enterprisesecuritymag

enterprise

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >> cioviewpoint

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Blockchain for the Enterprise
Enterprisesecuritymag >> cioviewpoint

Aaron Gette, CIO, The Bay Club Company

Most organizations have not implemented blockchain, but few are venturing into the development stage of projects and decentralized applications. There’s immeasurable hype and promise, backed by an intense amount of research and investment...

Vulnerability Management: The Game-Changer Enterprises are Waiting for
Enterprisesecuritymag >> cxoinsights

Bill Swearingen, Director, Centurylink

As businesses work through their digital transformations, leveraging the latest software and cloud technologies to enhance customer experience and streamline operations, they do so against an unfortunate backdrop of unprecedented growth in...

Leveraging Digital Monitoring to Boost Physical Security Efforts
Enterprisesecuritymag >> cxoinsights

Lawrence Mallory, Director, Physical Infrastructure Security, New York Power Authority

The New York Power Authority, the largest state-run utility in the nation, is continually working towards the goal of creating the first all-digital public power utility in the U.S. This aspiration is good news for physical security functions,...

The Industrial IoT Attack Surface
Enterprisesecuritymag >> cioviewpoint

Matt Griffiths, Vice President, Data-Driven Transformation, Stanley Black & Decker, Inc.

Across the Industrial Manufacturing sector, the average plant and equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...

The Industrial IoT Attack Surface
Enterprisesecuritymag >> cioviewpoint

Matt Griffiths, Vice President, Data-Driven Transformation, Stanley Black & Decker, Inc.

Across the Industrial Manufacturing sector, the average plant and equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...

AI is the New UI-AI + UX + DesignOps
Enterprisesecuritymag >> cxoinsights

Amit Bahree, Executive, Global Technology and Innovation, Avanade

Today you cannot read any technology or business article without some discussion around Artificial Intelligence (AI), whether explicit or implicit. We see AI integrating deeper in all elements of our life–be it at home with our families, or...

Managing Digital Transformation by IT and Security Teams
Enterprisesecuritymag >> cioviewpoint

Elena Kvochko, CIO, Group Security Function, Barclays [NYSE:BCS]

Over the last couple of decades, companies have expanded their digital presence by fostering technology innovation. As a result, they are able to deliver a variety of services, and reach more stakeholders with the same amount of effort and at a...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >> cioviewpoint

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

Enterprise Architecture and Culture: Two Parts of Digital Transformation Success
Enterprisesecuritymag >> cxoinsights

Ethan Pack, Director of Enterprise Architecture and Applications, TDECU

“We really need a digital transformation strategy.” A version of that phrase can be heard coming from many boardrooms and executive teams around the world. Digital business is quite the buzzphrase these days and why shouldn’t it...

Enterprise Architecture and Culture: Two Parts of Digital Transformation Success
Enterprisesecuritymag >> cxoinsights

Ethan Pack, Director of Enterprise Architecture and Applications, TDECU

“We really need a digital transformation strategy.” A version of that phrase can be heard coming from many boardrooms and executive teams around the world. Digital business is quite the buzzphrase these days and why shouldn’t it...

Security and Compliance- Focused IT Approach-Key for Business Success
Enterprisesecuritymag >> cioviewpoint

Daniel Hughes, CIO, Elementis Global

As a multinational chemical company focused on safety, innovation, and growth, we are faced with a multitude of challenges including the need to be compliant in diverse areas encompassing environmental, financial, safety, and security. In this...

Security and Compliance- Focused IT Approach-Key for Business Success
Enterprisesecuritymag >> cioviewpoint

Daniel Hughes, CIO, Elementis Global

As a multinational chemical company focused on safety, innovation, and growth, we are faced with a multitude of challenges including the need to be compliant in diverse areas encompassing environmental, financial, safety, and security. In this...

Network Security: Critical System Defense
Enterprisesecuritymag >> cxoinsights

Thomas P. Gresham, CISO, Port of San Diego

Prior to the Internet, Information Technology (IT) networks were self-contained and relatively free from cyberattacks. Now it is commonplace to read about data breaches, website defacement and system outages. All business supported by IT...

Enterprise Architecture: Your Tool for Right-Sizing Security
Enterprisesecuritymag >> cxoinsights

Ted Kieffer, Director Enterprise Architecture, Grainger

I sometimes find it amusing that the same high-level issues we face when addressing security now are the same as when I first started security work almost two decades ago. The tools may have changed. The people may have changed. The methods may...

Enterprise Architecture: Your Tool for Right-Sizing Security
Enterprisesecuritymag >> cxoinsights

Ted Kieffer, Director Enterprise Architecture, Grainger

I sometimes find it amusing that the same high-level issues we face when addressing security now are the same as when I first started security work almost two decades ago. The tools may have changed. The people may have changed. The methods may...

Importance of Enterprise Group Chat Authentication
Enterprisesecuritymag >> cxoinsights

Omri Sigelman, Co-founder & Chief Strategy and Product Officer, NURO Secure Messaging

Instant messaging (IM) apps are taking over our business lives. Group chat capability provided by consumer IM services like Facebook Messenger, Snapchat and WhatsApp has found widespread appeal. Such is their convenience that employees are only...

Enterprise Architecture: Your Tool for Right- Sizing Security
Enterprisesecuritymag >> cxoinsights

Ted Kieffer, Director Enterprise Architecture, Grainger

I sometimes find it amusing that the same high-level issues we face when addressing security now are the same as when I first started security work almost two decades ago. The tools may have changed. The people may have changed. The methods may...

Enterprise Architecture: Your Tool for Right- Sizing Security
Enterprisesecuritymag >> cxoinsights

Ted Kieffer, Director Enterprise Architecture, Grainger

I sometimes find it amusing that the same high-level issues we face when addressing security now are the same as when I first started security work almost two decades ago. The tools may have changed. The people may have changed. The methods may...

Implementing a Cyber-Security Program - The Journey of True Partnership with IT
Enterprisesecuritymag >> cxoinsights

Maurice Edwards, Senior Vice-President Enterprise Risk, Mattress Firm

Over the past 7 years, Mattress Firm has been one of the hottest retailers in the world increasing their store count from over 750 stores to over 3,500 stores resulting from both organic growth and acquisitions. As is the case with many...