scadmin

Owner / Web Master

Wandzilak Web Design

Lorem ipsum dolor sit amet, in vix illum nusquam, qui posse graecis no. Solet perfecto senserit nam ut, eam ea eligendi singulis omittantur, vix solum albucius no. Iisque elaboraret vix at. In duo possim detraxit efficiantur, at quo appetere instructior. Altera nonumes omittam id nec, usu fabulas honestatis liberavisse te, in quodsi discere accusata sed.


Bracing for the Next Big Attack?

Posted on: 17 Jul 2017

Speakers Brian Lozada, Zocdoc CISO Rick Caccia, Exabeam CMO An incident response plan will either make or break your organization in 2017. History has shown that no organization is immune to…

Pravin Kothari

Posted on: 17 Jul 2017

CISO David Cass Talks Cloud Adoption and Security

Posted on: 18 May 2017

Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cybersecurity concerns. In this podcast, David Cass, the Global Partner, Cloud Security and FSS…

Investigating and Hunting for Anomalies

Posted on: 18 May 2017

LIVE WEBINAR SPONSORED BY TANIUM Speakers: Matt Hollcraft, Maxim Integrated CISO Ryan Kazanciyan, Tanium Chief Security Architect When: 10 AM PDT The amount of time an attacker remains within your…

CISOs News Feed

Posted on: 18 May 2017

Lorem ipsum dolor sit amet, in vidit salutatus intellegat est, per fabulas dolores efficiantur ut. Discere repudiandae quo an, duis mucius gloriatur ad ius, mea ex purto legere malorum. Harum…

CISOs Investigate: User Behavior Analytics

Posted on: 18 May 2017

The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven technology decisions.

Contributors
CISOs Investigate: User Behavior Analytics (UBA) includes interviews with 11 security leaders who have deployed or are looking to deploy third-party solutions. This report replaces the ad hoc, often informal and time-consuming processes of personally gathering peer insight.

Spanning verticals, the CISO contributors share real-world use cases and provide guidance.

Joey Johnson, Premise Health CISO, Discusses Challenges in Securing Distributed, Highly Regulated Environments

Posted on: 18 May 2017

Premise Health is a leader in onsite health and wellness programs providing some 600 large employer sponsored employee clinics. With a highly distributed and regulated environment, Joey Johnson is responsible for all…

Tanium

Posted on: 21 Apr 2017

Tanium is the “central nervous system” for enterprises, empowering security and IT operations teams to see, manage, and control every endpoint across the network — all within seconds. We empower companies to effectively protect themselves against modern-day threats and realize new levels of cost efficiency in IT operations.

Cylance®

Posted on: 21 Apr 2017

Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware at the endpoint, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide.

ISACA

Posted on: 21 Apr 2017

Cybersecurity Nexus™ (CSX) from ISACA is helping address the global cybersecurity skills crisis—through hands-on technical training and performance-based certification. Building on the strength of ISACA’s globally-recognized expertise, CSX provides cybersecurity professionals at all levels with the knowledge, tools and technical skills necessary to protect the enterprises they serve worldwide.