enterprisesecuritymag

education

Information Security is More than Information Technology
Enterprisesecuritymag >> cioviewpoint

Nick Coussoule, SVP & CIO, BlueCross BlueShield of Tennessee

Training. Education. Role play. More training. These are the key ingredients of a secure organization, because at its core, information security is about people. Generally they are the weakest link in the security chain, yet they are also the...

Faster Risk Mitigation? Accelerate your Sector
Enterprisesecuritymag >> cioviewpoint

Brad Wheeler, Vice President for IT & CIO, Indiana University Bloomington and Board Member of IU Health Bloomington Hospital

In 2016, my CIO colleagues and I in the Big Ten Academic Alliance realized the game was quickly changing in cybersecurity. Each of us is responsible for protecting the data and technology assets of large, multi-billion dollar universities, and we...

Cybersecurity In A Connected Government
Enterprisesecuritymag >> cioviewpoint

Behzad Zamanian, CIO, City Of Huntington Beach

As we enter the Internet of things era and people and systems become ever more interconnected, the capacity, extent, and value of information held online has also increased. So have industries and work to exploit that information to harm...

The Goldilocks Theory for Risk Management
Enterprisesecuritymag >> cxoinsights

Patricia Titus, Chief Privacy & Information Security Officer, Markel Corporation [NYSE:MKL]

Companies need the flexibility to transform the way they do business in order to meet the market demands and security needs to transform its thinking. We know that technology hasn’t stopped evolving therefore adoption continues to grow at a...

Integrating Cloud Capability To Provide Reliability, Authentication, And Messaging Infrastructure
Enterprisesecuritymag >> cioviewpoint

Kim Tracy, CIO, Northeastern Illinois University

Infrastructure To Tackle The Onslaught Of Digital Content And Mobile Devices In being a public university, we look for investments in IT infrastructure that we believe will definitely be of value. Of the key parameters I look at the future...

Safer Deposits: Beating the Cyber-threats Targeting Banks
Enterprisesecuritymag >> cxoinsights

Gadi Naveh, Threat Prevention Evangelist, Check Point Software Technologies, Ltd

When the prolific career criminal Willie Sutton was asked why he specifically targeted banks, he reportedly replied: “Because that’s where the money is.” So it’s no surprise that cyberattacks against banks have increased...

Weaving Robust Identity Systems Into The University's Security Infrastructure
Enterprisesecuritymag >> cioviewpoint

Dr. Jan I.Fox, SVP- IT & CIO, Marshall University

Innovative ways to foster growth within their organizations Growth within the Marshall University IT organization means utilizing existing team members in new, innovative ways while reaching out to new collaboration partners. University...

Insecurity U
Enterprisesecuritymag >> cioviewpoint

David Crain, Assistant Provost & CIO, Southern Illinois University

Am I just paranoid or should we be concerned with the present state of security within higher education? I very much think the latter. In the last few weeks, we learned that a cybercrime group in Russia may have obtained 1.2 billion stolen...

Marrying Technology and Education Science to Evolve Security Awareness and Training
Enterprisesecuritymag >> cxoinsights

Joe Ferrara, President and CEO, Wombat Security

At Wombat Security, cyber awareness and training initiatives are central to our mission of changing employee behaviors and reducing risk to organizations. Education is one of the foundational elements of our unique methodology, and our approach is...

Preventing Cyber-Attacks in Universities with Operational Collaboration
Enterprisesecuritymag >> csoinsight

Michael Corn, Deputy CIO & CISO, Brandeis University

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging...

Weaving Robust Identity Systems Into The University's Security Infrastructure
Enterprisesecuritymag >> cioviewpoint

Dr. Jan I.Fox, SVP- IT & CIO, Marshall University

Innovative ways to foster growth within their organizations Growth within the Marshall University IT organization means utilizing existing team members in new, innovative ways while reaching out to new collaboration partners. University...

3 Steps to Elevating Corporate Security
Enterprisesecuritymag >> cioviewpoint

Mark Kelly, CIO | VP of IT and Services, Curvature

IT Leaders are consistently reminded about the need for improved security of their IT assets. However, in most organizations security concerns take a backseat to high-visibility efficiency gain projects. When security does gain an...

Marrying Technology and Education Science to Evolve Security Awareness and Training
Enterprisesecuritymag >> cxoinsights

Joe Ferrara, President and CEO, Wombat Security

At Wombat Security, cyber awareness and training initiatives are central to our mission of changing employee behaviors and reducing risk to organizations. Education is one of the foundational elements of our unique methodology, and our approach is...

Insecurity U
Enterprisesecuritymag >> cioviewpoint

David Crain, Assistant Provost & CIO, Southern Illinois University

Am I just paranoid or should we be concerned with the present state of security within higher education? I very much think the latter. In the last few weeks, we learned that a cybercrime group in Russia may have obtained 1.2 billion stolen...

Biometric Signature-ID: Advanced Biometrics for Foolproof Authentication
Enterprisesecuritymag >> vendor

Jeff Maynard, CEO, President, & Founder

Biometric Signature ID is a leading manufacturer of biometric ID verification software and multifactor authentication solutions provider. Its innovative BioSig-ID identity solution authenticates individuals with a unique password drawn using a...