Stephen Walker focuses on key Governance, Risk management, and Compliance (GRC) issues in the market as well as Managed Services and Outsourcing within Aberdeen's Technology Markets group. Stephen holds a B.A. in Economics and Business with a Concentration in Financial Management from the Virginia Military Institute and received his Juris Doctor (JD) from the West Virginia University College of Law.
Survey Results - banking technology executives reveal their institution's application security priorities heading into 2009
In a down economy application security is both a necessity and a competitive differentiator. Yet in a recent BankInfoSecurity.com survey, respondents showed that they had no reason for...
Jennifer Bayuk is an independent consultant on topics of information confidentiality, integrity, and availability. She is engaged in a wide variety of industries with projects ranging from oversight policy and metrics to technical architecture and requirements. Jennifer has a wide variety of experience in virtually every aspect of the Information Security. She was a Chief Information Security Officer, a Security Architect, a Manager of Information Systems Internal Audit, a Big 4 Security Principal Consultant and Auditor, and a Security Software Engineer. Jennifer frequently publishes on information security and audit topics. Jennifer has lectured for organizations that include ISACA, NIST, and CSI. She is certified in Information Systems Audit (CISA), Information Security Management (CISM), Information Systems Security (CISSP), and IT Governance (CGEIT). She has Masters Degrees in Computer Science and Philosophy.
Stephen Walker focuses on key Governance, Risk management, and Compliance (GRC) issues in the market as well as Managed Services and Outsourcing within Aberdeen's Technology Markets group. Stephen holds a B.A. in Economics and Business with a Concentration in Financial Management from the Virginia Military Institute and received his Juris Doctor (JD) from the West Virginia University College of Law.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.