enterprisesecuritymag

cyber security

The ever-changing cybersecurity strategy - how to get it right?
Enterprisesecuritymag >> cxoinsights

Nilesh Jain, Vice President of SEA and India, Trend Micro

The cybersecurity landscape is closely interwoven with the ever-changing tech landscape. Advancements in technology must be equally reflected in cybersecurity. With increased adoption of cloud technologies, IoT, and connected systems, just to name...

Upholding the Principle of Cyber-Awareness
Enterprisesecuritymag >> cxoinsights

Gabor L. Varjas, Group Chief Information Security Officer, MOL Group

MOL Group is an integrated, international oil and gas company, headquartered in Budapest, Hungary. It is active in over 30 countries with a dynamic international workforce of 25,000 people and a track record of more than 100 years in the...

The value of breach response services in cyber covers
Enterprisesecuritymag >> cxoinsights

Joel Pridmore, Head of Financial Lines and Business Development, Asia Pacific at Munich Re Syndicate

Would you know what to do in the event your organization suffered a data breach? While many CIO’s, CISO’s and even CRO’s may think they have the tools and expertise to handle what is today’s most serious threat to any...

Protecting the Castle: Business' changing security landscapes
Enterprisesecuritymag >> cioviewpoint

Vincent J. Simonowicz, CIO, City of Rock Hill, SC

The challenge every business and enterprise has, is to protect their domains given the changing environments, enhanced security threats and melding of cloud services. As we are pushed to embrace the cloud services and applications, our data is...

BYOD: How to Safeguard Your Company's Data with Policies and Procedures That Address Visual Security Threats
Enterprisesecuritymag >> cxoinsights

Rebecca Herold, President of SIMBUS LLC, CEO of the Privacy Professor and 3M Privacy Consultant

The devices used for personal and work-related tasks are completely intertwined today, as employees often prefer the simplicity and flexibility of using what they already own, and businesses view this as a way to obtain increased productivity from...

The Guardian of Electric Utilities
Enterprisesecuritymag >> cxoinsights

Bill Lawrence, NERC Vice President, Chief Security Officer, and Director of the Electricity Information Sharing and Analysis Center

The Electricity Information Sharing and Analysis Center (E-ISAC), run by the North American Electric Reliability Corporation,is using twokey tools to reduce cyber and physical security risk to the enterprise systems of electric utilities. The...

Scope of Artificial intelligence in Cyber Security
Enterprisesecuritymag >> cioviewpoint

Security is a key component for all organizations around the world and has its various types. Cybersecurity is one of the essential security, organizations invest hefty to secure their data and terminate security breaches. Not just private,...

Enterprises Beef Up Cybersecurity to Quash Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

Technology has reached the remotest locations in recent years. The Internet has opened new horizons and a sea of opportunities for businesses all over the world. Enterprises can now connect with their customers more effectively. A huge pipeline of...

Importance of Cyber Hygiene
Enterprisesecuritymag >> cioviewpoint

Darren Death, CISO, ASRC Federal

Cybersecurity took a special place in the 2017 news cycle of as organization after organization fell victim to cyberattacks. It used to be that you would have to break into an organization’s physical building to take their secrets. We now...

The Job of Cybersecurity is Presently Addressed as an
Enterprisesecuritymag >> cioviewpoint

Paul Garrin, CIO Partner, Tatum, A Randstad Company

Cybersecurity is an IT voice/data network vertical that keeps some CIO’s awake at night. The history of the office of the CIO has evolved over time. Early on, the CIO ran IT and simply managed the hardware platforms, computers, firewalls,...

The Digital Transformation Trifecta: Cloud, IoT, and Big Data
Enterprisesecuritymag >> cxoinsights

Joe Topinka, CIO, SnapAV

Staying relevant is proving difficult for many companies as the digital transformation tsunami hits the shores of most businesses. Balancing between the hype and realities of the cloud, IoT, and big data is confusing for C-suite executives....

Protecting the Castle: Business' Changing Security Landscapes
Enterprisesecuritymag >> cxoinsights

Vincent J. Simonowicz, CIO, City of Rock Hill, SC

The challenge every business and enterprise has, is to protect their domains given the changing environments, enhanced security threats and melding of cloud services. As we are pushed to embrace the cloud services and applications, our data is...

Facing the Drift To Climb Security & Fraud's Everest
Enterprisesecuritymag >> cioviewpoint

Thierry Derungs, Chief Digital Officer, BNP Paribas Wealth Management

I remember my first computer. In 1986, with my girlfriend (now my wife), we bought an incredibly expensive top personal computer with an extraordinary hard drive of 20Mb and the best modem to connect to Internet at 14,4kbit/s. Modem connection...

Information Security and Higher Ed: How one CISO is Able to Leverage an MSSP as Part of a Modern Approach to Managing Risk
Enterprisesecuritymag >> cxoinsights

Matt Nappi, Chief Information Security Officer and AVP, Stony Brook University

As one of only 62 AAU members, the environment at Stony Brook University (SBU) is dynamic and challenging with an ambitious 5-part mission that is clear and concise. This allows me to ensure that every initiative I lead or I am a part of, ties...

To MSSP or Not?
Enterprisesecuritymag >> cxoinsights

Rizwan Jan, Vice President, Chief Information Officer, The Henry M. Jackson Foundation for the Advancement of Military Medicine

There are two types of companies: Those who have been breached and those that will be breached. Given that reality, your organization needs to partner with a reputable Managed Security Services Provider or MSSP. Leveraging a MSSP can help you...

Securing Media Content for a Multi Platform
Enterprisesecuritymag >>

The quality, reliability, and the uniqueness of the broadcaster’s or the programmer’s content are of the utmost importance in the media domain. However, recent cyber attacks across industries have caused the leakage of confidential...

Cybersecurity Market - A Second Coming for AI?
Enterprisesecuritymag >>

In today’s advancing digital world, organizations, irrespective of the vertical, are faced with constantly evolving zero-day threats and are in dire need to address them rapidly. As the complexity of a cyber attack increases, so does the...

Three Innovative Cybersecurity Technologies of 2018
Enterprisesecuritymag >>

The ongoing war between security experts and cyber actors have become a cat and mouse game. This era of digital transformation is affecting the cybersecurity, and therefore this ever-changing industry has to be more responsible regarding the cyber...

Information Security and Higher Ed: How one CISO is able to leverage an MSSP as part of a modern approach to managing risk
Enterprisesecuritymag >>

Matt Nappi, Chief Information Security Officer and AVP, Stony Brook University

As one of only 62 AAU members, the environment at Stony Brook University (SBU)  is dynamic and challenging with an ambitious 5-part mission that is clear and concise. This allows me to ensure that every initiative I lead or I am a part of,...

Achieving Information Security in Healthcare
Enterprisesecuritymag >>

Dan Costantino, CISO, Penn Medicine

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs on a continual basis as it matures. It is critical to scrutinize whether you have...