enterprisesecuritymag

IoT and its Acceptance

IoT and its Acceptance

Evan Bowers, CIO, HealthTronics

Creating a Culture for IT Innovation

Creating a Culture for IT Innovation

Steve Rice, CIO, Transportation Security Administration (TSA)

Taking the Offensive Stance to Reflect Threats

Taking the Offensive Stance to Reflect Threats

Bill Donohue, CIO, GI-Logic, Inc.

No Ordinary Leadership Training

No Ordinary Leadership Training

Christian Anschuetz, SVP, CIO and Director-Board of Directors for ProjectRELO, UL

Protecting Legacy and Next-Gen Networks

Protecting Legacy and Next-Gen Networks

Brad Boston, President & CEO, NetNumber

Security is Only as Good as Your Weakest Link

Security is Only as Good as Your Weakest Link

Sam Schoelen, CIO/ CTO /CSO, Continental Resources

Hit the Reset button, not the Panic button

Hit the Reset button, not the Panic button

Lakshmi Hanspal, VP-Security, Privacy & Governance (CISO), SAP Ariba

Establishing a Best-in-Class Global Security Infrastructure

Establishing a Best-in-Class Global Security Infrastructure

Tim Callahan, SVP, Global Security, and Global Chief Security Officer (CISO), Aflac

Sensitive Data Protection Processes-A Key to IT Security

Sensitive Data Protection Processes-A Key to IT Security

Randy Marchany, CISO, Virginia Tech IT Security Office