CUSTOM LICENSE PLATE AUCTION!
Have you ever wanted a custom license plate with the word Broncos, 5280, or Golfer? If so, now's your chance. Participate in a live auction on Wednesday, January 28, 2015 from 6:00 to 8:00 pm to bid on these and other unique license plates. Click here to learn more about the event!
OIT / CTA Government in Technology Forum
Security in a Risky World
Tuesday, December 9, 2014
In the modern technology environment the role of the CISO is constantly changing and adapting. With each headline-making data breach, CISOs are scrambling to evaluate the state of their organization’s security, while also overseeing IT and security teams’ efforts to stay ahead of and thwart attacks. This session will focus on current Security Risks and the role of the Chief Information Security Officer (CISO) in this volatile landscape.
About the Speakers
Jonathan Trull, Chief Information Security Officer at Qualys
Jonathan is a Cyber Security Executive and Researcher focused on delivering cost-effective information security for businesses and governments. He is the former Chief Information Security Officer for the State of Colorado where he oversaw information security operations for 17 departments, 26,000 employees, and 150,000 systems. In cooperation with federal and state partners, Jonathan formed the State’s first Cyber Crime Task Force, conducting criminal investigations into computer crimes, developing cyber intelligence, and working with local government and private sector partners to increase cyber resiliency.
Daniel Teyf, Applications & Database Security Architect at the Colorado Governor’s Office of Information Technology (OIT)
Daniel is a Certified Information Systems Security Professional. He is currently acting as a Lead Applications and Database Security Architect and has worked with classified systems across federal and state executive agencies. Daniel’s broad experience is defined by his demonstrated ability to manage and design for an intrusion-resilient and forensic-ready security landscape through technology, policy and procedure, education, risk, threat and vulnerability management.
To register and for other information visit:http://www.coloradotechnology.org/events/event_details.asp?id=517541&group=
Instructions on how to participate remotely and connect to the forum can be found in the instructions on the registration page
Contact Lizz McGehee at firstname.lastname@example.org