enterprisesecuritymag

government

Creating Efficient Government through Digital Transformation and Collaboration
Enterprisesecuritymag >> cioviewpoint

David M. Bessen, Director & CIO, Arapahoe County Government

Being an early adopter of digital transformation creates opportunities for public agencies to gain significant efficiencies, to provide better citizen service and to lay the foundation for adopting AI or algorithmic-driven analyses and...

Cybersecurity In A Connected Government
Enterprisesecuritymag >> cioviewpoint

Behzad Zamanian, CIO, City Of Huntington Beach

As we enter the Internet of things era and people and systems become ever more interconnected, the capacity, extent, and value of information held online has also increased. So have industries and work to exploit that information to harm...

The End of an Era: Passwords Byte the Dust
Enterprisesecuritymag >> cxoinsights

Paul Christman, VP-Public Sector, Dell Software

Nearly every major data breach can be traced back to a compromised user-name and password that is exploited to gain unauthorized access to sensitive data. The pattern of most cyber breaches is similar—bad guys hijack credentials, escalate...

Consolidation of GSA IT
Enterprisesecuritymag >> cioviewpoint

David Shive, CIO, GSA

David Shive, CIO, GSA On July 30 of this year I was honored to be named the Chief Information Officer (CIO) of the United States General Services Administration (GSA). The role of CIO here at GSA comes with a legacy of innovation, early...

Leading IT through Collaboration
Enterprisesecuritymag >> cioviewpoint

Brenda Decker, CIO, State of Nebraska

Brenda Decker, CIO, State of Nebraska Each and every day the Chief Information Officer of any organization is presented with new opportunities to use technology to provide services to constituents. State Government CIO’s are no...

FDA Cybersecurity Defenses and Enhancements within the Threat Landscape
Enterprisesecuritymag >> cioviewpoint

Todd Simpson, CIO, FDA

The U.S. Food and Drug Administration (FDA) reliesrely on a strong enterprise security system to help the agency fulfill its global public health mission. In September 2016, the Government Accountability Office (GAO) issued a report, “FDA...

Creating a Culture for IT Innovation
Enterprisesecuritymag >> cioviewpoint

Steve Rice, CIO, Transportation Security Administration (TSA)

November 19th marked the 15-year anniversary of the Transportation Security Administration (TSA), the first agency charged with securing the Nation’s transportation systems from terrorist attacks. Today TSA operates in more than 450 airports...

October is National Cyber Security Awareness Month
Enterprisesecuritymag >> cxoinsights

Michael Dent, CISO, Fairfax County Government

Cyber Security should no longer be the hindrance to business in IT. Along that line, decision and policy makers need to also be cognizant that if decisions are being made, Cyber Security can no longer be the excuse for not securing solutions and...

Ongoing Authorization: Changing how Government does Security Compliance
Enterprisesecuritymag >> csoinsight

Jeff Eisensmith, CISO, DHS

The Department of Homeland Security is the steward of a great deal of information. Information used to support the department’s mission, personally identifiable information of the citizens we serve, and that of our employees must be...

A Deeper View into the Threat Landscape
Enterprisesecuritymag >> csoinsight

James Carder, CISO & VP of LogRhythm Labs

The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime groups, hacktivism (though that has been receiving less press lately), terrorist organizations...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> csoinsight

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

Addressing Cyber Security Strategically
Enterprisesecuritymag >> cioviewpoint

David L Stevens, CIO, Maricopa County

Cyber Security has increasingly become more important to an organizations’ ability to conduct business. This stems from the high visibility associated with large data breaches that have been reported by various fortune 500 companies. As a...

Preventing Cyber-Attacks in Universities with Operational Collaboration
Enterprisesecuritymag >> csoinsight

Michael Corn, Deputy CIO & CISO, Brandeis University

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging...

Hyperconnected, Safe and Secure?
Enterprisesecuritymag >> cxoinsights

Phil Agcaoili, SVP & CISO, Elavon

In our now hyper interconnected world, critical lifeline services have been connected to the Internet. These lifeline services affect nearly every part of our lives and impact our economic livelihood, our public health and safety, and our national...

A Deeper View into the Threat Landscape
Enterprisesecuritymag >> csoinsight

James Carder, CISO & VP of LogRhythm Labs

The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime groups, hacktivism (though that has been receiving less press lately), terrorist organizations...

Public Sector & Cyber Security
Enterprisesecuritymag >> cioviewpoint

Phil Bertolini, Deputy County Executive/CIO, Oakland County

As CIOs, we have all attended events where we walked away with nothing to take back to our workplace. We have all read articles that left us confused or wanting more. I have been asked to provide some CIO information/advice that can be used by...

Addressing Cyber Security Strategically
Enterprisesecuritymag >> cioviewpoint

David L Stevens, CIO, Maricopa County

Cyber Security has increasingly become more important to an organizations’ ability to conduct business. This stems from the high visibility associated with large data breaches that have been reported by various fortune 500 companies. As a...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> csoinsight

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

Virtis: Mitigating Data Breach with Cutting-Edge Solutions
Enterprisesecuritymag >> vendor

Michelle Wilner, CEO

Virtis is a leading player in delivering artificial intelligence solutions, superior technology, and technical support to safeguard business crucial and high-value assets of leading companies and government organizations across the globe. The...

Torch.AI: Illuminating Enterprise risk
Enterprisesecuritymag >> vendor

Brian Weaver, CEO

Torch.AI is one of the emerging brands that provide artificial intelligence solutions, which offers network-centric AI and has developed a unified mathematical framework and sophisticated analytics tools to leverage data in a unique way to tackle...