CTOs on the Move

California Department of Technology

www.cdt.ca.gov

 
The California Department of Technology (CDT) is the guardian of public data and a leader in information technology (IT) services for government entities throughout the State. CDT has broad responsibility and authority over all aspects of technology in California state government, including policy formation, interagency coordination, IT project oversight, information security, technology service delivery, and advocacy. As the home of the State Data Center, we provide IT infrastructure services to our customers for their public-facing and mission-critical systems, and offer a myriad of cloud and on-premise services. We also employ a strategic focus on innovation, enterprise, and workforce development solutions. ...
  • Number of Employees: 250-1000
  • Annual Revenue: $10-50 Million
  • www.cdt.ca.gov
  • 1325 J Street Suite 1600
    Sacramento, CA USA 95814
  • Phone: 916.319.9223

Executives

Name Title Contact Details
Chaeny Emanavin
Deputy State Chief Technology Officer Profile
Jonathan Porat
State Chief Technology Innovation Officer Profile
Suzie Changus
State Chief Technology Officer Profile
Jeffrey Barrett
Chief Digital Transformation and Stabilization Profile
Russell Nichols
Chief Deputy Director and Deputy State Chief Information Officer Profile

Similar Companies

GreenQloud

Greenqloud is a key player in the global IT industry with QStack™, its cloud software solution. Greenqloud was founded in 2010 and is privately funded. The company has won several Icelandic government grants, such as the technology grant from Rannis (The Icelandic Centre for Research) and the IMPRA grant from Nýsköpunarmiðstöð Íslands (Innovation Center Iceland). Greenqloud has been lauded by the industry and media for its easy-to-use cloud infrastructure software solutions and commitment to sustainability. Advania and Verne Global serve as primary data center locations for GreenQloud in Iceland.

Fsp Group Usa

Fsp Group Usa Corp. is a Chino, CA-based company in the Computers and Electronics sector.

Ultralevel

Ultralevel, Inc. is a Detroit, MI-based company in the Computers and Electronics sector.

Network Services Plus (NSPI)

Network Services Plus (NSPI) is a Roswell, GA-based company in the Computers and Electronics sector.

Halock Security Labs

HALOCK is a U.S.-based information security consultancy that is privately owned and operated out of its headquarters in Schaumburg, IL since 1996. From mid-sized to the Fortune 100, HALOCK`s clients span many industries including financial services, healthcare, legal, education, energy, SaaS/cloud, enterprise retail, and more. HALOCK is your security partner, providing both strategic and technical security offerings by combining strong thought leadership, diagnostic capabilities, and deep technical expertise with a proven ability to get things done. HALOCK helps clients prioritize and optimize their security investments by applying just the right amount of security to protect critical business assets while satisfying compliance requirements and corporate goals. HALOCK Security Labs and CIS (Center for Internet Security) have co-developed the CIS Risk Assessment Method (RAM) to help organizations find their balance between security and business while evaluating and implementing the CIS Controls. CIS RAM helps organizations define their acceptable level of risk, and determine whether their use of the CIS Controls is risk-appropriate. This method is the first to be based on the Duty of Care Risk Analysis Standard (DoCRA) to help organizations evaluate cyber risk in a way that is clear to legal authorities, regulators, executives, lay people, and security practitioners. DoCRA establishes reasonable security. CIS RAM is an information security risk assessment method that helps organizations design and evaluate their implementation of the CIS Controls. CIS RAM provides instructions, examples, templates, and exercises for conducting risk assessments. And because CIS RAM is based on the DoCRA Standard, its risk assessments meet the requirements of established information security risk assessment standards and demonstrate whether safeguards are `reasonable` and `appropriate` as regulators and judges often require.