Remove 2010 Remove Cyber Risk Remove Technology
article thumbnail

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

The Last Watchdog

Curcio walked me through how identity management technologies evolved over the past two decades. Not long afterwards, in about the 2010 time frame, IAM vendors first arrived on the scene, including Optimal IdM, Centrify, Okta and CyberArk, followed by many others. I found this historical overview to be quite instructive.

article thumbnail

Spotlight on Cybersecurity Leaders: Imran Ahmad

SecureWorld News

Imran Ahmad is a lawyer practicing in the areas of cybersecurity, privacy, and technology law at the international law firm Norton Rose Fulbright Canada LLP, in their Toronto and Montreal offices. Cyber risk is dynamic and ever changing. Get to know Imran Ahmad Q : Why did you decide to pursue cybersecurity as a career path?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. He retired as a colonel in 2010. In government, Brooks served under President George W.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.

article thumbnail

7 Trends I Spotted When Reviewing 2020 and the Cybersecurity Skills Gap

Jane Frankland

Along with working from home, redundancies, furloughed workers, reduced hours, uncertainties around future employment, technology replacing jobs and business closures, we’ve seen much needed resets and innovations. It’s been a challenging year with the global Covid-19 pandemic bringing both good and bad outcomes in business.

article thumbnail

How to build a cyber capable board

Security Boulevard

In just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. businesses can be built on, and destroyed by, cyber risk. Boards can learn a lot from how security and technology leaders work together, but the best way to do this is to consult both of them.

article thumbnail

IRISSCON 2023: OT, AI, and human empathy

BH Consulting

The operational technology challenge Ferguson outlined evolving threats to critical infrastructure, and how IT and operational technology environments are becoming increasingly interconnected and interdependent. Stuxnet in 2010 was the first the most recent was CosmicEnergy in 2023.