enterprisesecuritymag

What We Should Be Learning and Doing Based On Today's Data Breaches

What We Should Be Learning and Doing Based On Today's Data Breaches

Deborah Blyth, CISO, Colorado Governor's Office of Information Technology

The Great CIO Myth

The Great CIO Myth

David Tamayo, CIO, DCS Corporation

With an Aim to Optimize Telematics Security

With an Aim to Optimize Telematics Security

Kevin Baltes, CISSP Director & CISO – Product Cyber security, General Motors

Enterprise Architecture: Your Tool for Right- Sizing Security

Enterprise Architecture: Your Tool for Right- Sizing Security

Ted Kieffer, Director Enterprise Architecture, Grainger

For DDoS-Hope is NOT a Strategy!

For DDoS-Hope is NOT a Strategy!

Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

Seven security priorities for 2017

Seven security priorities for 2017

Jeff Harris, VP of security solutions, Ixia

Mobilizing Quality

Mobilizing Quality

James Pastor, VP of Quality, Adient

Taking the Offensive Stance to Reflect Threats

Taking the Offensive Stance to Reflect Threats

Bill Donohue, CIO, GI-Logic, Inc.