Tag Archive for: Managing

Pinnacle Award Finalist John DeSimone: ‘Leading And Managing People Is A Privilege That Is Not To Be Taken Lightly’


John DeSimone, VP, Cybersecurity, Training and Services, Raytheon Intelligence & Space

John DeSimone, Raytheon Intelligence & Space

The finalists for WashingtonExec’s Pinnacle Awards were announced Oct. 8, and we’ll be highlighting some of them until the event takes place virtually Nov. 12.

Next is Cybersecurity Industry Executive of the Year (Public Company) finalist John DeSimone, vice president of Cybersecurity, Training and Services business at Raytheon Intelligence & Space.

What key achievements did you have in 2019/2020? 

A major achievement Raytheon Intelligence & Space earned this year was being named the winner of the “Overall CyberSecurity Company of the Year” award in the Fourth Annual CyberSecurity Breakthrough Awards program.

RI&S’ Cyber, Training and Services product line counteracts rapidly evolving threats around the globe with a customizable and comprehensive suite of solutions that provide advanced protection. The company’s solutions help protect every side of cyber for government agencies, businesses and nations — defending the most critical information, systems and operations with breakthrough solutions.

These solutions include the following: cyber analytics and intelligence services, DevSecOps optimization, cyber physical systems security, data orchestration and resiliency, cyber systems defense and integration, cyber warfare and cyber operations and research.

We also recently launched a new technology, DejaVM, that conducts system-level cyber vulnerability testing without requiring customers to provide access to the limited number of highly specialized physical hardware assets.

Most importantly, we’ve maintained a very high standard of execution excellence for our customers, which has been reflected in positive feedback across the board. I’ve heard from multiple customers that in the face of a global pandemic, “The team has not skipped a beat.”

What are you most proud of having been a part of in your current organization?

I’ve had many moments of pride watching the way our team has supported our customers in today’s most extraordinary work environment. In some cases, we’ve even facilitated government work approvals for employees of other primes supporting the same mission.

At the end of the…

Source…

Why real-time intelligence matters for managing third-party risk

Why real-time intelligence matters for managing third-party risk

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!

As leading companies in every industry today are undergoing digital transformation, the lines are blurring between any one organization and its partners, suppliers, vendors, and other third parties.

In this new report, ESG examines how these business relationships can introduce new risks that need to be identified and managed “as if these third parties were part of the enterprise itself.”

Download your copy now of “Third-Party Risk: Why Real-Time Intelligence Matters”

About Recorded Future

Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open web, and dark web sources and aggregates customer-proprietary data.

Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Graham Cluley

Managing app permissions | How-to guide for Android phones | Avast

  1. Managing app permissions | How-to guide for Android phones | Avast  Security Boulevard
  2. Password managers can be tricked into believing that malicious Android apps are legitimate  ZDNet
  3. Full coverage

android security news – read more

SSH.COM-sponsored Cyber Security Study Recommends Hong Kong Enterprises to Put More Effort into Managing …

  1. SSH.COM-sponsored Cyber Security Study Recommends Hong Kong Enterprises to Put More Effort into Managing …  GlobeNewswire (press release)
  2. Full coverage

computer security news – read more