DevOps Automation: the key to Managing Machine Identities
Enterprisesecuritymag >> cxoinsights

Manual managing machine identities can lead to some specific cybersecurity problems. DevOps is perceived to be agile, and it defeats the purpose of agility when the work is manual. The time spent on manual management of machine identities can...

Attack Surface Analysis - Response to the Information Security Management
Enterprisesecuritymag >> cioviewpoint

James Norberg, Security Director, Express Scripts

Please elaborate on the challenges that you have currently observed in the information security landscape. Back in the days when everything was on-premise, understanding the attack surface wasn’t as big of a deal. Now, as we are...

Points to Consider Before Choosing a Managed Security Service Provider (MSSP)
Enterprisesecuritymag >> cioviewpoint

Associating with a Managed Security Service Provider (MSSP) is essential given the frequency and the severity of cyber attacks. Organizations cannot keep up with the sophistication, diversity, and scale on their own. Partnering with an MSSP is...

The CIO's Role in Promoting Digital Transformation
Enterprisesecuritymag >> cxoinsights

Thomas Knapp, CIO, Waterstone Mortgage Corporation

All companies in every industry are challenged to define what digital transformation means for their enterprise, and how they will respond and develop strategies for adoption. In the mortgage industry where I operate, it is all about the...

Information Security is More than Information Technology
Enterprisesecuritymag >> cxoinsights

Nick Coussoule, SVP & CIO, BlueCross BlueShield of Tennessee

Training. Education. Role play. More training. These are the key ingredients of a secure organization, because at its core, information security is about people. Generally they are the weakest link in the security chain, yet they are also the...

Fostering the Culture of 'Security as a Valued Skill' to the Organization
Enterprisesecuritymag >> cioviewpoint

Dr. Andreas Kuehlmann, SVP and General Manager, Synopsys Software Integrity Group

• What do you think are the biggest obstacles that technologists face in working in a more agile and outcomes based model? As organizations transition to a more agile and continuous development model, software security needs to be...

The Arising Need for Shift Left Security
Enterprisesecuritymag >> cxoinsights

The growing culture in organizations to take an agile and DevOps approach to software application development is due to the ever-increasing dependency on software. In order to meet demands for a faster time to market, developers now play an active...

Enterprise Architecture success in the Digital Era
Enterprisesecuritymag >> cioviewpoint

Anthony Hill, Executive Director Business & Enterprise Architecture, Kaiser Permanente

Digital Drivers for EA The onset of the digital era in business is driving sweeping change and adaptation in organizations in all sectors. The next 10 years could be the most compressed and change-inducing in the history of business. The...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >> cioviewpoint

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

Spring into Action! Growing Enterprise Architecture for Business Seasons
Enterprisesecuritymag >> cxoinsights

Martha Tartal, EA, United States Patent and Trademark Office

“Spring is the time of plans and projects.” Leo Tolstoy The sight of cherry blossoms may signify more than an end to cold weather. Depending on your organization’s budget cycle, the season of IT planning may also be in bloom....

Shattering the Top Five Mistruths and Myths about Cloud Security
Enterprisesecuritymag >> cxoinsights

CIOs and CISOs of New Zealand are constantly evaluating on how to keep their data secure; the reason being, numerous high profile data breaches in the past months. Many business organizations are becoming attentive to ensure that they secure and...

Importance of an Identity and Access Management Solution
Enterprisesecuritymag >> cxoinsights

The current IT scenario has made it imperative for every user to access information easily and fast, irrespective of time or location. Consequently, organizations are experiencing the need to provide users seamless access to information....

CIO Hall of Faces
Enterprisesecuritymag >> cxoinsights

Tom Basiliere, CIO, Provant

Among the many kingdoms in the popular “Game of Thrones” series, there is a secluded island that is home to an ancient temple and a clan of assassins. In this temple, there is a special room called the Hall of Faces. Arya, one of the...

Digital Transformation and IT Leadership, Be the Change
Enterprisesecuritymag >> cxoinsights

Mark Thiele, CIO and CSO, Apcera & Chairman, IDCA Technical Committee

If there was ever a time for strong leadership across all lines of business, especially the IT function, now is that time. Many futurists suggest that we’re likely to see more change in the next 10 years than we saw in the previous 300....

Why our Security Problems are Getting Worse...
Enterprisesecuritymag >> cxoinsights

Jeff Schwartz, VP, North America Engineering, Check Point Software Technologies

Security spending is up 8 percent year over year, yet security incidents are up ~40 percent. Why does the security “ball of yarn” continue to unravel as we pull the string. In this article, you will learn why our security problems...

IT Security Enters the Boardroom
Enterprisesecuritymag >>

Bill Bradley, SVP, Cyber Engineering and Technology Services at CenturyLink[NYSE:CTL]

Not too long ago, IT issues such as cybersecurity and data protection were reserved for the back office – and rarely considered by organizations in driving revenue and aligning market strategy. These efforts even ran independent of...

Growing with the Opportunities
Enterprisesecuritymag >>

Prashant Fonseka, Principal, CF

Prashant Fonseka is the Principal at CrunchFund; a tech investor with an entrepreneurial background, who has been establishing businesses, leading organizations, and guiding entrepreneurs for more than a decade. At CrunchFund, he is committed to...

The Cloud- First Approach
Enterprisesecuritymag >>

Arjun Chopra, Partner, Floodgate

Could you give me an overview of the types of opportunities you pursue as a Partner at Floodgate? I believe that the public cloud represents a generational platform shift that has delivered not only the fastest growing enterprise software...

AI is the New UI-AI + UX + DesignOps
Enterprisesecuritymag >>

Amit Bahree, Executive, Global Technology and Innovation, Avanade

Today you cannot read any technology or business article without some discussion around Artificial Intelligence (AI), whether explicit or implicit. We see AI integrating deeper in all elements of our life–be it at home with our families, or...

How to Overcome the Digital Paradox
Enterprisesecuritymag >>

Marty Mrugal, Chief Innovation Officer, SAP North America

The digital economy is accelerating rapidly, yet there is uneven progress as enterprises seek to take advantage of the digital opportunity. In my experience, companies today fall into two categories: those that are surviving, and those that are...