article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Chief Security Architect, Office of the CTO, Cloudera. Proven Strategies for Promoting Innovation and Technology Adoption. Chief Security Architect, Office of the CTO, Cloudera. Chief Security Architect, Office of the CTO, Cloudera. Data Security—What’s New and What’s Next?

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Chief Security Architect, Office of the CTO, Cloudera. Proven Strategies for Promoting Innovation and Technology Adoption. Chief Security Architect, Office of the CTO, Cloudera. Chief Security Architect, Office of the CTO, Cloudera. Data Security—What’s New and What’s Next?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Infrastructure vs. Application Security Spending

Jeremiah Grossman

It has been said before and it’s worth repeating, adding more firewalls, SSL, and the same ol’ anti-malware products is not going to help solve this problem! Furthermore, these dollars are typically spent counter to how businesses invest their resources in technology. It’s a Web security world. portion of IT infrastructure.

article thumbnail

Q&A with Eric Cowperthwaite, Identity and Access Management Executive

Sailpoint

For this CISO executive Q&A we reached out to Eric Cowperthwaite, director of information security at Esterline Technologies Corporation, who has since joined Herjavec Group as VP, identity and access management. You’ll be a CTO or a CIO somewhere someday.” That is not the future. You can do everything else.

article thumbnail

Cybersecurity Snapshot: Phishing Scams, Salary Trends, Metaverse Risks, Log4J Poll

Tenable

Configure firewalls to block known malicious domains, URLs and IP addresses. The report also looks at how the CISO role is evolving – namely towards a broader scope of responsibilities, such as data privacy compliance, physical security, engineering, business risk, operational resilience, product design/security and technology architecture.