article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Video: Interconnecting Future DoE Leadership Systems (insidehpc.com). By Charles Hall. Schedule: April 07, 2015.

article thumbnail

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

Malware 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Video Shows What To Do When Your Cyber Adversaries Are Automating

CTOvision

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

Video 258
article thumbnail

Red Owl Analytics: Enabling information security and compliance teams to proactively tackle insider risk

CTOvision

But what is Red Owl?

article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

CTO Cyber Security News Video Bob Flores Chief information officer Chief information security officer CISO Coca-Cola Computer security Internet of Things Sierra Ventures' Webinar: Conversation with a CISO, Featuring Stephen Ward, CISO of TIAA-CREF (invincea.com). Do Small Businesses Need NDAs?

article thumbnail

My CISM Journey - The True Value of Certifications

CIO Musings

So I decided to demonstrate all my competence by grabbing the Certified Information Security Manager (CISM) cert from ISACA. I like videos, so I subscribed to LinkedIn Learning (not an endorsement, just a fact) and listened to 13 hours and 8 minutes of Mike Chappel tell me what I needed to know. Piece of cake. I know all this.

Study 195
article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

The information is sent to a server for analysis. Managers can access this data through a console, reviewing reports, live feeds from employee screens, screenshots, video recordings of desktop activity, and intercepted files or messages. There is no fixed threshold, like employee headcount, for when these tools are needed.

Tools 97