This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense. Participants in this webinar will: . Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia.
This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending. This webinar will examine how to economically enhance security and functionality by leveraging Cloudera and Intel. Please join us and come ready to ask the hard questions.
Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense. Participants in this webinar will: . Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia.
This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending. This webinar will examine how to economically enhance security and functionality by leveraging Cloudera and Intel. Please join us and come ready to ask the hard questions.
Speaker: Ahmad Jubran, Cloud Product Innovation Consultant
Whether you're a seasoned CTO or an industry trailblazer, this webinar will help make your product ready to meet the competition by adopting an architecture that is optimized for innovation. Join Ahmad Jubran, Cloud Product Innovation Consultant, and learn how to adapt your solutions for cloud models the right way.
Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. By Bob Gourley. The following is from the invitation: You’re a target for data breach.
Dozens of global agencies, consultancies, and integrators have already teamed up with Netlify to deliver transformative digital experiences to customers. ” – Jonathan Bobo, chieftechnologyofficer, Proximity. ” – Mark Stewart, chieftechnologyofficer, Fostr.
However, the effort to build, train, and evaluate this modeling is only a small fraction of what is needed to reap the vast benefits of generative AI technology. To learn more about generative AI in healthcare and why data management matters, watch our on-demand webinar. Consider the iceberg analogy.
The presenter, Bob Gourley, is a partner at the cyber security consultancy Cognitio. Analysis CTO Cyber Security DoD and IC' He will share lessons learned from engagements in industry and government and provide a succinct articulation of threats as seen from the analysts of Cognitio''s Threat Brief.
The presenter, Bob Gourley, is a partner at the cyber security consultancy Cognitio. CTO Cyber Security DoD and IC Computer security' He will share lessons learned from engagements in industry and government and provide a succinct articulation of threats as seen from the analysts of Cognitio''s Threat Brief.
Vendors and consultants are always eager to share insights into innovations and trends, but exchanging ideas and opinions with colleagues and fellow IT leaders can often be invaluable. Members can also participate in CEC-sponsored events, webinars, and forums to connect with fellow IT leaders.
Register now for the Webinar. Sriram Jayaraman, Vice President Consulting, HARMAN. Darrell Swope, VP and CTO of Americas Engineering, Landis+Gyr. Agenda: Gain insight on the most recent trends for the Industrial IoT. Learn from market leaders who could adapt their focus from assets (things) to APIs (intelligence).
This 27 Sep 2016 webinar is free for all credit unions: The nature of cyber threats to financial institutions continues to evolve, illuminating emerging risks to credit unions. This webinar, which is open to all credit unions free-of-charge, covers lessons learned from Cognitio, a consultancy specializing in mitigating cyber threats.
CTO Favorites and Contenders During previous research I conducted a survey of fellow CTOs to quantify their use of cloud services. Also published on CTO Craft. But sometimes it's nice to hear about what's new or popular a little more serendipitously.
Today, we’re bringing you our first Modern CTO panel episode! All of this right here, right now, on the Modern CTO Podcast! About Matthew Peters Matt serves as CAI’s ChiefTechnologyOfficer and is responsible for enterprise technology, infrastructure, security operations, and all technical consulting practices.
WEBINAR: OnPoint Insights: “Taking Security Seriously – OnPoint, DCSA, and Protecting Our National Security” Episode 2. OnPoint Consulting, Inc. As President of OnPoint Consulting, Inc., was a recipient of the 2021 DCSA James S. Cogswell Award!
WEBINAR: OnPoint Insights: “Taking Security Seriously – OnPoint, DCSA, and Protecting Our National Security” Episode 2. OnPoint Consulting, Inc. As President of OnPoint Consulting, Inc., was a recipient of the 2021 DCSA James S. Cogswell Award!
Notably, Honeycomb’s CTO joined the session via webinar, delivering a 101 training on observability 2.0 Book a consultation with our sales team. At a glance About Pax8 is the world’s favorite cloud commerce marketplace for IT professionals to buy, sell, and manage best-in-class technology solutions.
Last week I was invited to present my ideas about creating an effective developer experience on the Cloud Native Computing Foundation (CNCF) webinar series , which was great fun. Rafael Schloming, CTO at Datawire, has delivered several talks on the subject on service-oriented development and workflow.
She has over 18 years of experience in software industry as an author, speaker, mentor, consultant, technology leader and developer. Liz Keogh is an independent Lean and Agile consultant based in London. Leah is currently CTO of Breaker, which she co-founded with Erik Berlin in December 2016. LinkedIn. 10 – Liz Keogh.
“While the adoption of artificial intelligence to gain access to valuable corporate assets is a concern on the horizon, a failure to patch basic vulnerabilities has threat actors not needing to advance their approach,” Chris Novak, Verizon’s Senior Director of Cybersecurity Consulting said in a statement this week.
The survey used to generate these findings was conducted from December 2020 – January 2021 in tandem with ClearPath Strategies, a boutique consulting firm recommended to Honeycomb by Dr. Nicole Forsgren, former lead researcher for DORA and the State of DevOps Reports. About this research. On June 29 at 9 a.m.
And Thoughtworks sends newsletters with new insights, upcoming events and webinars related to the radar. . He speaks internationally about these topics and agile-friendly implementation technology and architecture. He provides in-depth consulting and training in those areas. Allen Holub Newsletter.
Register for the webinar and download the full study to see and apply Forrester’s financial model to determine the observability ROI for your organization. . That’s why we commissioned Forrester Consulting to conduct an independent study of the quantified benefits and cost savings of deploying Honeycomb for observability.
At CIO Suite, Kent’s team (2 resources) offers four core services: IT Solutions Health Check Fractional CIO Services (i.e. Leadership, which is more of a fractional CIO role, and as we get into this discussion further, we’re all consultants, many of us trying not to be retired, and so we all kind of share that in common.
Finding and leveraging external personnel that are CNCF certified trainers and consultants that can help you do the work around Kubernetes is important to help you and your team get up to speed and certified on these technologies. The full webinar is available for viewing on demand.To
There’s no standardized naming system, so a programming lead at one company might be an architect or even a CTO at another. We were able to group them into some significant clusters by looking for people whose write-in title used the words “engineer,” “programmer,” “developer,” “architect,” “consultant,” or “DevOps.”
The report also looks at how the CISO role is evolving – namely towards a broader scope of responsibilities, such as data privacy compliance, physical security, engineering, business risk, operational resilience, product design/security and technology architecture. How criminals are targeting investors on the metaverse (CNBC). What’s changed?
Creating harmony Erik Brown, senior partner for AI and engineering at West Monroe Partners, a digital consulting firm, says this instinct is correct, as organizations and employees alike need to prepare for an “AI everywhere” future. While many IT leaders sing the praises of AI training, some acknowledge that there are challenges.
and other countries want critical infrastructure leaders to take concrete steps to protect their organizations from Volt Typhoon , a hacking group backed by the Chinese government. If your organization is looking for guidance, check out the most recent advice dispensed by McKinsey in its article “ Implementing generative AI with speed and safety.
“Change management is not something that can be haphazardly addressed toward the end of a transformation-type initiative,” says Matt Mead, CTO at technology modernization firm SPR. Team members across all of S&P Global have access to trainings, webinars, and a plethora of resources to learn new skills.”
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content