Remove Hotels Remove Information Security Remove Security
article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. 6:00 PM - 8:00 PM Conference Reception, DoubleTree Hotel. 6:00 PM - 8:30 PM Banquet, DoubleTree Hotel. April 08, 2015.

article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. She is the author of Surveillance or Security? BALTIMORE , Sept.

Security 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Marriott's Breach Saga Underscores Need for Cybersecurity Review

SecureWorld News

The attackers gained unauthorized access to the system and stole personal information of approximately 327 million guests. With more than 30 hotel brands, Marriott and its franchises manage more than 7,000 properties in the United States and more in 130 countries. Regis properties.

Hotels 113
article thumbnail

CISO Journeys into Ukraine to Rescue Coworker

SecureWorld News

The stakes are high when the security of your organization ultimately rests on you. Smeaton, the Chief Information Security Officer for DataRobot based in Boston, shared his harrowing experience with the SecureWorld Boston audience at this week's conference. Smeaton is the Chief Information Security Officer at DataRobot, Inc.,

article thumbnail

How AI continues to reshape the cybersecurity arsenal

CIO Business Intelligence

Let’s talk about strengthening the four major pillars from an attacker’s perspective, as they form the core of any organization’s security. Source code analysis tools Static application security testing (SAST) is one of the most widely used cybersecurity tools worldwide.

article thumbnail

2024 CSO30 Middle East Awards: Nominations are now open

CIO Business Intelligence

The ceremony for the inaugural edition of the CSO30 Awards will take place at the IDC CISO Roundtable on May 15 at Dubai’s Jumeirah Mina A’Salam Hotel, June 4 at Riyadh’s Mövenpick Hotel and June 10 at Doha’s Grand Hyatt Hotel & Villas. Europe, ASEAN, Asia/Pacific, India, and a host of other countries.

Hotels 59
article thumbnail

Cloud Musings by Kevin L. Jackson: Bahrain International.

Cloud Musings

I am honored to announce that I will be a speaker at the Bahrain International eGovernment Forum , April 8-10, 2013, being held at the Ritz-Carlton Bahrain Hotel and Spa, in Manama, Bahrain. Whether it is information security or our daily actions, we often perceive certain actions as being risky. Risk Reality. Newer Post.

Cloud 119