CTOvision.com https://ctovision.com Context for the CTO, CIO, CISO and Data Scientist Thu, 21 May 2015 23:59:13 +0000 en-US hourly 1 http://wordpress.org/?v=4.2.2 AFCEA and NIP and the USN Present Navy Information Dominance Day 11 June 2015 https://ctovision.com/2015/05/afcea-and-nip-and-the-usn-present-navy-information-dominance-day-11-june-2015/ https://ctovision.com/2015/05/afcea-and-nip-and-the-usn-present-navy-information-dominance-day-11-june-2015/#respond Thu, 21 May 2015 23:59:13 +0000 https://ctovision.com/?p=86249 n June 11, 2015, AFCEA Intelligence and the Naval Intelligence Professionals, in collaboration with the Office of the Deputy Chief of Naval Operations for Information Dominance, will present a classified forum examining the state of Information Dominance in the U.S. Navy.  If you have attended any of the previous sold-out Navy Information Dominance Industry Days, […]

The post AFCEA and NIP and the USN Present Navy Information Dominance Day 11 June 2015 appeared first on CTOvision.com.

]]>
n June 11, 2015, AFCEA Intelligence and the Naval Intelligence Professionals, in collaboration with the Office of the Deputy Chief of Naval Operations for Information Dominance, will present a classified forum examining the state of Information Dominance in the U.S. Navy. 

If you have attended any of the previous sold-out Navy Information Dominance Industry Days, you know these events provide invaluable business intelligence in the context of the Navy’s Strategy for Achieving Information Dominance.

This year’s program sessions will include:  

  • A review of the President’s FY16 budget, identifying areas of growth and risk.
  • The challenges and opportunities for industry to assist the Navy in maintaining resilient and secure communications, networks, focusing in on the effort of Task Force Cyber Awakening and the emerging CyberSafe initiative.
  • Where the Navy is headed in terms of integrating and modernizing its networks and the acquisition approach it will take to get there.
  • The Navy’s requirements to assure a tactical advantage over its adversaries in battlespace awareness, its efforts to expand its Maritime ISR capabilities, and the challenges that expansion effort creates in the realm of TCPED.
  • How the Navy must develop and employ innovative operating concepts, new systems, and a fresh approach to thinking about modern warfare, to prevail in the EM-cyber environment.
  • A closing panel comprised of leadership from throughout Navy Information Dominance.

Attendees will leave with not only a greater understanding of the Information Dominance, but with a sense of what technologies, capabilities, and services are most needed for the Navy to achieve its goals within the Information Domain.

For more and to register see: AFCEA NIP Navy Information Dominance Industry Day

The post AFCEA and NIP and the USN Present Navy Information Dominance Day 11 June 2015 appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/afcea-and-nip-and-the-usn-present-navy-information-dominance-day-11-june-2015/feed/ 0
9 July 2015 DoD CIO Mobility Industry Day https://ctovision.com/2015/05/9-july-2015-dod-cio-mobility-industry-day/ https://ctovision.com/2015/05/9-july-2015-dod-cio-mobility-industry-day/#respond Thu, 21 May 2015 09:11:59 +0000 https://ctovision.com/?p=86246 Another event we would like to bring to your attention is the AFCEA coordinated DoD CIO Mobility Industry day of 9 July 2015. Mobility is not just a major trend for DoD, but is a major driver of future mission functionality and is also posing very unique security challenges for the department. This event will shed […]

The post 9 July 2015 DoD CIO Mobility Industry Day appeared first on CTOvision.com.

]]>
Another event we would like to bring to your attention is the AFCEA coordinated DoD CIO Mobility Industry day of 9 July 2015. Mobility is not just a major trend for DoD, but is a major driver of future mission functionality and is also posing very unique security challenges for the department. This event will shed light on those and other important topics. Here is more from the AFCEA DC Site:

On July 9, 2015 the Department of Defense Chief Information Officer (DoD CIO) will host a Mobility Industry Day at the Ronald Reagan Building and International Trade Center in Washington, DC. The event, “Capitalizing on Commercial Innovation,” will discuss DoD and Industry relationships and how the Department can better capitalize on the agility and innovation of the commercial sector.

