Afidence
In the world of concrete construction, where every detail matters from the foundation up, the same precision applies to scaling an IT department. At Lithko Contracting, TJ Norris, the Director of Technology Transformation, knows this all too well. With nearly $2 billion in revenue and a lean IT team, the stakes are high. But for…
Read MoreIt’s just another day in the office. You’re at your desk sending emails containing confidential information or sharing sensitive files over what you believe to be a secure internet connection. But unless you have data encryption, all that data is as safe as an unsealed letter, vulnerable to interception and prying eyes. In an age…
Read MoreIn the ever-evolving domain of cybersecurity, the blend of experience and innovation stands paramount. Ernie Espinoza, the seasoned Information Security Systems Manager at GE Aerospace, offers a fascinating narrative that encapsulates over two decades of navigating digital threats across the IT and IA landscapes, including pivotal years with the Department of Defense. His journey from…
Read MorePicture it: You’ve just finished dinner with your family. You’re on the couch in your living room, winding down for the evening, when suddenly your phone goes off. It’s an alert from your security team informing you of a data breach. All of your assets are being held for ransom and you have approximately 48…
Read MoreEffectively managing vulnerabilities is a critical component of cybersecurity. It requires continuous attention and various factors involving risk management, asset inventory, budget, time, environmental complexity and automation. The goal of a vulnerability management program is to identify, classify, remediate and maintain mitigations of all vulnerabilities throughout the environment to proactively defend against threats. Developing and…
Read MoreSafeguarding sensitive information against cyber threats has become a top priority for the Department of Defense (DoD). The defense industry is a prime target for cyberattacks, including espionage, data breaches and sabotage from nation-states and various criminal entities. To tackle this challenge head-on, the DoD introduced a groundbreaking initiative known as the Cybersecurity Maturity Model…
Read MoreEmily Morgan’s journey from student worker to the VP of security and chief information security officer (CISO) at Coterie, a company specializing in commercial insurance for small businesses, is a resounding ode to personal and professional growth. Her leadership philosophy, crafted by familial influences, resonates with authenticity, consistency and a profound understanding of the unique…
Read MoreCalling all IT leaders and AI enthusiasts! Are you ready to supercharge your AI journey while keeping security at the forefront? Then mark your calendars for Thursday, February 15th, because Afidence has a virtual event you won’t want to miss. Leveraging Security to Catalyze Your AI Journey is more than just a catchy title –…
Read MoreWhile technology augmentation is becoming an increasingly common strategy for companies looking to enhance their IT capabilities, many IT leaders find hiring to be a time-consuming hassle, especially in today’s labor market. Do you need staff in-house or should you just outsource? Should you even bother to staff up for just a short-term need? Can…
Read MoreFor many businesses today, the ability to adapt and thrive in the face of disruptions is paramount. This is where business continuity planning (BCP) comes into play. A business continuity plan is not just about surviving unexpected events; it’s about ensuring that your organization can thrive despite disruptive incidents. In this blog post, we explore…
Read More