This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation. Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. Register here.
This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending.
This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending.
In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation. Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. Register here.
What does it mean to be a CTO for a startup? Should a startup CTO spend their time programming? Exploring new technologies? The role of a CTO varies as the company matures. A CTO can help you find the right answers. Instead, they should consider a FractionalCTO who can help close the gap.
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. Presented by Cloudera. That’s precisely what the annual Data Impact Awards, presented by Cloudera, are for. For more see the text below from the Cloudera site: [link].
in Advanced Research Contracts For its Labs Division. Major Market Demand for Advanced Threat Protection Driving Rapid Platform Adoption and Expansion of Technology Ecosystem; Company Announces Integration With Palo Alto Networks’ Wildfire Platform. contract with the U.S. – bg. For more information, visit [link].
Call me lazy, but I really like it when I attend a Government presentation and they include some information on exactly and precisely WHAT upcoming opportunities are available for Industry. Contract type? What quarter? Of course, Government is required to give Industry a forecast so that Industry can be prepared to respond.
Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. By Bob Gourley. The following is from the invitation: You’re a target for data breach.
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. Presented by Cloudera. That’s precisely what the annual Data Impact Awards, presented by Cloudera, are for.
Bettenhausen has overall responsibility for security, public safety and preparedness for the domestic and global operations and facilities of AEG, a leading sports and entertainment presenter. Bob Gourley, Founder and CTO, Crucial Point LLC. He also serves as editor of CTOvision.com, an award-winning technology blog.
What is a CTO? The chieftechnologyofficer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.
By Bob Gourley CTOlabs.com, a subsidiary of the technology research, consulting and services firm Crucial Point LLC and a peer site of CTOvision.com , has just announced a white paper titled “ Empowering Analysts with Big Data.” Analysis Analytical Tools Big Data Cloud Computing CTO Cyber Security DoD and IC Gov2.0
The overall agenda of this event is full of fantastic sessions and presentations by the most senior leaders in the national security community. And it features and expo floor of the hottest technologies in the nation. Office of Management and Budget. Independent Consultant. Defense Intelligence Officer for Cyber.
Join Bob Flores, Executive Partner of Cognitio, and Junaid Islam, CTO of Vidder, Inc, at the Gartner Security & Risk Management Summit for their session on How to Stop Catastrophic Cyber Failure in Your Organization. The session is presented by Vidder, Inc. . Junaid Islam , CTO, Vidder, Inc. Register Today Here.
There are many former government officials who now run successful consultancies. Among the experts are: Alan Wade (former CIO at CIA), Fran Landolf (former SIS at NSA), Bob Flores (former CTO at CIA), Bob Gourley (former CTO at DIA), Jill Singer (former CIO at NRO), etc. There is evidence of this trend here: (link to PPT).
Jim Loter, a longtime tech leader inside the city of Seattle, currently serves as interim chieftechnologyofficer. We brought in some folks from Microsoft and we consulted with folks from Adobe and from AWS to give us their perspectives on what was emerging.
Commercial firms present included multipleparticipants from systems integrators with analytical capabilities, high tech analytical tool companies like Recorded Future , WayIn , Pentaho , Optensity and Hexis Cyber. Jonas prepared visuals that paired incredibly well with the messages in his presentation.
This presentation provides facts and observations on the cyber threat in ways that can inform you decision-making and improve your ability to defend. The presenter, Bob Gourley, is a partner at the cyber security consultancy Cognitio. The presenter, Bob Gourley, is a partner at the cyber security consultancy Cognitio.
This presentation provides facts and observations on the cyber threat in ways that can inform you decision-making and improve your ability to defend. The presenter, Bob Gourley, is a partner at the cyber security consultancy Cognitio. The presenter, Bob Gourley, is a partner at the cyber security consultancy Cognitio.
It is the role of the presenter to make the management understand the benefits and gains achieved through implementing these security policies. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. Time, money, and resource mobilization are some factors that are discussed in this level.
Consults with service owners regarding their security risks and responsibility in minimizing those risks. Coordinates with the appropriate entities in any lawful compliance reviews or investigations related to the security of electronic information and/or any information technology investigation. Click here to apply online.
She is a consultant and the former president and CEO of Laird Norton Financial Group. Adams joined the Seattle biotech giant last year as CTO. Seattle-based Denali Financial Consulting has been acquired by Bellevue, Wash.-based Bevier joined the F5 board in 2006. Mark Adams. Adaptive Biotechnologies). Mark Adams is now COO.
Few would swap sunny San Francisco and the innovation of Silicon Valley for a train ticketing company serving disgruntled UK commuters, but try telling that to Trainline CTO, Milena Nikolic. There’s a reported international expansion on the horizon, government contracts to win and a new CDO, hired from Meta, now reporting into Nikolic. “I
Indian River is a corporate development consulting and investment banking firm, helping mid-market organizations complete desired transactions at the maximum enterprise value. Cognitio is a strategic consulting and engineering firm established and managed by a team of former senior technology executives from the U.S.
platform when Bo Borland, VP Field Technical Sales, presents an overview of the new MongoDB Analytics capabilities on Tuesday, June 24 at 4:00pm. With YARN, Pentaho Data Integration jobs can make elastic use of Hadoop resources, expanding and contracting as data volumes and processing requirements change.
