Remove Architecture Remove Education Remove Information Security Remove InfoSec
article thumbnail

The business case for security strategy and architecture

Notice Bored

c omplementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets.); c omplementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets.);

article thumbnail

BSides Prishtina 2022 – Shkumbin Saneja’s ‘Towards Zero Trust Architecture’

Security Boulevard

Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel. The post BSides Prishtina 2022 – Shkumbin Saneja’s ‘Towards Zero Trust Architecture’ appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BSidesNoVA 2021 – Rich Wickersham’s, David Martin’s, Dan Higham’s And Robert Lowe’s ‘Panel: Cyber Engineering & Architecture’

Security Boulevard

The post BSidesNoVA 2021 – Rich Wickersham’s, David Martin’s, Dan Higham’s And Robert Lowe’s ‘Panel: Cyber Engineering & Architecture’ appeared first on Security Boulevard.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Prior to Mastercard, Abdullah was the chief information security officer at Xerox, where she established and led a corporate-wide information risk management program.

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

Director of Information Security, State of Colorado Governor's Office of Information Technology; and Toby Zimmerer, Sr. Protecting the key, both at rest and in use, is part of a larger security strategy in how to implement cryptography into any application. Demand and Delivery Director, Optiv.

article thumbnail

Redesigning the Security Narrative

Duo's Security Blog

As I immersed myself in foreign concepts around the information security industry, marketing, and business practices at scale, I grew to appreciate not just the technology we were building at Duo, but the people who built it, the diverse audiences that we addressed, and the unique problems-to-solve around security at large.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? They won with Mayhem, an assisted intelligence application security testing solution. This is another chunk.

InfoSec 52