The agenda for the 10 Nov 2015 FedCyber Summit and Threat Expo has now been posted at events.FedCyber.com Please reserve your seat today by registering here (as always, the FedCyber Summit is free for federal government employees). Every year this summit brings together thought leaders who know th...
Posts Tagged: Bob Gourley
By Bob Gourley The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a de...
The video at this link and embedded below provides a short overview of FedCyber 2014. Our yearly event is a non-attribution session, and we are careful to respect that in this clip, but we do provide some context you may find relevant from the event. If you are a member of the federal technology com...
The video embedded below and at this link provides some pre-event context on FedCyber: FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges...
By Bob Gourley If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Odds are you have concluded that the only way to mitigate the threat is through automation. Right? Please join us for a discussion on automated removal of c...
By Bob Gourley If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Odds are you have concluded that the only way to mitigate the threat is through automation. Right? Please join us for a discussion on automated removal of c...
By Bob Gourley The next in a series of technical talks provided by Cloudera focuses on protecting Big Data. This breakfast session will be held 7 May 2014 at the Tower Club in Tysons corner. More from their invite is below: Protecting Big Data Inside and Out Big data is a key advantage in improving ...
By Bob Gourley If you find our open technology context and analysis of use please consider evaluating our subscription-only research and analysis service CTOvision Pro. CTOvision Pro provides access to more in-depth analysis and reporting. Subscribers receive a bi-weekly newsletter with up to date c...