I hope everyone is having a good week thus far; I have put together some useful CIO related material that I thought you may enjoy.
- 3 x CIO Interviews
- 4 x CIO Book Recommendations
- Content for your Car ride: Did you miss the previous CIO Virtual Sessions on Bitcoin and Hack Prevention? Video links at the end
3 x CIO Interviews:
The role of the CIO is changing quickly. I believe that a CIO must transform oneself into a CBIO – Chief Business Information Officer. Ironically, as I was writing this paper I read an article in Computerworld titled, “Does adding a few letters after the letters C-I-O make a difference?” The basic jist of the article is that SVP or title equivalent after the letters “CIO” purportedly makes a difference in the way the business sees the CIO. Well I am not sure if this is true, because being a CIO at this level probably starts in your head first before it makes its way onto the title, but what is certain after talking to a group of three CIOs recently is that two things need be believed by you first before making this transition:
Credit Union Only Event
Current Cyber Security Threat Landscape for Credit Unions & 15 Practical Solutions for 2014
August 13th, 2013 | 11am to 3pm
Join us for some lunch and tech talk!
We’re going to go over 15 practical security solutions to help you avoid data leakage in the current cyber security threat landscape, as well as review strategies for remaining secure in 2014.
For your convenience, we have provided a brief summary of the event below:
5 of 13 Ways to Hunt out Advanced Persistent Threats
Don’t Let This Stealthy Crimeware / Malware Get Any of Your Data!
A Recap of the APT Crimeware & Malware Part 1 Event
Before we dive right into the material that we discussed during the Advanced Persistent Threat (APT) event on April 17th, 2013, we want to make sure we’re all on the same page with respect to our understanding of what an APT is.
An APT is a form of virus or malware that operates in stealth mode so that it can funnel information out of your system without setting off any alarms. According to McAfee, “While there are no definitive industry figures, [we] estimate that about 15 percent of malware uses sophisticated stealth techniques to hide and spread malicious threats that can cause significant damage.”
APT Malware and Crimeware – Part 1
Wednesday, April 17th, 2013 | 8:30am to 12:30pm
Is there a magic security bullet anymore? Can we ever feel safe because we have a UTM or Layer 7 Firewalls? Can one security product vendor get it all done for you? What is the right combination of products and processes that can achieve the highest possible security posture for your organization?