The purpose of this unclassified conference is to facilitate conversation between Industry Mobility Partners and DoD representatives about various processes, requirements, policies, and approaches to leveraging mobility within the DoD. The DoD CIO seeks to inform industry of DoD plans and to solicit assistance in accelerating delivery of mobility solutions to best meet mission objectives.

This event will consist of opening remarks by DoD Chief Information Officer Terry Halvorsen, followed by plenary and panel sessions examining focus areas for innovation in DoD mobility.

 

The post 9 July 2015 DoD CIO Mobility Industry Day appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/9-july-2015-dod-cio-mobility-industry-day/feed/ 0
CTOvision Interviews RADM Paul Becker, Director for Intelligence, Joint Chiefs of Staff, On The Cyber Threat https://ctovision.com/2015/05/ctovision-interviews-radm-paul-becker-director-for-intelligence-joint-chiefs-of-staff-on-the-cyber-threat/ https://ctovision.com/2015/05/ctovision-interviews-radm-paul-becker-director-for-intelligence-joint-chiefs-of-staff-on-the-cyber-threat/#respond Wed, 20 May 2015 16:37:59 +0000 https://ctovision.com/?p=86240 We recently had the opportunity to interview the Director for Intelligence (J2) for the Joint Chiefs of Staff, RADM Paul Becker, USN. RADM Becker has served in this position since September 2013. The Joint Staff J2 is a position requiring a constant awareness of the day-to-day threats to the nation. Becker had the perfect background […]

The post CTOvision Interviews RADM Paul Becker, Director for Intelligence, Joint Chiefs of Staff, On The Cyber Threat appeared first on CTOvision.com.

]]>
Rear-Admiral-Paul-Becker-Joint-Staff-J2We recently had the opportunity to interview the Director for Intelligence (J2) for the Joint Chiefs of Staff, RADM Paul Becker, USN.

RADM Becker has served in this position since September 2013. The Joint Staff J2 is a position requiring a constant awareness of the day-to-day threats to the nation. Becker had the perfect background for this position, having served in a similar capacity at the United States Pacific Command, the combatant commander with the largest area of responsibility in the U.S. military. He has also served in operational positions leading large intelligence activities forward in Afghanistan and in many other hot spots around the globe.

Our questions of RADM Becker centered around the cyber threat from the high-end actors. Our dialog is captured below:

Gourley: There is a school of thought that says in cyber security the adversary does not matter. Since identifying who is attacking is hard, the most important thing is to just defend against everyone and patch everything. Is this consistent with your view?

Becker: I would never advise to leave systems unpatched. History is pretty clear that not paying attention to your own systems is setting yourself up for failure. But studying the potential adversaries in cyberspace can help you prepare in other, more strategic ways. Studying adversaries and what they want can inform key decisions before and during attacks.

Gourley: Every potential adversary out there has savvy computer scientists and advanced technologies and research organizations that help them develop advanced attacks. Are those the kind of things you mean we should be studying?

Becker: When it comes to threats, we too often focus on adversaries'  "What" and "How" ... "What [are they doing]?" and "How [are they doing it]? ... That applies in conventional kinetic or territorial scenarios, and it's my experience the "What are they doing" and "How are they doing it" dominate discussions in cyber scenarios as well.

I'd like to focus on the Why ... "Why [are they're doing it]? ... Which delves into understanding adversaries' grand strategies, and why they employ cyber actions, particularly against our business sector.

Gourley: Who are the high-end cyber adversaries we should be learning more about?

Becker: I'll list four: China, Russia, Iran, North Korea.  The Chinese in particular are cleaning us out in the aerospace world by exploiting well-known vulnerabilities ... and those vulnerabilities are eroding our aerospace dominance. It's not that we lack the ability to engineer the best designs in the world. It's that too many of those key components are stolen via IP theft before they are even brought to market, thereby damaging our national advantage. Meanwhile, according to the DNI's congressional testimony earlier this year, Russia remains the most sophisticated threat across the cyber board, while Iran and North Korea are less capable but more unpredictable and aggressive.

Gourley: You mentioned China, but can you give any insights into why their approach to the Internet differs so much from the U.S. approach?

Becker: The U.S. vision for cyberspace and the Chinese vision differ significantly. It is an important dichotomy to understand.

