June 27, 2022, 3:13 a.m. | John P. Gormally, SR

Security Boulevard securityboulevard.com


How Information Security Breaks The Classic IT Model
From The Other Side Of The PO Blog: Part 4

CEO: “ Due to complications in the market with unexpected changes in product and customer spending, we are going to announce a 20% in headcount, expenses, and capital projects for the remainder of the year.”


CIO: “Does that include all of my departments and platforms?”


CEO: “Yes, if the demand for our products is dropping, our IT resource spending should be reduced.” …

cybersecurity departments hacking information information security information technology security

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)