CBI manages IT security risk and helps ensure your data is secure, compliant and available. No matter your industry our Subject Matter Experts, tailored assessments and custom solutions help safeguard your organization’s information. Our proven process and CBI Guarantee allows you to prepare, manage and navigate issues that can damage[…]
Read MoreAbout the United States Cybersecurity Magazine We are the voice for the cybersecurity industry, a forum for those on the front lines of cyber-warfare, cybersecurity law and policy, and cybersecurity infrastructure to inform and instruct the industry and the public at large. We aim to raise the level of awareness[…]
Read MoreKaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and Enterprises. Kaspersky Lab has over 2,500 employees, including more than 800 research and development[…]
Read MoreGreat Bay Software Great Bay Software’s Beacon suite provides advanced endpoint security and supports a full spectrum of your network initiatives. Beacon helps you identify every endpoint attached to your network, monitor behavior in real-time and enforce access control on your network. Take back control of your network today. Beacon[…]
Read MoreCybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Detection and Response platform uniquely identifies both known and unknown threats in real time using big data, behavioral analytics and machine learning, and puts them in context to[…]
Read MoreCengage Learning is a leading educational content, software and services company for the K12, higher education, professional and library markets with operations in more than 20 countries around the world. The company provides superior content, personalized services and course-driven digital solutions that accelerate student engagement and transform the learning experience.[…]
Read MoreFill this form out to receive your Insider Threat Report: The Ten Steps to Thwarting the Insider Threat Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina[...]
Read MoreIn this Podcast: Host Amber Williams interviews Daniel Mintz, Program Chair, Undergraduate School, Information Systems Management Major, University of Maryland University College about his career and where he sees the future of information security education going. Dan is speaking at the upcoming CISO Summit in Adelphi, MD – for an[…]
Read MoreThe Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA), chartered in August 2002, represents one of the fastest-growing technology corridors in the nation. The ISSA-NOVA Chapter is a member-focused organization whose goal is to ensure that its membership keeps abreast of the most recent information pertaining to Information Security topics[…]
Read MoreWomen’s Society of Cyberjutsu (WSC), is a 501(c)3 organization serving hundreds of women across the globe by bringing an awareness towards the lack of women in science, technology, engineering, and mathematics (STEM) careers, more specifically cyber security. Our mission is to advance women and girls in cyber security by providing[…]
Read MoreIn this Podcast: Host Amber Williams talks to Joe Voje, CSO of American Cyber Corps, for the CCISO Exam Study Question. Next, an interview with Chuck McGann, Chief Cyber Strategist at CRGT, covering his career, his time working for the US Postal Service, and his upcoming talk at the EC-Council[…]
Read MoreePlus engineers transformative security solutions for the most visionary organizations in the world. Through our security architects, engineers, and consultants, we see our clients’ horizons and craft sustainable IT roadmaps to get them there. Then we make it happen. This takes imagination, relentless client service, and the tenacity to enable[…]
Read MoreIn this Podcast: Host Amber Williams talks with Joe Voje, Principal at American Cyber Corps about the Whitehouse’s cybersecurity executive order. During the CCISO Exam Study Session, Joe walks listeners through a CCISO Exam question. Next, Amber interviews Joe Krull, Director at the Demin Group and keynote at the upcoming[…]
Read MoreIn this Podcast: Host Amber Williams talks to Keith Rayle, Principal at World Wide Technology about the importance of strategic planning to a CISO’s success. Next, an interview with Ed Pascua, SVP of Simeio Solutions, about his career, insights into the challenges CISOs face, and more. Plus a new CCISO[…]
Read MoreIn this Podcast: Host Amber Williams sits down with Keith Rayle, Principal at World Wide Technology to discuss the issue of Privacy inside and outside the US. Also, a discussion with the CISO of Cengage, Robert Hotaling, talks about how to balance the business side of the CISO’s job with[…]
Read MoreIn this Podcast: Host Amber Williams chats with Tom Bain of CounterTack about endpoint security, the Black Hat movie, and the future of security and Todd Bell of Intersec World Wide about the need for an MBA in the CISO role, swimming with the sharks, and turning the IS department[…]
Read MoreIn this Podcast: This week, the Global CISO Forum Podcast interviews Keith Rayle, Principal at World Wide Technology and Ron Baklarz, CISO of Amtrak. Listen Download this Podcast
Read MoreIn this Podcast: A conversation with Joe Voje, looking back at what the effects of a disastrous 2014 will be for 2015 in information security management and an interview with Dan Lohrmann of Security Mentor chronicling his career, his advice for aspiring CISOs, and his opinion on what 2015 might[…]
Read MoreBy: Nitin Kumar CMC, CCISO, CISSP, PMP, CGEIT Wargames can help forecast future scenarios holistically and help build a proactive strategy and a better reactive strategy.
Read MoreFill this form out to receive your Shield Your Business – Combat Phishing Attacks Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African[...]
Read More