In the US-published International Strategy for Cyberspace, cyberspace is seen as a seamless landscape of global networks that is interoperable, open, secure, reliable and based on norms of behavior (respect for private property, personal privacy, protection from crime). Most importantly, it grows and develops though worldwide multi-stakeholder governance instead of through top-down control. On the other hand, China views cyberspace sovereignty as an extension of their national sovereignty (that's why they have a “Great Cyber Wall”). In their vision of cyberspace - and the Chinese have a Cyber Strategy as well - the Internet is controlled through state-centric governance, with authority resting with the United Nations, where decisions about the Internet will be made with each country having one vote. The Chinese vision for cyberspace shapes the internet in a way that first and foremost ensures survival of the ruling Chinese Communist Party (CCP) through two pillars; 1) economic growth, and 2) internal stability ... 1) ECONOMIC GROWTH - keeping the economic machine moving forward is the prime directive ... the ends justify the means ... it includes industrial espionage which in turn helps modernize the PRC military and prevent U.S. intervention in Asia, and 2) INTERNAL STABILITY  ... which includes propaganda and targeting domestic sources of political unrest (read: firewalls to prevent infiltration of foreign influence, intrusive monitoring of the population, and hacking of foreign people's emails and websites to help enable their hunt for internal dissent).

Gourley: It is pretty clear the U.S. and most other nations are NOT going to adopt the Chinese vision for the Internet. But what are the odds that China will adopt our vision?

Becker: Our two nations' visions for cyberspace are not congruent and not likely to become so. This is an important point to understand if we want to develop an optimal strategy to address challenges in the U.S. - PRC cyber relationship. We in the U.S. must first understand why China acts the way it does, and that calls for an understanding of Chinese motives and agendas embedded in their strategy. Authoritative Chinese speeches and writings consistently present the PRC as an underdog to the U.S. in cyberspace and in advanced aerospace platforms and weaponry ... they consider us a "hegemon" in this sector; they see themselves as David to our Goliath. And therefore Chinese military theorists regard cyber warfare as an "assassin's mace" weapon, a weapon that allows a weaker power to destroy a stronger one. Back to one of the CCP pillars; widespread Chinese hacking is not merely an attempt to gain economic or military advantage ... It is considered essential to survival for the CCP. In order to achieve the strategic ends of the Chinese Grand Strategy for Rejuvenation, which includes a return to a centuries old position of preeminence in Asia - and with greater influence worldwide - the Ends (preeminence) justify the means (cyber actions against our aerospace sector). At this point the Chinese have no reason to change a strategy that is working in their favor. The Chinese comprehensive cyber strategy is just that; a comprehensive whole of government effort that includes military network reconnaissance, external diplomacy, internal security and international commerce. The Chinese hack because they feel they need to, and they've not incurred any costs for doing so that deter their activities, and therefore the U.S. can expect PRC hacking to continue and probably increase in the future.

Gourley: This last point is something that strikes me as important to dwell on a bit. You assess that PRC hacking will continue and probably increase in the future. So, it is not going to stop anytime soon, not matter how much the U.S. wants it to. So, any suggestions on what we do about those types of threat?

Becker: This brings us back to the opening point of the interview. Whether we are talking about China or Russia or North Korea or ISIS, we need to seek awareness of the adversary in ways that doesn’t just talk about capability, but motives. In the case of the PRC, U.S. policymakers and corporate leaders should be familiar with China's Grand Strategy, and understand how their vision and strategy for cyberspace fits into that when adopting policies and practices aimed at mitigating the threat of cyberespionage or cyberattacks. The U.S. (including industry) should tailor counter-hacking solutions that impose costs on thieves. It's my sense the current U.S. policy of seeking to counter widespread and damaging Chinese cyberattacks through promoting adherence to international norms and rules for behavior in cyberspace will not achieve great effects. I hope Chinese cyber behavior proves self-defeating. Economic transactions are ultimately about mutual benefit, and nobody should continue doing business with a partner who continually rips them off.

Gourley: What actions do you believe your assessments might motivate in industry?

Becker: You opened your questions on the topic of maintaining systems and that is absolutely important. Better defenses are imperative. But it is also important to put in place, better Information Sharing with those who can help: That is to say if you are in industry and being attacked and you know it, you need to be incentivized to ask for help. No one can beat an adversary like Russia or China alone. Tell the local law enforcement or the FBI that you're being attacked. And call in professionals from industry who know how to rapidly assess and react to breach. Studying the high-end threat should also lead you to think through how to protect your most important data. Prioritizing protection around your crown jewels will enable you to mount a better defense and perhaps contain damage while you are signaling for help.

