Remove Authentication Remove Course Remove Information Security
article thumbnail

The Small Business Guide to Information Security

Galido

Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. But they can be particularly disastrous to small businesses.

article thumbnail

What makes a CIO truly great?

CIO Business Intelligence

Of course, I do have to add a qualifier here because it is not enough to be a great communicator. Receivers of messages are paying increasingly deeper attention to the authenticity and substance of the narrative being presented. Add “communicator” then to the list of must-have CIO adjectives. Today, it’s all about data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key considerations to cancer institute’s gen AI deployment

CIO Business Intelligence

While GPT4DFCI isn’t allowed to be used for clinical purposes, as the governance committee has stipulated, it’s been reviewed by the privacy and information security teams for safety and efficacy. Next, the institute will create training courses on prompt engineering techniques and the ethics of using gen AI.

article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are they?

Airlines 278
article thumbnail

March Madness Meets Cyber Mayhem: How Cybercriminals Are Playing Offense this Season

SecureWorld News

This annual college basketball bonanza presents a prime opportunity for scammers to capitalize on excitement, urgency, and, of course, the lure of easy money. Trey Ford, Chief Information Security Officer at Bugcrowd, keeps it simple, saying: "The same advice rings true for March Madness as it does any other time of the year.

Meeting 80
article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

Some of his notable accomplishments include the development of RUNOFF and TYPSET, as well as participation in the refinement of the Compatible Time-Sharing System and the design and implementation of the Multiplexed Information and Computing Service.

Security 150
article thumbnail

Spotlight on Cybersecurity Leaders: William Lidster

SecureWorld News

W illiam Lidster has been with AAA Washington since August of 2017, serving as the leader of its information security an d compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.