Remove Article Remove Information Security Remove Security
article thumbnail

Your Next Move: Chief Information Security Officer

Association of Information Technology Professional

This article details the necessary experience and education needed for a career as a chief information security officer.

article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. Related articles. On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola. Watch the recorded presentation here. legalzoom.com).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

CTOvision

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. By Bob Gourley.

article thumbnail

What’s the Top Information Security Priority for Every SMB

Social, Agile and Transformation

Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.

article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Related articles. Cyber Security and the Data Protection Act (acunetix.com). Reception is free. April 08, 2015.

article thumbnail

4 information security threats that will dominate 2017

Network World

Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017.

article thumbnail

IDG Contributor Network: Cyber crime as a service forces changes in information security

Network World

But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. To read this article in full or to leave a comment, please click here