Gourley: What actions are being done by government that we should track?

Becker: Earlier this month, the Administration took definitive action by promulgating an Executive Order imposing sanctions against those who seek to undermine or hamper U.S. security through cyberattacks. I applaud that. And just last month, the Secretary of Defense announced the Pentagon’s updated Cyber Strategy. This is a good beginning and must be a critical part of a deterrence plan that wields all instruments of statecraft including political, diplomatic, economic, law enforcement and military capabilities.

Finally, I'd also emphasize practices that impose costs on thieves should be given extra attention and that includes "naming and shaming" hackers (such as Mandiant has done). I'lll leave you with some thoughts espoused by a cyber-savvy colleague, USAF Lieutenant Colonel Enrique Oti, currently a Fellow at Stanford University’s Hoover Institute; if we really want to deter a Chinese business from hacking our aerospace industry we have to personally raise the cost on the Chinese CEOs to such an unacceptable level that they won't want to hack the U.S. again. Some examples of how to do this include; de-list offending companies from U.S. stock exchanges, seizing assets, freeze bank accounts, close U.S. subsidiaries, indict senior executives, ban travel to U.S. for company employees their families and remove their children from U.S. universities to name a few.

Steps like these will indicate we're serious about cyber deterrence. To quote an oft-used Chinese proverb, sometimes you need to "kill the chicken - to scare the monkey."

Gourley: Thank you Admiral Becker for your time and insights.

Becker: You are welcome. Thanks for spreading the word.

The post CTOvision Interviews RADM Paul Becker, Director for Intelligence, Joint Chiefs of Staff, On The Cyber Threat appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/ctovision-interviews-radm-paul-becker-director-for-intelligence-joint-chiefs-of-staff-on-the-cyber-threat/feed/ 0
Bright Computing Announces Partnership with NTS Africa https://ctovision.com/2015/05/bright-computing-announces-partnership-nts-africa/ https://ctovision.com/2015/05/bright-computing-announces-partnership-nts-africa/#respond Wed, 20 May 2015 12:27:18 +0000 https://ctovision.com/?p=84144 Today, Bright Computing signed a partnership agreement with NTS Africa. Bright Computing is the leader in high performance infrastructure management solutions for cloud, big data and high-performance computing. NTS Africa is a company that provides clients with advanced technology and integrated IT solutions. Through this partnership Bright Computing and NTS Africa plan to drive adoption of infrastructure management […]

The post Bright Computing Announces Partnership with NTS Africa appeared first on CTOvision.com.

]]>
Today, Bright Computing signed a partnership agreement with NTS Africa. Bright Computing is the leader in high performance infrastructure management solutions for cloud, big data and high-performance computing. NTS Africa is a company that provides clients with advanced technology and integrated IT solutions. Through this partnership Bright Computing and NTS Africa plan to drive adoption of infrastructure management solutions in West Africa.

NTS Africa specialises in forming strategic alliances and partnerships to blend best of breed products into leading technology solutions for its African customer base. In this way, customers benefit from state of the art IT solutions that solve real business issues, and first class consultancy and services from NTS Africa's highly skilled technical team.

Companies across Africa are embarking on transformational IT projects to become more agile, more cost efficient, and more productive. NTS Africa has identified Bright Cluster Manager® as a technology that delivers a clear return on investment and plays a major role in improving a company's operational efficiency, and is partnering with Bright Computing to capitalise on the opportunity this presents in the infrastructure management space.

NTS Africa is Dell's Service Delivery Partner in West Africa with the responsibility of deploying Dell solutions and services. Bright Computing and Dell also have a longstanding relationship, and this is evidenced by Dell hardware solutions being regularly coupled with Bright's innovative infrastructure management capabilities to introduce process automation and centralised operations to IT teams. The new partnership with Bright Computing puts NTS Africa in a strong position to offer its clients' valuable services around the world's most robust and popular server platforms and infrastructure management solutions.

Read more on Virtual-Strategy.

Find out more information on Bright Computing here.

Find out more information on NTS Africa here.

