Remove Exercises Remove Fractional CTO Remove Information Security
article thumbnail

The evolving role of security and IT in DR and incident response

CIO Business Intelligence

Collaboration between IT and security operations The chief information security officer (CISO) and the SOC are at the forefront of preventing and responding to security incidents. Both the command center and SOC are ready to respond. Ensure the SOC shares freely with the command center.

Security 111
article thumbnail

Rethinking enterprise architects’ roles for agile transformation

CIO Business Intelligence

Enterprise architects can act as program sponsors, especially around infrastructure and risk-mediating investments required by IT operations, information security, and data governance functions. Architects are uniquely positioned to connect problems with solutions and provide objective input on where to prioritize investments. “The

Agile 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 common IT training mistakes to avoid

CIO Business Intelligence

Treating training as a checkbox exercise sends the message to your team that you don’t really care all that much about the content they’re learning — and that mindset is contagious,” warns Steve Ryan, a manager at BARR Advisory, a cloud-based security and compliance solutions provider. Ryan points to security training as an example.

Training 105
article thumbnail

Fantastic or Frightening: FBI Accesses [Your?] Exchange Servers to Stop Attacks

SecureWorld News

Tim Wade, Technical Director and Chief Technology Officer at Vectra, says the FBI action answers some questions about the attack, but leaves others to be discussed. We'll need to exercise good judgment and due care to preserve the balance between acting in the public good and affording proper protections for private entities.".

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

All those exercises, the honeypot or honeynet challenges I think that's what they were called in. And then, you know, not pay any fair, fair market prices on any consulting. I went to a private school, and so did our CTO, Elliot Anderson. Let's analyze stuff. Let's analyze malware. Let's analyze exploits. That was really fun.