enterprisesecuritymag

Seven security priorities for 2017

Seven security priorities for 2017

Jeff Harris, VP of security solutions, Ixia

Taking the Offensive Stance to Reflect Threats

Taking the Offensive Stance to Reflect Threats

Bill Donohue, CIO, GI-Logic, Inc.

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Louis J. Capponi, MD, FACP, Chief Medical Informatics Officer & Interim CIO, SCL Health

Security in the Age of IoT

Security in the Age of IoT

Delano Collins, CIO, EDTS, LLC

Business Goals for Implementing a Vulnerability Management Solution

Business Goals for Implementing a Vulnerability Management Solution

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

Four Reasons Why You Need a Third-Party Security Assessment

Four Reasons Why You Need a Third-Party Security Assessment

Jeff Cann, CIO, Encore Electric, Inc.

Scaling a Security Program with MSSPs

Scaling a Security Program with MSSPs

Jeffrey W. Brown, CISO, Life & Retirement, AIG

The Way toward a Diligent Security Environment

The Way toward a Diligent Security Environment

Michael Makstman, CISO, City and County of San Francisco