Remove Evaluation Remove Magazine Remove Product Management
article thumbnail

Learning from Log4j: How to Keep Government Applications Secure (E127)

FedInsider

He has led and executed a wide variety of computer security reviews to evaluate the adequacy of information systems general and application controls. Close Chief Security Officer, Delaware Dept. He understands tracking and making sense of systems and data that has grown beyond human ability.