Upholding the Principle of Cyber-Awareness
Enterprisesecuritymag >> cxoinsights

Gabor L. Varjas, Group Chief Information Security Officer, MOL Group

MOL Group is an integrated, international oil and gas company, headquartered in Budapest, Hungary. It is active in over 30 countries with a dynamic international workforce of 25,000 people and a track record of more than 100 years in the...

iComply Launches Public Beta to Deliver Legitimacy to Security Token Platforms and Exchanges
Enterprisesecuritymag >> cioviewpoint

VANCOUVER, British Columbia -  iComply Investor Services ("iComply"), a leading global regtech platform for digital finance and cryptocurrencies is announcing the launch of its public beta following the closure of a...

Artificial Intelligence Driven RPA is Taking Businesses to New Heights
Enterprisesecuritymag >> cioviewpoint

Companies across all industries have started to transfer their repetitive job to an automated environment. Industries like banking, healthcare, supply-chains, retail, and many others have already begun to comprehensively use robotic process...

Security Challenges in the era of Digital Transformation
Enterprisesecuritymag >> cioviewpoint

Carlos Sousa, CISO, Affidea

Digital transformation is having a significant impact on technology, from data-driven decision-making, risk management frameworks, cloud adoption, mobility, massive explosion of Internet of Things and the impact goes far beyond of just deploying...

Combating Cyber Menaces by Fortifying Cybersecurity
Enterprisesecuritymag >> cioviewpoint

Joey J. Smith, VP & CISO, Schnuck Markets, Inc.

Cybersecurity has become a major concern for companies as hacking events have increasingly run rampant. Despite the constant efforts of companies to meet security standards, these events continue unabated. I’d like to suggest that companies...

The CIO's Role in Promoting Digital Transformation
Enterprisesecuritymag >> cxoinsights

Thomas Knapp, CIO, Waterstone Mortgage Corporation

All companies in every industry are challenged to define what digital transformation means for their enterprise, and how they will respond and develop strategies for adoption. In the mortgage industry where I operate, it is all about the...

Effective Ways to Fortify Payment Processing
Enterprisesecuritymag >> cxoinsights

With changing trends in the retail landscape, the possibilities of security breaches and data theft are higher than ever before today. While customers are usually unaware of the process to secure their confidential data such as credit card...

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare
Enterprisesecuritymag >> cxoinsights

Louis J. Capponi, MD, FACP, Chief Medical Informatics Officer & Interim CIO, SCL Health

Compared to other industries, healthcare has been late in adopting advances in technology, especially in the strategic management and deployment of data assets. Like many other industries, the business of healthcare is complex. It includes the...

Battlefield Principles for Cybersecurity Leaders
Enterprisesecuritymag >> cxoinsights

Jake Margolis, CISO, Metropolitan Water District of Southern California

Prior to becoming a CISO, I served in the California National Guard and U.S. Army as an Information Assurance professional and Brigade Signal Officer. The lessons and experiences that shaped my career were not learned through technical training or...

The State of Enterprise Security Budgets
Enterprisesecuritymag >> cxoinsights

Data security is one of the biggest concerns of the 21st century as every market decision is driven by analyzing the structured and unstructured data pattern. According to the recent IANS survey, only 22 percent of the companies with annual...

Role of Predictive Analytics in Border Security
Enterprisesecuritymag >> cxoinsights

Border security has been a top priority for most countries since the deadly terror strikes such as 9/11 and 26/11 took the world by storm. The border patrol agencies and the coastguards around the world stay on high alert and assess threats from...

5 Practical Ingredients to Perform CriticalVulnerability Management Testing
Enterprisesecuritymag >> cioviewpoint

Tim Callahan, SVP, Global Chief Security Officer, Aflac

We should all be careful not to overuse the public lessons learned from the Equifax event. There are probably facts that an outsider just doesn’t know, and there likely are deeper root causes that led to their breach. But, we should not...

Manufacturing Inequality
Enterprisesecuritymag >> cxoinsights

Oliver Perez, Ph.D, Director, Manufacturing Process Technology, BD

How do you make an economy and one of its most important drivers i.e. manufacturing, work for everybody in this globalized technological world when the transformation of raw materials into useful, appealing finish goods is constantly reinvented...

Cybersecurity in 2018: Three Trends to Act On
Enterprisesecuritymag >> cxoinsights

Andy Hammond, strategist and evangelist, Vice President Business Development, SSH Communications Security

You know the phrase “Hindsight is 20/20,” but wouldn’t it be handy—particularly in the arena of cybersecurity—to be able to see into the future with greater clarity? Organizations the world over are gearing up for a...

Recovering from a Data Compromise: What should My Business Do Next?
Enterprisesecuritymag >> cxoinsights

Larry Brennan, SVP Merchant Data Security & Cybersecurity Director, Bank of America Merchant Services

From major fast food chains to branches of government— and everything in between— it’s clear cybercriminals don’t discriminate when it comes to breaching businesses’ data defenses. Research confirms there have been...

Thinking outside the Firewall: Evolution at a Glance
Enterprisesecuritymag >>

Johan Hybinette, CISO, Vonage

In the quest to gain a competitive advantage, businesses today are focused on leveraging the information inside their own data warehouses. However, is it illogical to focus exclusively on the security of the data inside the firewall? Sure enough,...

Technology Challenges in the Days of Hyper Competition, Personalization, and Super Hacking
Enterprisesecuritymag >>

Gustaaf Schrils, Sr VP & CIO, White Lodging Services

After 20-plusyears at InterContinental Hotel Group, where I finished as vice president of global service management, I have been fortunate to transition from the hotel brand side of the hospitality industry to the hotel ownership and management...

Surging Need to Strengthen Data Security
Enterprisesecuritymag >>

Sam Masiello, Chief Information Security Officer, TeleTech

The threat landscape continues to evolve on seemingly a minute-by-minute basis. With cyber criminals looking to breach organizations both from the outside-in and from the inside-out, both companies and their employees need to continue raising...

Essential Add-ons for Fast Paced Cyber Threatscape: Enterprise Vulnerability and Threat Management
Enterprisesecuritymag >>

Girish Chiruvolu, Director Information Security and Risk management, Thomson Reuters

In the age of all-pervasive cyber threats, enterprises with limited resources are stuck with the challenge of taking huge risks and finding right resources/ strategies around a formal risk management program. Ashley-Madison's exit from the...

All Identities Matter
Enterprisesecuritymag >>

Daniel Krantz, CEO, Real-Time Technology Group

Clear and Present Insider Threat Now more than ever before, risk managers are faced with increasing physical security threats. Irrespective of the political debates, facility owners and operators are forced to implement changes in their...