This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Many large enterprises now rely on hundreds of third-party SaaS applications to do business, but their security organizations can barely keep pace. Right now, the state of the art for SaaS enterprise security are cloud access security brokers (CASBs) that act as intermediaries between users and the actual service.
SecurityScorecard has been helping companies understand the security risk of its vendors since 2014 by providing each one with a letter grade based on a number of dimensions. “The idea that we started the company was a realization that when I was CISO and CTO I had no metrics at my disposal.
Echoing the issues identified by the Educating the Analyst Panel, the disconnect between strategic and tactical concerns vis-à-vis cybersecurity quickly emerged as an important theme. Elkus and Moran also recognized the continuously changing nature of the cybersecurity landscape. — Michael Nelson (@MikeNelson) July 30, 2014.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. Enhance security.
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. If you are a cyber practitioner with lessons to share or learn please sign up for our 5 Nov 2014 Summit. By Bob Gourley.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. Enhance security.
FedCyber is an annual cybersecurity event hosted by Matt Devost and Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The next FedCyber will be held November 5, 2014 in Tysons Corner VA. By Bob Gourley. This event us unique in the DC ecosystem.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation.
Academia, government, and industry came together to provide a comprehensive approach to investigating how we can better extract knowledge from information. Mr. Thomas said that some policymakers and enterprise leaders consider technology problems to be the next generation’s problems, even though these changes are already underway.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation.
For the next two days in DC over 1000 key leaders from the national security community will be converging in a dynamic examination of intelligence and national security issues at the Intelligence and National Security Summit. Director, Technology Directorate. National Security Agency. Joint Chiefs of Staff.
We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. If you work in enterprise governance, cybersecurity or enterprise IT please check out the agenda below and register and attend.
Recently, there have been questions raised as to why corporations have been slow to be more vigilant about Cybersecurity. This week, my parents informed me that they had been victims of identity theft due to another recent high profile breach that exposed their personal information, including social security numbers.
The inaugural Intelligence and National Security Summit will occur September 18-19 2014 at the Omni Shoreham Hotel in Washington DC. Please take a look at our agenda and see if you do not agree that the Intelligence and National Security Summit will be the preeminent intelligence event in 2014. Sincerely, Ms.
The company’s technology transforms huge volumes of IT data into actionable insight and automates incident management so IT operations teams can be proactive about their response processes. It’s been a while since we checked in on BigPanda — nearly eight years to be exact, and much has changed since the company came out of stealth in 2014.
By Deepak Kumar Editor’s note: This guest post is by Deepak Kumar, Founder and CTO of Adaptiva. New technologies like these are delivering dramatic efficiency gains in many areas; however, they are stressing infrastructure and creating unrealistic expectations. XP Will Cause Significant Security Issues. – bg.
Often considered a tech guru of the company or the smartest programmer in the room, the title of CTO alone indicates that the company is doing something big with technology. With this article, we’ll dip a toe into the field of the multiple responsibilities of an average CTO. The role of CTO.
The video at this link and embedded below provides a short overview of FedCyber 2014. If you are a member of the federal technology community we encourage you to stay connected to us via the FedCyber daily at [link]. Analysis CTO Cyber Security DoD and IC Bob Gourley Computer security fedcyber Matt Devost'
Tapping Global Threat Intelligence To Secure Enterprise Networks. Cyber Security Symposium. August 27, 2014 | 11 AM -1:30 PM EST. Ruths Chris Steakhouse, Arlington, VA. On July 9, 2014, the CybersecurityInformation Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. .
If you have worked at the nexus of cyber security and policy you no doubt know Jody Westby. She writes great things on the law and cybersecurity and policy, and now we see she has an ability to think fast in a tense situation and to do the right thing at the right time in the right way. I’m so proud to have met her.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. Enhance security.
For example, see our post titled Cyber Security and Corporate Governance: The five principles every corporate director should embody. Another source of insight we like is the Security and Exchange Commission. Analysis CTO Cyber Security Treasury Board of directors NACD' Prepare for breach!
We are very excited to be working closely with the the United States Geospatial Intelligence Foundation (USGIF) to coordinate the 2014 Analytics Forum, which will be held 30 July in Reston VA. Analysis Big Data Cloud Computing CTO Cyber Security DoD and IC Events Government Health IT Mobile The Future 2014 Analytics Forum USGIF'
The video embedded below and at this link provides some pre-event context on FedCyber: FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. We would love to see you there!
