Remove Disaster Recovery Remove Leadership Remove Security Remove Weak Development Team
article thumbnail

WestRock CIDO Amir Kazmi on building resiliency

CIO

Amir Kazmi is a savvy business leader whose leadership playbook has been shaped by the fact that he’s spent one third of his career in P&L roles. On a recent episode of the Tech Whisperers podcast , Kazmi unpacked his unique leadership journey, his approach to leading digital innovation, and how he brings out the best in his team.

Security 255
article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Defining the position of the lead security person in an enterprise can be a challenging and sometimes confusing task. There are various job titles such as; Chief Security Officer (CSO), Chief Risk Officer, Chief Information Security Officer (CISO), V.P., IT Security, V.P., or Director of Information Security.

Security 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

General Dynamics IT takes multicloud strategy to the next level

CIO

And there are overarching digital technologies that traverse General Dynamics’ business portfolio, such as security, toward which all units are working to implement zero trust across the board. And it increased or strengthened our DR [disaster recovery] posture overall.”

Strategy 232
article thumbnail

How to Manage a SAP Solution in the Public Cloud

Protera

Looking to the future, S/4HANA on the public cloud is positioned to provide the highest ROI for SAP organizations that want to reach peak levels of innovation and leadership in their fields. Resiliency – Platform services and hybrid cloud models create more resilient infrastructure and effective disaster recovery solutions.

Cloud 52
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

In the early days of production systems built around Apache Hadoop, security was only possible by limiting access to your cluster. Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. From: [link]. Jun/03/2014.

Big Data 108
article thumbnail

The Unvarnished Truth of being a Woman in Tech

Hacker Earth Developers Blog

She is also a Board Member of Women in Localization, a leading professional organization with a mission to create a strong place for women to develop their careers in localization and provide mentorship. I was one of the early on developers at WellsFargo when they were going through the transformation of being an Online banking application.

article thumbnail

How Reliability and Product Teams Collaborate at Booking.com

Honeycomb

The sheer size of this server fleet makes it viable for Booking.com to have dedicated teams specializing into looking only at the reliability of those servers. One of the major goals of Booking.com’s Tech department is to enable product teams to focus on developing new features without having to worry about the infrastructure.