This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Echoing the issues identified by the Educating the Analyst Panel, the disconnect between strategic and tactical concerns vis-à-vis cybersecurity quickly emerged as an important theme. Elkus and Moran also recognized the continuously changing nature of the cybersecurity landscape. — Michael Nelson (@MikeNelson) July 30, 2014.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. Enhance security.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. Enhance security.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation.
For the next two days in DC over 1000 key leaders from the national security community will be converging in a dynamic examination of intelligence and national security issues at the Intelligence and National Security Summit. Director, Technology Directorate. National Security Agency. Joint Chiefs of Staff.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation.
14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. She is the author of Surveillance or Security? BALTIMORE , Sept.
On 30 July 2014 in Reston Virginia some of the greatest minds in analytics for business outcomes and mission impact will be gathering at the Hyatt Regency Reston. This event, the Analytics 2014 Forum, is being pulled together by the United States Geospatial Intelligence Foundation ( USGIF ) and our team at Analyst One. By Bob Gourley.
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. 2014 Data Impact Awards. Nominations are open through September 12, 2014. The 2014 Data Impact Awards highlight achievements in the following areas: BUSINESS IMPACT.
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. 2014 Data Impact Awards. Nominations are open through September 12, 2014. SECURITY & COMPLIANCE.
I spent six years as a CTO and moving from one cloud to another isn't something I even remotely considered. Putting precious eng time on a cloud migration isn't worth it unless cloud spend starts to become a significant fraction of your gross margins. This isn't exactly a new idea—Heroku launched in 2007, and AWS Lambda in 2014.
Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. By Bob Gourley. The following is from the invitation: You’re a target for data breach.
Cognitio is a privately held strategic consulting and technology engineering company founded in 2014 to bring the leading-edge practices of the Intelligence Community to a broader set of government and commercial organizations. About Cognitio. Logo - [link]. Photo - [link]. For more on Cognitio see: [link].
Haystax Technology Names Advisory Board Members. McLean, VA – January 14, 2014 – Haystax Technology, Inc. Our goal is to create a world-class advisory board that provides unparalleled strategic guidance for Haystax,” said Haystax Technology CEO William Van Vleet III. Bob Gourley, Founder and CTO, Crucial Point LLC.
“While the adoption of artificial intelligence to gain access to valuable corporate assets is a concern on the horizon, a failure to patch basic vulnerabilities has threat actors not needing to advance their approach,” Chris Novak, Verizon’s Senior Director of CybersecurityConsulting said in a statement this week. 1, 2022 to Oct.
Analytics 2014: Insights for Mission impact began with opening remarks from Keith Masback , Chief Executive Officer, United States Geospatial Intelligence Foundation (USGIF). By Katie Kennedy. In the post below Katie Kennedy providesa high level overview of the event. Stand by for more details. Bob Gourley.
6, 2014 – In the future, when an earthquake or tsunami strikes a populated area or a terrorist attack decimates a city, teams of disaster experts partnered with robots — whose skills are being honed in rigorous competitions funded by the Defense Advanced Research Projects Agency — may be the first responders. “The By Cheryl Pellerin.
On Wednesday, December 3, 2014, the Singapore Stock Exchange delayed its opening by more than three hours. Back on November 5th, an IT technical glitch caused trading in both the securities and derivatives markets to come to a halt for over two hours – once again an eternity in the world of finance. Dr. Jim Anderson.
By Bob Gourley DC seems to have a cyber security related event every week. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Learn how agencies are turning to BYOD to ensure security and ROI. Track D: Securing Your Infrastructure. Wolf Tombe , CTO, U.S.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content