Analytics 2014: Insights for Mission Impact. Jeff Jonas, IBM Chief Scientist of Context Computing. Scott Sorensen, Ancestry.com CTO. Download the Sponsorship Prospectus to secure your sponsorship! . More info is below and at: [link]. Wednesday, July 30. Hyatt Regency Reston. 1800 Presidents St., Reston, VA 20190.
If you could not make it to Strata-Hadoop World 2014 in NYC you can still watch streaming video of the keynotes. To do that visit our Hadoop World video streaming page here: https://ctovision.com/strata-hadoop-world-2014-watch-live-streaming-here/. 8:45am–8:55am Thursday, 10/16/2014. 8:55am–9:10am Thursday, 10/16/2014.
On 30 July 2014 in Reston Virginia some of the greatest minds in analytics for business outcomes and mission impact will be gathering at the Hyatt Regency Reston. This event, the Analytics 2014 Forum, is being pulled together by the United States Geospatial Intelligence Foundation ( USGIF ) and our team at Analyst One. By Bob Gourley.
By Bob Gourley The National Institute of Standards and Technology (NIST) InformationTechnology Laboratory is holding a Data Science Symposium we believe will be of high interest to the enterprise CTO community. Please submit your topics in accordance with the below (From: [link] ): Data Science Symposium 2014.
CTOlabs.com , the research arm of CTOvision.com , has just released a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership.
CTOlabs.com , the research arm of CTOvision.com , produced a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership. Analysis Big Data CTO Cyber Security DoD and IC'
14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. She is the author of Surveillance or Security? BALTIMORE , Sept.
Tim Dombrowski, partner at the highly renowned VC firm Andreessen Horowitz, has just provided us with an update on their 20 May 2014technology and government event. There will be some great conversations around the im. To read more please log in.
Strata Conference + Hadoop World 2014. Strata + Hadoop World 2014, happening October 15-17 at the Javits Center in New York, is where data’s most influential business decision makers, strategists, architects, developers, and analysts gather to shape the future of their businesses and technologies. By Bob Gourley.
Intense School recently spoke with Tracy Lenzner, founder and chief executive officer of LenznerGroup , a New York-based executive search firm, about this very subject. Lenzner is a thought-leader in the enterprise security, technology risk, privacy, and compliance arenas. As data breaches brought the U.S.
The 2014 Trusted Cyber Collaboration Workshop is being held 24-26 Sep in DC. This gathering, facilitated by the Transglobal Secure Collaboration Participation (TSCP) pulls together leaders in real secureinformation exchange, including information exchange across and between enterprises. By Bob Gourley.
Baillie Gifford led the equity financing, which brings Honor’s total equity raised to $325 million since its 2014 inception. The company plans to use its new capital to further invest in its technology and expand it across the Home Instead network. Image Credits: Honor.
If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals. One of the most virtuous groups enhancing the ability to execute on trusted collaboration is the TSCP: The Transglobal Secure Collaboration Participation (TSCP). By Bob Gourley.
The list below is an update to our reference of "Cyber Security Wake-Up Calls." For now, resolve yourself to this observable fact: Our history indicates cyber security events frequently cause action and remediation and get widespread attention. What does it take to be on the list? Here is an updated list of major events.
Former CIA CTO Gus Hunt Joins Venture Capital Firm Artis Ventures’ Board of Advisors. 27, 2014 (GLOBE NEWSWIRE) — From his office in Langley, Va., former Central Intelligence Agency CTO Gus Hunt made some of the government’s most important technology decisions. – bg. San Francisco, Feb.
On 30 July 2014 in Reston Virginia some of the greatest minds in analytics for business outcomes and mission impact will be gathering at the Hyatt Regency Reston. This event, the Analytics 2014 Forum, is being pulled together by the United States Geospatial Intelligence Foundation ( USGIF ) and our team at Analyst One. By Bob Gourley.
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. FedCyber will be held on 5 Nov 2014 at the Tysons Corner Marriott. Seating is limited and tickets are going fast.
Strata + Hadoop World 2014, happening October 15-17 at the Javits Center in New York, is where data’s most influential business decision makers, strategists, architects, developers, and analysts gather to shape the future of their businesses and technologies. Strata sells out every year; Register with code CTOVIZ to save 20%.
With this post we would like to give you a high level overview of their Spring 2014 Cohort. With this new level of accessibility and expressiveness, Fast Orientation promotes operational health, continuous awareness, and security in a powerful and innovative way throughout the enterprise. identiaIDentia Inc.
That goes for all high tech, but Virginia has also had very virtuous qualities when it comes to cyber security firms. The nation’s premier market-centric cybersecurity accelerator, Mach37 , is now bringing focus and strong support to the nation’s cybersecurity needs by accelerating continuous cohorts of high tech firms.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content