The post Bright Computing Announces Partnership with NTS Africa appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/bright-computing-announces-partnership-nts-africa/feed/ 0
Army Intelligence Industry Day 29 July 2015 https://ctovision.com/2015/05/army-intelligence-industry-day-29-july-2015/ https://ctovision.com/2015/05/army-intelligence-industry-day-29-july-2015/#respond Tue, 19 May 2015 19:54:53 +0000 https://ctovision.com/?p=86233 On July 29, 2015, AFCEA Intelligence and the Office of the Deputy Chief of Staff for Intelligence, Headquarters, U.S. Army, will co-sponsor a special, one day classified event tailored for members of industry focused on U.S. Army Intelligence.  The event will be held at Engility Heritage Conference Center, Chantilly, VA. The agenda will explore science and […]

The post Army Intelligence Industry Day 29 July 2015 appeared first on CTOvision.com.

]]>
On July 29, 2015, AFCEA Intelligence and the Office of the Deputy Chief of Staff for Intelligence, Headquarters, U.S. Army, will co-sponsor a special, one day classified event tailored for members of industry focused on U.S. Army Intelligence.  The event will be held at Engility Heritage Conference Center, Chantilly, VA.

The agenda will explore science and technology priorities for Army Intelligence that come at a time of transition as the Army faces diverse, emerging challenges. Army Intelligence is evolving to be more adaptive and agile to provide asymmetric support to the regionally aligned, globally engaged Army by focusing on the following:

  • Integrating critical multi-discipline intelligence capabilities to support Regionally Aligned Forces
  • Maturing our ability to leverage the national to tactical enterprise in support of expeditionary and distributed operations
  • Setting conditions to ensure army's alignment with evolving IC ITE, DoD JIE, Army Common Operating Environment

To see the complete agenda and speaker lineup, click here.

Attendees will gain a greater understanding of Army Intelligence vision and direction in a changing fiscal and operational environment, plus a sense of what technologies, capabilities, and services are required by Army Intelligence.

"To meet today's constantly evolving and increasingly complex threat, we need to continue to make smart, targeted investments to modernize in ways that provide premier intelligence support. Despite today's resource constrained environment, we have made tremendous progress in creating an intelligence corps that supports our globally engaged and regionally aligned Army. I'm excited about this opportunity to continue to work with our partners in industry that help us ensure our Soldiers always have the advantage on the battlefield."

-- LTG Mary Legere, USA, Deputy Chief of Staff, G-2 (Intelligence)

Attendees must be U.S. citizens and possess a minimum SECRET clearance.  Clearance deadline is July 15, 2015.  For more information about clearances, click here.

To register, click here.

The post Army Intelligence Industry Day 29 July 2015 appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/army-intelligence-industry-day-29-july-2015/feed/ 0
Lessons from the Synergy Forum: Cybersecurity through Information Sharing https://ctovision.com/2015/05/lessons-synergy-forum-cybersecurity-information-sharing/ https://ctovision.com/2015/05/lessons-synergy-forum-cybersecurity-information-sharing/#respond Tue, 19 May 2015 13:09:52 +0000 https://ctovision.com/?p=84111 On 30 April 2015 industry leaders and government practitioners gathered in Tysons Corner to discuss technology trends, innovation, and ways to enhance enterprise and mission outcomes. Technology and Emerging Concepts for Enhanced Cybersecurity, the forum’s first panel discussion, consisted of Bob Gourley, David Bray, Brian Carrier, Peter Fonash, and Dean Hall, who collectively identified many […]

The post Lessons from the Synergy Forum: Cybersecurity through Information Sharing appeared first on CTOvision.com.

]]>
cognitiocorpOn 30 April 2015 industry leaders and government practitioners gathered in Tysons Corner to discuss technology trends, innovation, and ways to enhance enterprise and mission outcomes. Technology and Emerging Concepts for Enhanced Cybersecurity, the forum’s first panel discussion, consisted of Bob Gourley, David Bray, Brian Carrier, Peter Fonash, and Dean Hall, who collectively identified many of the growing opportunities and challenges in the cyber arena.

The obvious challenge of cybersecurity – the attacker’s advantage – set the context for the panel discussion. Perhaps the most interesting potential solution came from contributor David Bray, who suggested that cybersecurity experts could learn several lessons from the public health community. He created an analogy between infectious diseases and cyberattacks.

