enterprisesecuritymag

big

Predictive Trends for Blockchain Technology
Enterprisesecuritymag >> cioviewpoint

Blockchain technology has just gained popularity and has found its applications apart from cryptocurrency as well. Immutability, decentralization and cryptographic security are features that have made this technology cherishable among businesses...

Drones are Coming to your Business
Enterprisesecuritymag >> cxoinsights

Tom Basiliere, CIO, Provant Health

Humans have been using machines to perform difficult and dangerous tasks since the beginning of time. Machines controlled by hand evolved to machines that could be operated at a distance and, with the invention of flight and radio, machines that...

How Will Innovation Impact the Practice of Cybersecurity?
Enterprisesecuritymag >> cxoinsights

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

There is a plethora of new and exciting tools and innovation that can be used to support your cybersecurity efforts. Some, like moving to the cloud, will require a change in thinking and posture while others, such as AI, will potentially change...

The Path to Drive Success with MSSP
Enterprisesecuritymag >> cxoinsights

David Stern, CISO, BGC Partners

Managed Security Services Providers (MSSP) have been a very common route for organizations to fill critical gaps in managing and monitoring their security program. An interested shopper can chose from a wide range of providers and capabilities. A...

Attack Surface Analysis - Response to the Information Security Management
Enterprisesecuritymag >> cxoinsights

James Norberg, Security Director, Express Scripts

Please elaborate on the challenges that you have currently observed in the information security landscape. Back in the days when everything was on-premise, understanding the attack surface wasn’t as big of a deal. Now, as we are...

Significance of Cloud Security in Businesses
Enterprisesecuritymag >> cxoinsights

Cloud technology has been under scrutiny by both critics and experts. Cybercrime industry has hindered the adoption of the technology, but experts still believe that it is more secure than any other private communication and IT network linked to...

Data is the Lifeline of Today's Businesses; But Why Are So Many Business Leaders Still Making Guesswork?
Enterprisesecuritymag >> cioviewpoint

Eric Thain, General Manager, HK Express

There is no doubt on the importance of data in today’s businesses. The C-Suite recognizes the need to focus on data and in fact, data and analytics ranks the highest of the top five investment priorities for CEOs today (according to the...

Data is the Lifeline of Today's Businesses; But Why Are So Many Business Leaders Still Making Guesswork?
Enterprisesecuritymag >> cioviewpoint

Eric Thain, General Manager, HK Express

There is no doubt on the importance of data in today’s businesses. The C-Suite recognizes the need to focus on data and in fact, data and analytics ranks the highest of the top five investment priorities for CEOs today (according to the...

Importance of Cyber Hygiene
Enterprisesecuritymag >> cioviewpoint

Darren Death, CISO, ASRC Federal

Cybersecurity took a special place in the 2017 news cycle of as organization after organization fell victim to cyberattacks. It used to be that you would have to break into an organization’s physical building to take their secrets. We now...

Security Challenges in the era of Digital Transformation
Enterprisesecuritymag >> cxoinsights

Carlos Sousa, CISO, Affidea

Digital transformation is having a significant impact on technology, from data-driven decision-making, risk management frameworks, cloud adoption, mobility, massive explosion of Internet of Things and the impact goes far beyond of just deploying...

Surfing the Global Privacy Wave: Creating Competitive Advantage in the Age of Cybersecurity and the Privacy-Aware Consumer
Enterprisesecuritymag >> cxoinsights

David Hartley, Virtual CIO, UHY LLP

Until this point, privacy and cybersecurity have largely remained separate and distinct topics with only minimal overlap. That is about to change in a big way. Cybersecurity professionals must take steps today to prepare for tomorrow’s...

Face as the New Data Point: The Good, Bad and the Ugly of Facial Recognition Technologies
Enterprisesecuritymag >> cioviewpoint

Riku Vassinen, Head of Digital Transformation, JWT Singapore

Although facial recognition technology has been around from 1960´s, it was again Apple who made this technology household name. After the launch of iPhone X, facial recognition opportunities have truly hit the mainstream. Besides locking...

Leading the Technological Wave
Enterprisesecuritymag >> cxoinsights

Denise Dettingmeijer, CFO, Randstad North America

Current Role of a CFO I have always had IT report to me as the Chief Financial Officer (CFO). It was an eye-opening transition for me as CFO of Randstad, when figuring out how to place the business, company and external functions around an IT...

The Digital Transformation Trifecta: Cloud, IoT, and Big Data
Enterprisesecuritymag >> cxoinsights

Joe Topinka, CIO, SnapAV

Staying relevant is proving difficult for many companies as the digital transformation tsunami hits the shores of most businesses. Balancing between the hype and realities of the cloud, IoT, and big data is confusing for C-suite executives....

Information Security and Higher Ed: How one CISO is Able to Leverage an MSSP as Part of a Modern Approach to Managing Risk
Enterprisesecuritymag >> cxoinsights

Matt Nappi, Chief Information Security Officer and AVP, Stony Brook University

As one of only 62 AAU members, the environment at Stony Brook University (SBU) is dynamic and challenging with an ambitious 5-part mission that is clear and concise. This allows me to ensure that every initiative I lead or I am a part of, ties...

Innovate business models with SophiaTX: a revolutionary enterprise blockchain platform pushing adoption in the ASEAN
Enterprisesecuritymag >> cxoinsights

KUALA LUMPUR – A successful enterprise blockchain event dubbed BUSINESS REDEFINED 2018 was held on September 25 at Suntec City, Singapore and September 27 at Connexion, Malaysia, representing the first step in building an ecosystem...

Information Security and Higher Ed: How one CISO is able to leverage an MSSP as part of a modern approach to managing risk
Enterprisesecuritymag >> cxoinsights

Matt Nappi, Chief Information Security Officer and AVP, Stony Brook University

As one of only 62 AAU members, the environment at Stony Brook University (SBU)  is dynamic and challenging with an ambitious 5-part mission that is clear and concise. This allows me to ensure that every initiative I lead or I am a part of,...

Be Proactive-Make Information Security a Priority
Enterprisesecuritymag >>

Donald Good, Director, Global Legal Technology Solutions, Navigant [NYSC:NCI]

The cyber threat has never been more complex or dynamic. Financial institutions, large and small corporations, medical providers, law firms, accounting firms, and government agencies are targeted with increasing frequency by highly skilled...

Big Data That Flies: Data Acquisition With Aerial Drones
Enterprisesecuritymag >>

Robert E. Sinclair, Corporate CAD Technology Manager, Civil & Environmental Consultants

Unmanned Aerial Vehicles (UAVs), or drones, have moved from “cool toy” to “essential workhorse” in the minds of many businesspeople – particularly those in the construction, oil and gas, mining, and aggregate...

Artificial Intelligence and Robotics: Challenges, Implications, and Opportunities for Autonomous Systems in Aerospace and Defense
Enterprisesecuritymag >>

Ravi Ravichandran, Ph.D., Director, BAE Systems Technology Solutions [LSE:BA]

Commercial applications of artificial intelligence and robotics have been developed with decades of investment and are mature technologies either fielded or on a path to be fielded for a variety of applications that include repetitive and precise...