enterprisesecuritymag

accounting

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, CIO, WSSC

As consumers and recipients of services from utilities, our least favorite thing about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

iComply Launches Public Beta to Deliver Legitimacy to Security Token Platforms and Exchanges
Enterprisesecuritymag >> cioviewpoint

VANCOUVER, British Columbia -  iComply Investor Services ("iComply"), a leading global regtech platform for digital finance and cryptocurrencies is announcing the launch of its public beta following the closure of a...

The Impact of the Cloud on Information Security
Enterprisesecuritymag >> cxoinsights

Vennard Wright, Chief Information Officer, WSSC (Washington Suburban Sanitary Commission)

As a CIO for the Wash­ington Suburban Sanitary Commission (WSSC), which is a 100-year-old public wa­ter utility serving 1.8 million customers in Maryland, across 475,000 accounts, I’ve realized the challenge of balancing evolving...

Leading the Technological Wave
Enterprisesecuritymag >> cxoinsights

Denise Dettingmeijer, CFO, Randstad North America

Current Role of a CFO I have always had IT report to me as the Chief Financial Officer (CFO). It was an eye-opening transition for me as CFO of Randstad, when figuring out how to place the business, company and external functions around an IT...

Be Proactive-Make Information Security a Priority
Enterprisesecuritymag >> cxoinsights

Donald Good, Director, Global Legal Technology Solutions, Navigant [NYSC:NCI]

The cyber threat has never been more complex or dynamic. Financial institutions, large and small corporations, medical providers, law firms, accounting firms, and government agencies are targeted with increasing frequency by highly skilled...

Fighting Financial Crime with Forensic Technologies
Enterprisesecuritymag >> cioviewpoint

Technology plays a significant role in detecting fraud cases in organizations and decreasing the cost of financial crime compliance and investigations. With this, digital forensics has gone to the fore as controllers, market players and...

Artificial Intelligence Against Online Financial Fraud
Enterprisesecuritymag >> cxoinsights

Nicolas Miailhe, Co-Founder & President, The Future Society

Cybercrime and online financial fraud increased sharply between 2016 and 2018, with a total loss exceeding $3 billion in 2016 for fake president frauds, wire transfer scams and fake suppliers alone. The number of attacks carried out by sending a...

ArkTree, SophiaTX Forge Strategic Alliance To Expand Digital Reach In South Africa
Enterprisesecuritymag >> cioviewpoint

Switzerland: South Africa’s blockchain landscape is set to benefit from an exclusive partnership between SophiaTX (a leading Swiss-based blockchain company) and ArkTree (an emerging South African tech company).  As SophiaTX’s...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >> cioviewpoint

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...

How Technology is Transforming Accounting and Auditing
Enterprisesecuritymag >> cxoinsights

Erik Asgeirsson, President and CEO of CPA.com, the technology subsidiary of the American Institute of CPAs

If you believe some pundits, technology represents a threat to accountants and auditors. Machines, the thinking goes, will be able to do sophisticated compliance work and the kind of in-depth analysis that only humans can offer now. We see it...

Information Security: Your People, Your First Line of Defense
Enterprisesecuritymag >> cxoinsights

Eddie Borrero, CISO, Robert Half [NYSE:RHI]

A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, CIO, WSSC (Washington Suburban Sanitary Commission)

As consumers and recipients of services from utilities, our least favorite things about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Financial Leadership through Technology
Enterprisesecuritymag >> cxoinsights

Mike Bailey, CPA, Director of Information Technology, City of Redmond, WA

  Upon arriving at the City of Redmond in 2008 one of the first concerns expressed by our management team was the need to update our financial systems. The systems being used were implemented some time ago and done so in a way that did...

Thinking outside the Firewall: Evolution at a Glance
Enterprisesecuritymag >> cxoinsights

Johan Hybinette, CISO, Vonage

In the quest to gain a competitive advantage, businesses today are focused on leveraging the information inside their own data warehouses. However, is it illogical to focus exclusively on the security of the data inside the firewall? Sure enough,...

How to Curb Security Threats
Enterprisesecuritymag >> vendor

Jason Worley, CIO, Adeptus Health's First Choice Emergency Room

Cyber-security Threats in a High-growth Environment Due to our high-growth healthcare environment, we face pronounced cyber-security challenges. We have grown from about 500 users to over 5,000 users in less than 36 months. During that process,...

The Major Security Threat CIOs Largely Ignore
Enterprisesecuritymag >> vendor

Dennis Amorosano, VP, BISG Marketing & CIIS Professional Services, Canon

From embracing BYOD policies to conferencing technology that allows colleagues and clients to collaborate from anywhere in the world, the workplace as we know it today has undergone tremendous change over the past decade. CIOs and other IT...

The Major Security Threat CIOs Largely Ignore
Enterprisesecuritymag >>

Dennis Amorosano, VP, BISG Marketing & CIIS Professional Services, Canon

From embracing BYOD policies to conferencing technology that allows colleagues and clients to collaborate from anywhere in the world, the workplace as we know it today has undergone tremendous change over the past decade. CIOs and other IT...

AIP Risk Consulting: Designing Resilience and Reliability
Enterprisesecuritymag >>

Isaach Choong, Managing Director

Offers global security and risk consulting services to assist clients develop resilience to security risk and business risk

iControl: Making B2B Payments Simple
Enterprisesecuritymag >>

Tal J. Zlotnitsky, President & CEO

Bringing retailers and suppliers together to achieve more transparent partnerships and promote better collaboration through innovative payment and supply chain