enterprisesecuritymag

cobit

Enterprise Security: What Does it Really Mean?
Enterprisesecuritymag >> cxoinsights

Kevin Powers, Founding Director, Boston College

Whether you’re at a cybersecurity conference, participating in a webinar, or reading an article like this one, you are often bombarded with these catchy sayings regarding enterprise security: “It’s a team sport”;...

How's Your Appetite: Tips for Setting and Measuring One for Organizational Cyber Risk
Enterprisesecuritymag >> cioviewpoint

Jon Murphy, CISO, Ocwen Financial Corporation

Significant business-as-usual interruptions are increasingly occurring due to cyber-attacks. Daily, more organizations are becoming cybersecurity (cybersec) risk apprehensive. Consequently, the demand to manage the risk, establish appetites, and...

Enterprise Architecture: Your Tool for Right-Sizing Security
Enterprisesecuritymag >> cxoinsights

Ted Kieffer, Director Enterprise Architecture, Grainger

I sometimes find it amusing that the same high-level issues we face when addressing security now are the same as when I first started security work almost two decades ago. The tools may have changed. The people may have changed. The methods may...

Enterprise Architecture: Your Tool for Right- Sizing Security
Enterprisesecuritymag >> cxoinsights

Ted Kieffer, Director Enterprise Architecture, Grainger

I sometimes find it amusing that the same high-level issues we face when addressing security now are the same as when I first started security work almost two decades ago. The tools may have changed. The people may have changed. The methods may...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Hyperconnected, Safe and Secure?
Enterprisesecuritymag >> cxoinsights

Phil Agcaoili, SVP & CISO, Elavon

In our now hyper interconnected world, critical lifeline services have been connected to the Internet. These lifeline services affect nearly every part of our lives and impact our economic livelihood, our public health and safety, and our national...

Resources To Meet The Security Challenges
Enterprisesecuritymag >> csoinsight

Jeff Theiler, SVP, CISO, Hancock Bank

For security professionals, or any management professional for that matter, the key to managing limited resources is to focus on the key risks. Sound governance, risk and compliance practices are an effective way to manage limited information...

CyberSaint: A Breakthrough Product and Approach to Cybersecurity
Enterprisesecuritymag >> vendor

George Wrenn, Founder & CEO

CyberSaint is a SaaS solutions provider and an enterprise security startup, which enable continuous improvement of an organization’s cybersecurity posture and manage an effective cyber strategy. The CyberStrong platform manages risk in...