CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Julian Zottl
Chief Technology Officer, Cyber Protection Solutions at Raytheon Technologies
Julian Zottl is the Chief Technology Officer for Raytheon Cyber Protection Solutions within Raytheon Technologies Intelligence and Space (RIS) business. He is also Cyber and Information Operations Subject Matter Expert (SME) and Cyber Architect on multiple projects. Julian has over 28 years in Cyber Engineering. During his tenure at Raytheon, Julian has been awarded multiple patents for Cyber Security and Information Operations (IO). These patents cover technologies from malware lab isolation to Internet communication monitoring. Additionally, he has multiple patents filed that are awaiting award. Recently, he finished the accredited Raytheon Certified Architect Program and is working on his final project. He will also be starting his Doctorate in Cyber Security in 2021.


Mixed race students sitting at table with books and laptop showing cyber education
Cyber SecurityNews

An Expanded Outlook – Ongoing Involvement & Necessary Lessons in Cyber Education

November 1, 2021
If organizations want to effectively combat the ongoing skills gap war in the cybersecurity field, as well as properly prepare against the next new cyber threat, they will need to become creative in how they become involved with the education of the next generations of cyber professionals.
Read More

Latest

Shield Icon against data and network showing zero trust and attack surface

Gartner: Slow Adoption and Expanding Attack Surface; Zero Trust Will Not Stop Over 50% Of Attacks by 2026

Hands holding smartphone using Google Fi service showing T-Mobile data breach

T-Mobile Data Breach Includes Massive Compromise of Google Fi Service, Unknown Quantity of Customer Records Exposed

Data Privacy’s Tipping Point: Where We Go From Here

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results