article thumbnail

Step Up Your Governance Game With Our Information Security Steering Committee Charter Template

Forrester IT

We’ve said it many times: security matters, and security leaders have more influence and access to boards and senior executives than ever. Thanks to external forces like ransomware attacks, evolving security and privacy legislation, and existential loss of cyber insurance dread, they get it at the top.

article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence provided free from governments and academia. There are many many other sources provided by governments and academia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Net Threats: Deteriorating Trust in Governments and Corporations

CTOvision

Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “ Net Threats ”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security. By Shannon Perry.

.Net 272
article thumbnail

IntelliDyne’s ITAC Published Top 10 Tech Trends In 2015 For Government Enterprise Infrastructure Management

CTOvision

IntelliDyne’s ITAC is a thought leadership council focused on promoting innovation in Enterprise Infrastructure Management and technology solutions in government, comprised of IntelliDyne senior technologists and enterprise architects.

article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. In a computing context, the term security implies cybersecurity.

article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Bachelor’s Degree in Computer Science, Information Systems, Business, or related field or equivalent work experience. Minimum of 10 years of progressive experience in the network security and information security policy workforce. Desired Skills & Experience. MBA or other graduate level degree.

Security 293
article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. By Charles Hall. We noticed an event readers in the great state of Tennessee may take an interest in. Reception is free.