article thumbnail

What it takes to become a chief information security officer (CISO)

Network World

Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset.

article thumbnail

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

Additional context into this topic is available in our research report downloadable here: . Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 208 times – 918 kB. This paper.

Malware 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Interview with IO's CISO, Bob Butler, on Logical and Physical.

CTOvision

Podcast: Play in new window | Download. In this podcast I interviewed Bob Butler, Chief Information Security Officer at IO. IO is the leading provider of next-generation modular data center technology and services designs,'

article thumbnail

Video Shows What To Do When Your Cyber Adversaries Are Automating

CTOvision

Additional context into this topic is available in our research report downloadable here: . Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 526 times – 918 kB. This paper.

Video 258
article thumbnail

Our Views On Automating Cyber Defense Including Malware Removal and Return to a Known Good State

CTOvision

Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 468 times – 918 kB. Analysis Big Data CTO Cyber Security Cyber Threats DoD and IC Automation Chief information security officer CISO Computer security cyber security' This paper.

Malware 253
article thumbnail

Download the security information and event management (SIEM) tools buyer’s guide

Network World

From the editors of our sister publication CSO, this enterprise buyers guide helps network security staff understand what SIEM can do for their organizations and how to choose the right solution.

Security 195
article thumbnail

Security challenge: Wearing multiple hats in IT

Network World

Are you taking on multiple job responsibilities at your company, including some aspects of information security? At many organizations, IT professionals are being asked to handle a variety of security tasks and functions. Download the State of Information Security research report ]. If so, you’re not alone.

Security 150