When an individual contracts an infectious disease, hospitals share that information openly, so other hospitals and the government can better prepare in the case of an outbreak. Other hospitals then know what to look for, who to look for, and what to do immediately if they encounter the disease. In a similar way, openness about cybersecurity is preferable to being closed. If information about attacks could be anonymized and shared among a large community of enterprises, the collective defense of the entire network could greatly improve. Members of the network could have better information about what to look for and when to expect the next threat.

The problem, of course, is that traditional defensive measures do not translate to cyberspace. The impenetrable cyber fortress is a myth. Instead, enterprises must develop more innovative solutions to defend themselves, in order to quickly detect and isolate threats. Real-time information sharing about the cybersecurity landscape could contribute to a more secure cyber environment.

We would love your thoughts on this and related topics. We are continuing the dialog from the yearly Synergy Forum in an online LinkedIn group with the same name. This vetted community of over 800 members can be found here.

The post Lessons from the Synergy Forum: Cybersecurity through Information Sharing appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/lessons-synergy-forum-cybersecurity-information-sharing/feed/ 0
The Light Phone, a Companion for your iPhone https://ctovision.com/2015/05/light-phone-companion-iphone/ https://ctovision.com/2015/05/light-phone-companion-iphone/#respond Mon, 18 May 2015 20:12:27 +0000 https://ctovision.com/?p=86216 The Light Phone might not be a high functioning smartphone with a high-def touch screen, but it does make and receive phone calls. That might not sound very interesting, but what is cool about this phone is that it can be like your virtual receptionist. Through an app on your smartphone, when a phone call […]

The post The Light Phone, a Companion for your iPhone appeared first on CTOvision.com.

]]>
The Light Phone might not be a high functioning smartphone with a high-def touch screen, but it does make and receive phone calls. That might not sound very interesting, but what is cool about this phone is that it can be like your virtual receptionist. Through an app on your smartphone, when a phone call comes through, it will be rerouted to your Light Phone. The idea behind this phone is to enjoy life with less distractions; no Facebook, text messaging, snapchats, etc..

Because of its singular purpose, Light Phone can last a really, really long time on a single charge even though it’s incredibly small and thin. It’s almost exactly the same size as an credit card, is just 4mm thick, and weighs less than a KitKat. Despite being so liliputian, standby time is pegged at around 20 days — talk time isn’t mentioned on the Kickstarter project page.

Light Phone doesn’t need a smartphone and the app to work, though that’s certainly what makes it different. It does get its own phone number, too, so you can use it as a back-up or give special individuals your “private line” so they can always get in touch.

There’s still a long way to go before Light Phone winds up in any pockets. The Kickstarter is about 1/8th of the way to its funding goal. Once it’s reached, the team expects to ship out the first Light Phones by June of next year.

Read more about the Light Phone on Geek.com.

Watch the Light Phone here.

Back the Light Phone on Kickstarter here.

The post The Light Phone, a Companion for your iPhone appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/light-phone-companion-iphone/feed/ 0
Sign Up For ThreatBrief: Daily context on cyber threats to enterprise mission needs https://ctovision.com/2015/05/sign-up-for-threatbrief-daily-context-on-cyber-threats-to-enterprise-mission-needs-3/ https://ctovision.com/2015/05/sign-up-for-threatbrief-daily-context-on-cyber-threats-to-enterprise-mission-needs-3/#respond Mon, 18 May 2015 17:59:33 +0000 https://ctovision.com/?p=84172 There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This is the operating thesis behind ThreatBrief, our daily report on business risks (with a focus on cyber risks). Our analysts and experienced executives are collaborating to ensure this newsletter captures the insights you need. Our goal […]

The post Sign Up For ThreatBrief: Daily context on cyber threats to enterprise mission needs appeared first on CTOvision.com.

]]>
pdbThere are threats to your business and mission needs. Tracking them can give you insights that drive your decisions.

This is the operating thesis behind ThreatBrief, our daily report on business risks (with a focus on cyber risks). Our analysts and experienced executives are collaborating to ensure this newsletter captures the insights you need. Our goal is to make this product your most anticipated read of the day.

Please sign up for the ThreatBrief here.

 

The post Sign Up For ThreatBrief: Daily context on cyber threats to enterprise mission needs appeared first on CTOvision.com.

]]>
https://ctovision.com/2015/05/sign-up-for-threatbrief-daily-context-on-cyber-threats-to-enterprise-mission-needs-3/feed/ 0