During interview today with GovMatters.tv I'll be discussing an observation many of us in the enterprise technology community have been discussing lately. There is a growing consensus in the enterprise tech community (CIO, CTO, CISO) regarding the Cambrian Explosion of great capabilities in the tech sector.
. — Microsoft’s M12 venture fund chief Nagraj Kashyap departed to join SoftBank’s Vision Fund as managing partner. Seattle-based Denali Financial Consulting appointed former Create33 executive director Rebecca Lovell as its new CEO. Kashyap joined Microsoft in 2016 after spending 12 years leading Qualcomm Ventures.
The regulations themselves are a part of, and a driver to, a set of complex problems for industry — presently, with risk being transferred away from DoD to its contractors who will find risk rebounding to them via their “cyber” insurance policies. The NIST is the cognizant agency for Classified standards and operational regulations.
” Neal Oman, chieftechnologyofficer for Vouched. LinkedIn Photo) — Identity verification startup Vouched named Neal Oman as chieftechnologyofficer. Oman was previously CTO at Plunk, a Bellevue, Wash., home improvement tech startup.
This webinar, which is open to all credit unions free-of-charge, covers lessons learned from Cognitio, a consultancy specializing in mitigating cyber threats. Presenter Bob Gourley knows the cyber threat landscape firsthand, having spent years in operational cyber security. Which threat actors pose the greatest risk to credit unions.
(Aquagga Photo) After five years, four in-the-field clean-up demos, and more than a dozen lab tests, the “forever chemical” destruction startup Aquagga is ready to commercialize its technology with a new CEO at the helm. company building devices that can eliminate 99% of the PFAS present in contaminated water.
Stephen Kowski, Field CTO at SlashNext, highlighted the concerning trend of cybercrime evolving into a service-based industry, saying: "The takedown of HeartSender reveals how cybercrime has evolved into a sophisticated service industry, where even non-technical criminals can easily purchase and deploy advanced phishing tools to target businesses.
Romano has a background in commercial buildings and aerospace and is founder and CEO of BlueRipple Capital, LLC, a consultancy firm for global technology companies. Other recent appointments include Rachel Lenington , formerly at Seagen and the Bill & Melinda Gates Foundation, as CTO and head of product development strategy.
” Diligent discernment From left: Lexion CTO and co-founder Emad Elwany; CEO and co-founder Gaurav Oberoi; and Chief Legal Officer Jessica Nguyen. Oberoi made hundreds of calls to lawyers, paralegals, contract managers, consultants, and various other stakeholders. . “That social validation felt good.
When addressed properly , application and platform modernization drives immense value and positions organizations ahead of their competition, says Anindeep Kar, a consultant with technology research and advisory firm ISG.
E-SITE is an indefinite-delivery/indefinite -quantity (IDIQ) multiple-award contract awarded to 25 large and 25 small businesses to support IT requirements across the defense intelligence enterprise and greater intelligence community. Berico is Cognitio's exclusive prime on E-SITE.
Reflecting on his own journey from cyber security professional to aspiring ChiefTechnologyOfficer, Kumar remarked, “As a cyber security professional, the journey to become a ChiefTechnologyOfficer was not apparent to me. A recurring question among workshop participants was, “What are my gaps?”
The prevailing theme of the presentations and discussions was how to provide secure networks in times of war. Additionally, every presentation and discussion centered on “convergence”: the effective merging or integration of staffs, networks and systems into a unified whole to achieve decisive results. Innovation.
Legal contracts. We'll announce the winners on May 18 at the GeekWire Awards , presented by Astound Business Solutions. Submit your votes below and keep scrolling for descriptions of each finalist for Startup of the Year, presented by Meridian Capital. Real estate ownership. Industrial AI. E-commerce fulfillment software.
Too often, technology companies pay consulting or analyst firms to create metrics based on the best characteristics of their offerings,” says Judith Hurwitz, CEO of Hurwitz Strategies, an emerging technologyconsulting firm. Today, many CIOs feel the same way about metrics. Metrics are only as good as their source.
In response to the need for rapid improvement in agency postures, the NIH CIO-CS Government-Wide Acquisition Contract now offers Cognitio's Fast Start cybersecurity solution. Organizations and even other nations have demonstrated an unrelenting focus on their attempts to gain unauthorized access to government systems.
Consulting firm McKinsey Digital notes that many organizations fall short of their digital and AI transformation goals due to process complexity rather than technical complexity. Data architecture components A modern data architecture consists of the following components, according to IT consulting firm BMC : Data pipelines.
The man, a cybersecurity consultant, tried covering his tracks. Hutchins presenting at a recent pitch event in Seattle for underrepresented founders. The other two co-founders are the chieftechnologyofficer and lead data architect, both of whom also hold 9-to-5 jobs.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content