Remove Course Remove Fractional CTO Remove Information Security
article thumbnail

Fundaments is the First Cloud Solutions and Services Provider in the Netherlands to Achieve the VMware Sovereign Cloud Distinction

CIO Business Intelligence

Verschuren also notes that compliance officers and chief information security officers are increasingly mindful of data integrity and demand the strongest levels of protection. We of course aren’t new at offering sovereign cloud services,” says Verschuren.

Vmware 228
article thumbnail

7 common IT training mistakes to avoid

CIO Business Intelligence

This creates a culture of ‘ladder-climbing’ rather than a focus on continuous training, learning, and improvement,” says Nicolás Ávila, CTO for North America at software development firm Globant. To keep teams engaged and reaching toward goals, Ávila suggests individualizing skill-building while periodically creating skill-focused missions.

Training 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 8 challenges IT leaders will face in 2024

CIO Business Intelligence

Delayed decision-making Bhadresh Patel, chief digital officer at global consulting firm RGP, sees organization’s showing more caution than usual. Geopolitical and economic issues have prompted rapid changing situations that require organizations to change course quickly, he says. “In

Budget 334
article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

We are proud to recognize their contributions and honor the influence they have had on the industry at large," said Jacobs, the first Information Assurance Director for the National Security Agency (NSA) and a respected cyber security consultant to government and industry.

Security 150
article thumbnail

The Sony Hack in Context

CTOvision

If the target is clean, no problem, having gained access to their machine the perpetrators can simply use it to visit child porno sites or chat rooms then, while still concealing their role, ensure that the information is provided to law enforcement officials or the press. CTO cyber conflict cyberattack Cybersecurity'

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. And then, you know, not pay any fair, fair market prices on any consulting. And there were.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

Of course you always need to evaluate the agenda and it pays to be going to an event that has a reputation for advancing key issues. Tod Henby , Director Security and Safety Division, FERC. Wolf Tombe , CTO, U.S. Moderator: Jeff Hausman , SVP, Information Availability & Intelligence, Symantec. of State.

Symantec 261