. Wins Contract in Support of DoD Information Analysis Center Program. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Zuckerberg Vows to Daughter He'll Donate 99% of His Facebook Shares - New York Times.

Guidance Software Federal Summit 6 March 2014

CTOvision

Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. As an information security trailblazer, Mr. Bigman participated in developing security measures for Government computers well before commercial industry found the Internet. Mr. Bigman is now an independent cyber security consultant and president of 2BSecure LLC in Bethesda, Maryland.

Join Women in Cybersecurity This Week in Dallas

CTOvision

CyberPoint International is committed to encouraging women to choose and have successful careers in cyber security,” said Sherri Ramsay, Senior Advisor, CyberPoint International and a past WiCyS keynote presenter. Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook. White, VP Senior Information Security Officer, Global Information Security, Bank of America. Find the full program here. Katie Kennedy.

Dunkin Donuts Forced to 'Fill Security Holes' in Data Breach Settlement

SecureWorld News

But the holes in the company's cybersecurity program are expensive. Now the company is being forced to take certain information security measures and pay a $650,000 fine to the state of New York. Dunkin's donut holes are delicious.