enterprisesecuritymag

cfo

Leading the Technological Wave
Enterprisesecuritymag >> cxoinsights

Denise Dettingmeijer, CFO, Randstad North America

Current Role of a CFO I have always had IT report to me as the Chief Financial Officer (CFO). It was an eye-opening transition for me as CFO of Randstad, when figuring out how to place the business, company and external functions around an IT...

Rethinking E-mail Security
Enterprisesecuritymag >> cxoinsights

Karthik Devarajan, Director of IT, Maryland Legal Aid

E-mail is still the top choice for workplace communication in both big and small organizations, with an average office worker sending and receiving 121 e-mails per day (Smith, 2018). Therefore, it is not a surprise that e-mail remains the most...

How Technology is Transforming Accounting and Auditing
Enterprisesecuritymag >> cxoinsights

Erik Asgeirsson, President and CEO of CPA.com, the technology subsidiary of the American Institute of CPAs

If you believe some pundits, technology represents a threat to accountants and auditors. Machines, the thinking goes, will be able to do sophisticated compliance work and the kind of in-depth analysis that only humans can offer now. We see it...

Taking the Offensive Stance to Reflect Threats
Enterprisesecuritymag >> cioviewpoint

Bill Donohue, CIO, GI-Logic, Inc.

As a young lieutenant in the Marine Corps. I was surprised at the amount of time we spent learning offensive tactics versus defensive tactics. Through my training and experience I learned that my best approach to defense was an offensive mindset....

Top three Lessons for the Modern CIO
Enterprisesecuritymag >> cioviewpoint

Ryan Fay, Global CIO, ACI Specialty Benefits

People often ask, “What exactly is the role of the Modern CIO?” What used to be a role solely focused on IT infrastructure has completely transformed into a dynamic business leader responsible for connecting technology to revenue...

Taking the Offensive Stance to Reflect Threats
Enterprisesecuritymag >> cioviewpoint

Bill Donohue, CIO, GI-Logic, Inc.

As a young lieutenant in the Marine Corps. I was surprised at the amount of time we spent learning offensive tactics versus defensive tactics. Through my training and experience I learned that my best approach to defense was an offensive mindset....

Sensitive Data Protection Processes-A Key to IT Security
Enterprisesecuritymag >> cxoinsights

Randy Marchany, CISO, Virginia Tech IT Security Office

One of the common mistakes organizations make is to focus on the technologies rather than protecting the organization’s sensitive data. Certainly, protecting devices is a necessary task but it’s the data that counts. There are no...

Data Security across the Enterprise
Enterprisesecuritymag >> cioviewpoint

Kas Nader, CIO & SVP of Global Technology, Atlanticus Holding

Paradigm Shift in Data Security Over the past five years, great strides have been made toward managing cost and availability. Virtualization, On Demand Computing, and Software as a Service are great examples of the progress that has been...

CyberArk: Laser-Focused on Privileged Accounts Security
Enterprisesecuritymag >> vendor

Udi Mokady, Founder, Chairman and CEO

CyberArk is a company that focuses on striking down cyber threats which find their way inside to attack the core of an enterprise and provide the necessary threat management solutions. They are dedicated to preventing and stopping an attack before...