Cybersecurity In A Connected Government
Enterprisesecuritymag >> cioviewpoint

Behzad Zamanian, CIO, City Of Huntington Beach

As we enter the Internet of things era and people and systems become ever more interconnected, the capacity, extent, and value of information held online has also increased. So have industries and work to exploit that information to harm...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, CIO, WSSC (Washington Suburban Sanitary Commission)

As consumers and recipients of services from utilities, our least favorite things about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Why the Cloud May be the Safest Place to Store Your Sensitive Data
Enterprisesecuritymag >> cxoinsights

David Burg, Principal and Global and US Advisory Cybersecurity leader, PwC

The use of cloud computing is officially mainstream across most industries, yet many executives still worry that provider security practices remain inadequate to protect sensitive data and mission-critical workloads. It’s a long-held...

What We Should Be Learning and Doing Based On Today's Data Breaches
Enterprisesecuritymag >> csoinsight

Deborah Blyth, CISO, Colorado Governor's Office of Information Technology

As I continue to reflect on all of the data breaches over the past several months, there are certain consistencies that emerge, and there are specific actions these breached enterprises are taking to strengthen their attack prevention and data...

Data Security across the Enterprise
Enterprisesecuritymag >> cioviewpoint

Kas Nader, CIO & SVP of Global Technology, Atlanticus Holding

Paradigm Shift in Data Security Over the past five years, great strides have been made toward managing cost and availability. Virtualization, On Demand Computing, and Software as a Service are great examples of the progress that has been...

Data Security Should Be a Top HR Priority
Enterprisesecuritymag >> cxoinsights

William J.T. Strahan, EVP-HR, Comcast Cable

It is almost clichéd for an HR manager to cite confidentiality to avoid talking about details regarding everything from health care benefits to employee relations to pending promotions and terminations. In a world where personal privacy...

DataBreachIQ (IDIQ): Bringing Businesses Data Breach Preparation, Planning, and Support
Enterprisesecuritymag >> vendor

Scott Hermann, Co-Owner & CEO

IDIQ is recognized as one of the fastest-growing industry leaders in credit and identity theft monitoring and data breach management. With its DataBreachIQ services, IDIQ brings businesses the planning and support they...

PT Dymar Jaya Indonesia: Adding Protection Layer to Data
Enterprisesecuritymag >> vendor

Yuliani Kusnadi, Managing Director

Dymar Jaya Indonesia is one of the leading specialists in providing enterprise security solutions, with its focus on data security and data communications. The company is an expert in encryption, key management, and digital signature. The company...

comforte AG: Facilitating Payment Security through Tokenization
Enterprisesecuritymag >> vendor

Michael Deissner, CEO

Comforte AG is a leading provider of data-centric security technology that is delivering payment and data security solutions to financial organizations through tokenization and innovative business strategies. The payment service solution provider...

Lynx: Safeguarding System and Business
Enterprisesecuritymag >> vendor

Rich Hlavka, CEO

Lynx is a full service, full lifecycle, risk-based security consulting firm for risk management, security, and compliance requirements. The company is the leading expert serving multiple industries including financial services, nuclear, energy,...