ML and AI in Security Threat Reduction
Enterprisesecuritymag >> cioviewpoint

Cybercrime is not only jeopardizing the technology circle; it also is disturbs every individuals life. The WannaCry ransomware attack in May 2017 stands a proof for the above statement. With the increase in the volume of personal and business...

Cybersecurity In A Connected Government
Enterprisesecuritymag >> cioviewpoint

Behzad Zamanian, CIO, City Of Huntington Beach

As we enter the Internet of things era and people and systems become ever more interconnected, the capacity, extent, and value of information held online has also increased. So have industries and work to exploit that information to harm...

Managing Digital Transformation by IT and Security Teams
Enterprisesecuritymag >> cxoinsights

Elena Kvochko, CIO, Group Security Function, Barclays [NYSE:BCS]

Over the last couple of decades, companies have expanded their digital presence by fostering technology innovation. As a result, they are able to deliver a variety of services, and reach more stakeholders with the same amount of effort and at a...

Software-Defined Security: The Missing Piece in Your SDDC Strategy
Enterprisesecuritymag >> cioviewpoint

Shishir Singh, VP, Network Security, Intel Security

It seems the stars are finally aligning to bring the much-promised benefits of the software-defined datacenter within reach of enterprise users. You know the promises: When our data centers are software-defined, we'll deliver new services...

Hiding in Plain Sight: The DNA Molecule as Next-Generation Cyber-Physical Network Security
Enterprisesecuritymag >> cxoinsights

Judy Murrah, CIO, Applied DNA Sciences Inc

The ultimate challenge: network security. Connected but access-protected. Open standards but private keys. Locked-down but useable. Collaborative but intrusion-protected. From devices to supply chains. Where to begin? Software security has been...

Chief Information Officer - an unlikely role, an unconventional CIO
Enterprisesecuritymag >> cioviewpoint

Aarti Shah, SVP and Chief Information Officer, Eli Lilly and Company

Most CIO positions are held by individuals with IT credentials and years of deep technical and technology experience. What sets me apart as a non-traditional Chief Information Officer (CIO)? I suppose it’s that my career path didn’t...

Creative Solutions for Developing the Public Sector Cybersecurity Workforce
Enterprisesecuritymag >> cioviewpoint

Gregory Crabb, CISO, VP, United States Postal Service

The Postal Service’s cybersecurity organization is committed to confronting the cyber talent shortage head-on. By defending against cyber intrusions, our cybersecurity organization protects over 600,000 dedicated career and non-career...

Information Security: Your People, Your First Line of Defense
Enterprisesecuritymag >> cxoinsights

Eddie Borrero, CISO, Robert Half [NYSE:RHI]

A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in...

Leveraging ERM to drive Information Security (Cybersecurity) results
Enterprisesecuritymag >> cioviewpoint

Chris Mandel, SVP & Director, Sedgwick Institute

Managing a risk, including cyber risk means identifying, tracking, scoring and valuing, normalizing and trending risk performance, including the net impacts. These steps are performed in accordance with compliance standards and aligned with risk...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> cxoinsights

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Network Security: Critical System Defense
Enterprisesecuritymag >> cioviewpoint

Thomas P. Gresham, CISO, Port of San Diego

Prior to the Internet, Information Technology (IT) networks were self-contained and relatively free from cyberattacks. Now it is commonplace to read about data breaches, website defacement and system outages. All business supported by IT...

Taking the Offensive Stance to Reflect Threats
Enterprisesecuritymag >> cxoinsights

Bill Donohue, CIO, GI-Logic, Inc.

As a young lieutenant in the Marine Corps. I was surprised at the amount of time we spent learning offensive tactics versus defensive tactics. Through my training and experience I learned that my best approach to defense was an offensive mindset....

For DDoS-Hope is NOT a Strategy!
Enterprisesecuritymag >> cxoinsights

Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

So pervasive even into corporate boardrooms, the business magazine Forbes, rana primer about the subject in March of 2017; Distributed Denial of Service (DDoS) attacks are on the rise and NOT run of the mill anymore! Before we get started on...

With an Aim to Optimize Telematics Security
Enterprisesecuritymag >> cxoinsights

Kevin Baltes, CISSP Director & CISO – Product Cyber security, General Motors

With individuals averaging over 290hours a year in a vehicle (, 2016), the use of connected services and telematics has become common for drivers and passengers. Individuals are fueled by the need to be constantly connected with their...

Is Artificial Intelligence the Future of Network Security?
Enterprisesecuritymag >> cioviewpoint

Jeffrey W Brown, CSIRO, BNY Mellon

Cyber attacks have become more sophisticated, happen faster and cause more business disruption than ever before. Preventative tools like anti-virus and IDS, have not kept pace. Not by a long shot. This is a problem, because if we are not going to...

The Great CIO Myth
Enterprisesecuritymag >> cxoinsights

David Tamayo, CIO, DCS Corporation

Recently, after participating in a panel of so-called “experts” at the local chapter of the Society for Information Management, a young IT manager came afterwards to ask me, “How can I become a great defense industry CIO?”...

Automotive Connectivity Innovations Require a New Approach to Cybersecurity
Enterprisesecuritymag >> cxoinsights

Tim Frasier, President Automotive Electronics Robert Bosch LLC

From the way vehicles are manufactured, to the way they interact with passengers and the road, processes that have remained largely unchanged since the early 1900s will be revolutionized through connectivity. This continued development will have a...

Understanding Insurance Security
Enterprisesecuritymag >> cxoinsights

Sean Murphy, VP & CISO, Premera Blue Cross

Traditionally, the healthcare industry has been reluctant to embrace the cloud. In many cases, for good reason. There were unclear supplier obligations under HIPAA along with sketchy access and data control provisions that really slowed adoption....

Thinking outside the Firewall: Evolution at a Glance
Enterprisesecuritymag >> cxoinsights

Johan Hybinette, CISO, Vonage

In the quest to gain a competitive advantage, businesses today are focused on leveraging the information inside their own data warehouses. However, is it illogical to focus exclusively on the security of the data inside the firewall? Sure enough,...

Strong Security - Technology Isn't Everything
Enterprisesecuritymag >>

Michael Meyer, CRO and CSO, MRS BPO, LLC

How many times have you heard—buy this technology and all of our (and your) worries and problems go away? Maybe it sounded like this instead—this is the latest and greatest technology; we need it to solve every security issue. So,...