enterprisesecuritymag

chief information security officer

Combating Cyber Menaces by Fortifying Cybersecurity
Enterprisesecuritymag >> cioviewpoint

Joey J. Smith, VP & CISO, Schnuck Markets, Inc.

Cybersecurity has become a major concern for companies as hacking events have increasingly run rampant. Despite the constant efforts of companies to meet security standards, these events continue unabated. I’d like to suggest that companies...

It's Time to Take the NYDFS Cybersecurity Regulation Seriously
Enterprisesecuritymag >> cxoinsights

Tom Stamulis, Senior Director, Alvarez & Marsal

It has been six months since the New York Department of Financial Services (NYDFS) released its controversial cybersecurity regulation (23 NYCRR 500) on March 1st. If your organization is considered a Covered Entity affected by the regulation, it...

The Job of Cybersecurity is Presently Addressed as an
Enterprisesecuritymag >> cioviewpoint

Paul Garrin, CIO Partner, Tatum, A Randstad Company

Cybersecurity is an IT voice/data network vertical that keeps some CIO’s awake at night. The history of the office of the CIO has evolved over time. Early on, the CIO ran IT and simply managed the hardware platforms, computers, firewalls,...

Enterprise Security: What Does It Really Mean?
Enterprisesecuritymag >> cioviewpoint

Kevin Powers, Founding Director, Boston College

Whether you’re at a cybersecurity conference, participating in a webinar, or reading an article like this one, you are often bombarded with these catchy sayings regarding enterprise security: “It’s a team sport”;...

Cybersecurity Advice that Organizations Need to Follow
Enterprisesecuritymag >> cioviewpoint

The adoption of sophisticated cybersecurity measures has become inevitable for most organizations today to not just shield their data from external threats but significantly increase returns. Several cybersecurity veterans recently suggested...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >> cxoinsights

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...

Eliminating Passwords: The Journey
Enterprisesecuritymag >> cxoinsights

Bret Arsenault, CVP & CISO, Microsoft

According to one estimate, the average person has 27 online accounts with user names and passwords. Choosing the right password is as confusing as trying to remember dozens of passwords—it should be complex, more than 8 characters long, it...

It's Time to Take the NYDFS Cybersecurity Regulation Seriously
Enterprisesecuritymag >> cxoinsights

Tom Stamulis, Senior Director, Alvarez & Marsal

It has been six months since the New York Department of Financial Services (NYDFS) released its controversial cybersecurity regulation (23 NYCRR 500) on March 1st. If your organization is considered a Covered Entity affected by the regulation, it...

Combating Organizational Financial Risks
Enterprisesecuritymag >> cxoinsights

Cris Luce, CMO/CTO, Accuro AgriServices

The modern world is defined, in large part, by electronic communication and the massive storage and exchange of digital information. While the Internet and other systems allow companies to operate on a global basis and enable geographically...

Security under the Spotlight: Shoring up your Security Program against the Rising Tide of the Breach
Enterprisesecuritymag >> cioviewpoint

Dana Simberkoff, Chief Compliance and Risk Officer, AvePoint

Cybersecurity and the massive, never-ending stories of data breaches have captured headlines around the world—beginning with Edward Snowden and continuing through government agencies, credit card companies, banks, telecommunications, and...

FDA Cybersecurity Defenses and Enhancements within the Threat Landscape
Enterprisesecuritymag >> cxoinsights

Todd Simpson, CIO, FDA

The U.S. Food and Drug Administration (FDA) reliesrely on a strong enterprise security system to help the agency fulfill its global public health mission. In September 2016, the Government Accountability Office (GAO) issued a report, “FDA...

How to Create a Successful Security Culture Program
Enterprisesecuritymag >> csoinsight

Masha Sedova, Senior Director of Trust Engagement, Salesforce

Ask a Chief Information Security Officer (CISO) about their employees’ security habits and a typical answer follows: “I want people to make less security mistakes.” In reality, this is just as much a description of security...

Ongoing Authorization: Changing how Government does Security Compliance
Enterprisesecuritymag >> csoinsight

Jeff Eisensmith, CISO, DHS

The Department of Homeland Security is the steward of a great deal of information. Information used to support the department’s mission, personally identifiable information of the citizens we serve, and that of our employees must be...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> csoinsight

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

Secure Your Cloud
Enterprisesecuritymag >> cioviewpoint

Sherry Ryan, VP & CISO, Juniper Networks

Today, moving to the cloud is a business imperative. Cloud enables the scalable, flexible, and cost-effective solutions that enterprises need. But in the realm of cloud, there is still a great deal of uncertainty and hesitation regarding security....

Is it the Best of Times or the Worst of Times for Information Security?
Enterprisesecuritymag >> csoinsight

Mark Connelly, Chief Information Security Officer, Thomson Reuters

Cyber attacks are in the news every day. The frequent headlines and intense media scrutiny have brought the topic to the forefront of public attention. Could this be the worst of times for information security? Given the reports, it may seem...

IT Security Metrics: Four Pitfalls To Avoid
Enterprisesecuritymag >> cioviewpoint

Tim Ramsay, CISO & AVP, University of Miami

How does a Chief Information Security Officer demonstrate effectiveness? When the opportunity arises, in the elevator or in the boardroom, every CISO must be prepared to answer the question: “How secure are we?” Sometimes this question...

Meeting the Cybersecurity Challenge
Enterprisesecuritymag >> csoinsight

Scott Self, CIO, Tennessee Valley Authority

In an unassuming room anywhere in the world, a shadowy figure faces a computer screen. He isn’t armed with a gun or a bomb, because he doesn’t need one; he is a criminal who does his work with a keyboard and mouse. And if he is able,...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> vendor

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

Loki Labs: Enabling Proactive Security
Enterprisesecuritymag >>

Nick Hnatiw, Co-founder & CEO

Loki labs is led by former NSA security experts with an objective to help companies steer clear of the vulnerabilities in their infrastructure. The company provides vulnerability management solutions that are affordable and effective with the help...