Career news headlines with stories

ACM CareerNews HEADLINES AT A GLANCE: The Fastest-Growing States for Tech Jobs Want a Tech Job? Advice from Mozilla, Reddit, Tumblr and More Big Data Scientists Get 100 Recruiter Emails a Day In Pursuit of Digital Talent Cybersecurity Should Be Professionalized The Useful Trick for Finding a Mentor Outside Your Network Lessons from Jeff Weiner,…


CIPS free ethics exam key to cyberthreats

Increasing ethics training is the answer to cyberthreats with over 90 percent of networks comprised and this happening in minutes when first exposed. Read more: http://www.itworldcanada.com/blog/increasing-ethics-training-is-the-answer-to-cyberthreats/95133#ixzz36W4Ir6vB


June 25 Webcast, "Navigating Cybersecurity and Public Policy: Six Key Issues"

Register TODAY for the next free ACM Webcast: "Navigating Cybersecurity and Public Policy: Six Key Issues," presented on Wednesday, June 25, 2014 at 11 am ET (10 am CT/9 am MT/8 am PT/3 pm GMT) by Dr. Herbert Lin, Chief Scientist, Computer Science and Telecommunications Board, National Research Council, National Academies. (If you'd like to…


Chat on FEAPO, EA, Agile — David Chesebrough, President Association for Enterprise Information, Vice-President National Defense Industrial Association

David E. Chesebrough, P.E., President of the Association for Enterprise Information and Vice-President, National Defense Industrial Association Dave is President of the Association for Enterprise Information (AFEI), a part of the National Defense Industrial Association (NDIA). He leads the Association in fostering trusted collaboration between industry members and Federal government agencies on issues dealing with…


What are the highly damaging internet legal liabilities and risks to you -- chat with Martin Kratz QC, head intellectual property practice group, Bennett Jones LLP, legendary IP and ICT legal authority and pioneer

My chat with Martin was a real eye opener – there is a tremendous amount of legal risk to you when using the Internet and ignorance does not protect you! Martin Kratz leads the intellectual property practice and co-leads the ecommerce practice for Bennett Jones. His practice is focused around intellectual property and technology law,…


Chat with Shafi Goldwasser ACM Turing Award recipient in 2013 (Nobel Prize of Computing); World-renowned distinguished researcher and professor MIT and Weismann Institute

Professors Shafi Goldwasser (r) and Silvio Micali (l) Turing Award Recipients in 2013. Photo by Jason Dorfman, CSAIL/MIT Shafi Goldwasser is the RSA Professor of Electrical Engineering and Computer Science at MIT, and Principal Investigator at the MIT Computer Science and Artificial Intelligence Lab (CSAIL), as well as a professor of Computer Science and Applied…


Chat with Silvio Micali ACM Turing Award recipient in 2013 (Nobel Prize of Computing); World-renowned distinguished researcher and professor MIT

Professors Silvio Micali (l) and Shafi Goldwasser (r) Turing Award Recipients in 2013. Photo by Jason Dorfman, CSAIL/MIT Silvio Micali, the Ford Professor of Engineering at MIT and a Principal Investigator at the MIT Computer Science and Artificial Intelligence Lab (CSAIL), is a recipient of the Gödel Prize from ACM SIGACT and EATCS. A Fellow…


Dave Roath: Leader PwC U.S. IT Risk & Security Assurance Practice

Dave is a Risk Assurance Partner that leads the PwC U.S. IT Risk & Security Assurance practice. He resides in New York, NY. Dave has more than 20 years of experience in Business Process and IT risk, IT security, IT audit and compliance/regulatory readiness. Dave has a strong background in delivering IT Risk Management and…


April 12 Webinar: "Security: Computing in an Adversarial Environment"

Register NOW for ACM’s second-ever, free learning webinar, presented on Thursday, April 12, 2012 at 2 PM EST! Space is limited. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or…