The value of breach response services in cyber covers
Enterprisesecuritymag >> cxoinsights

Joel Pridmore, Head of Financial Lines and Business Development, Asia Pacific at Munich Re Syndicate

Would you know what to do in the event your organization suffered a data breach? While many CIO’s, CISO’s and even CRO’s may think they have the tools and expertise to handle what is today’s most serious threat to any...

A Strategic Approach to Enterprise- Wide Risk Management
Enterprisesecuritymag >> cxoinsights

Edward Marchewka, Director, Information and Technology, Gift of Hope Organ & Tissue Donor Network

Please elaborate on the challenges that the organizations face in addressing concerns related to information security. One of the fundamental challenges is having the right resources in order to secure their environment adequately. Today,...

You Want to Do What With your Data?
Enterprisesecuritymag >> cxoinsights

Andrew Sohn, SVP - Global Digital and Analytics Srvcs, Crawford & Company

Any business that’s over a few months old has a lot of data. Businesses that are several years old have tons of data. Large, established businesses and digital native companies are drowning in data, and are having a hard time just figuring...

The Impact of the Cloud on Information Security
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, Chief Information Officer, WSSC (Washington Suburban Sanitary Commission)

As a CIO for the Wash­ington Suburban Sanitary Commission (WSSC), which is a 100-year-old public wa­ter utility serving 1.8 million customers in Maryland, across 475,000 accounts, I’ve realized the challenge of balancing evolving...

De-Mystifying Cyber Insurance
Enterprisesecuritymag >> cxoinsights

Jeffrey Batt, Vice President, Marsh

De-Mystifying Cyber Insurance In our increasingly automated and digitally-reliant economy, cyber insurance is a necessary tool to mitigate the financial impact of a data breach or other damaging cyber events. Year over year, more companies are...

Surfing the Global Privacy Wave: Creating Competitive Advantage in the Age of Cybersecurity and the Privacy-Aware Consumer
Enterprisesecuritymag >> cioviewpoint

David Hartley, Virtual CIO, UHY LLP

Until this point, privacy and cybersecurity have largely remained separate and distinct topics with only minimal overlap. That is about to change in a big way. Cybersecurity professionals must take steps today to prepare for tomorrow’s...

The Job of Cybersecurity is Presently Addressed as an
Enterprisesecuritymag >> cioviewpoint

Paul Garrin, CIO Partner, Tatum, A Randstad Company

Cybersecurity is an IT voice/data network vertical that keeps some CIO’s awake at night. The history of the office of the CIO has evolved over time. Early on, the CIO ran IT and simply managed the hardware platforms, computers, firewalls,...

The CIO's Role in Promoting Digital Transformation
Enterprisesecuritymag >> cioviewpoint

Thomas Knapp, CIO, Waterstone Mortgage Corporation

All companies in every industry are challenged to define what digital transformation means for their enterprise, and how they will respond and develop strategies for adoption. In the mortgage industry where I operate, it is all about the...

Leading the Technological Wave
Enterprisesecuritymag >> cxoinsights

Denise Dettingmeijer, CFO, Randstad North America

Current Role of a CFO I have always had IT report to me as the Chief Financial Officer (CFO). It was an eye-opening transition for me as CFO of Randstad, when figuring out how to place the business, company and external functions around an IT...

The Digital Transformation Trifecta: Cloud, IoT, and Big Data
Enterprisesecuritymag >> cioviewpoint

Joe Topinka, CIO, SnapAV

Staying relevant is proving difficult for many companies as the digital transformation tsunami hits the shores of most businesses. Balancing between the hype and realities of the cloud, IoT, and big data is confusing for C-suite executives....

No More Snake Oil: Shifting the Information Security Mentality
Enterprisesecuritymag >> cxoinsights

Jeremiah Grossman, Interim CEO, WhiteHat Security

When was the last time you made a major purchase without some type of guarantee? Whether that guarantee was for the quality of the product or the comfort of a return policy, chances are good you were probably more inclined to trust the vendor who...

The Power of Technology for Non-Profit Organizations
Enterprisesecuritymag >> cioviewpoint

Gail Hyde, VP-IT & CIO, Habitat for Humanity International

At Habitat for Humanity International, technology plays a large role in our efforts to help people build strength, stability and independence through shelter and transform communities around the world. Any nonprofit international nonprofits in...

The Digital Vision
Enterprisesecuritymag >> cioviewpoint

Cynthia Johnson, CIO, California Resources Corporation

The digital oilfield vision includes many use cases of technology. Advancements for the oilfield are keeping up and maybe outpacing Moore’s Law which suggests technology capability doubles every two years. However, the application of...

Leveraging AI and Machine Learning for Endpoint Security
Enterprisesecuritymag >> cioviewpoint

Endpoint security continues to be a key challenge for enterprises. Earlier, just installing antivirus across a network would provide a reasonable level of endpoint protection. But that isn’t sufficient today. With the availability of a wide...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >> cxoinsights

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

SophiaTX Launches Enterprise-Ready Public Blockchain
Enterprisesecuritymag >> cioviewpoint

Switzerland – SophiaTX successfully launched its mainnet with the primary purpose of creating a public blockchain with features and capabilities suitable for enterprise use.  With its fast and secure...

Data is King! But are you treating it as one?
Enterprisesecuritymag >> cxoinsights

Madhu Maganti, Director-IT Assurance & Security Services, Doeren Mayhew

Evolution of Data Everyone and their big brother (no pun intended) is talking about data and more specifically, Big Data. Big Data is a technology buzzword that describes the current ecosystem in which there is significantly more data, and...

Creating a
Enterprisesecuritymag >> cioviewpoint

Thomas Skill, Associate Provost & CIO, University of Dayton

Let’s face it, cybersecurity isn’t going to get any easier in 2018. As long as there is a financial or geo-political incentive, the threats will keep coming and the level of exploit sophistication will keep rising. Winning this battle...

Battlefield Principles for Cybersecurity Leaders
Enterprisesecuritymag >>

Jake Margolis, CISO, Metropolitan Water District of Southern California

Prior to becoming a CISO, I served in the California National Guard and U.S. Army as an Information Assurance professional and Brigade Signal Officer. The lessons and experiences that shaped my career were not learned through technical training or...

CIO Hall of Faces
Enterprisesecuritymag >>

Tom Basiliere, CIO, Provant

Among the many kingdoms in the popular “Game of Thrones” series, there is a secluded island that is home to an ancient temple and a clan of assassins. In this temple, there is a special room called the Hall of Faces. Arya, one of the...