Questions for the Upcoming 2013 Security Priorities Tweet Jam – Dec. 11

Last week, we announced our upcoming tweet jam on Tuesday, December 11 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the topic of IT security and what is in store for 2013. The discussion will be moderated by Elinor Mills, former CNET security reporter, and our panel of experts will include…

2013 Security Priorities – Tweet Jam

2012 was a big year for security. Congress debated cybersecurity legislation ; social networking site LinkedIn was faulted for one of the largest security breaches in history; and global cyber espionage was a trending topic. On Tuesday, December 11, The Open Group will host a tweet jam examining the topic of IT security and what is in store for 2013.

Viewpoint: Technology Supply Chain Security – Becoming a Trust-Worthy Provider

Increasingly, the critical systems of the planet — telecommunications, banking, energy and others — depend on and benefit from the intelligence and interconnectedness enabled by existing and emerging technologies. Whether these systems are trusted by the societies they serve depends in part on whether the technologies incorporated into them are fit for the purpose they are intended to serve.

1 2