Artificial Intelligence: The Human Resources Game-Changer
Enterprisesecuritymag >> cxoinsights

Emily He, SVP of HCM Cloud Business Group, Oracle

Artificial intelligence (AI) is transforming every facet of business: from marketing and sales to finance and operations. AI makes it possible for machines to learn from experience, adjust to new inputs, make helpful recommendations and perform...

Why do Projects Take so Long (When Information Security is Involved)?
Enterprisesecuritymag >> cxoinsights

Sam E. Buhrow, Director of Cyber Incident Management & Forensics, Banner Health

Over the years, I’ve had numerous experiences and swapped stories with colleagues of painful projects that “involved” Information Security. Of course, these weren’t projects lead by Information Security. Instead, at some...

Why physical security should not be neglected over cyber security?
Enterprisesecuritymag >> cxoinsights

Richard Hancock, Regional Director Asia Pacific, a GardaWorld Company

In our role as a risk and crisis management consultancy, NYA is increasingly asked about the vulnerabilities of our clients’ cybersecurity architecture. Often, the conversation is led by the CIO, asking us to focus on the technological...

Mobility Landscape in Healthcare
Enterprisesecuritymag >> cioviewpoint

Steve Crocker, Chief Information Security Officer at Methodist Le Bonheur Healthcare

Security leaders are constantly challenged by threats from the growing use of mobile devices in the workforce. Nowhere is this more evident than in the healthcare industry. Healthcare has recently seen an explosion of technology innovation aimed...

Steps To Prevent the Data Breaches That Devours Your Enterprise
Enterprisesecuritymag >> cxoinsights

Recent global cyber attacks such as WannaCry, NotPetya, and the Equifax breach have increased awareness among the organizations of the importance of investing in cybersecurity. Fremont, CA: The wave of data breaches continues to put the...

Employee Engagement: A Risk Mitigation Strategy
Enterprisesecuritymag >> cioviewpoint

Michael Clancy, Chief Security Officer, Fannie Mae

Recent headlines regarding workplace violence, especially active-shooter incidents, are a sobering reminder of the randomness of violent acts and the fact that they can happen anywhere. But while raw statistics and painful images may garner a lot...

Innovation is the Key to Success
Enterprisesecuritymag >> cxoinsights

Kim Jacques, CIO, Lombard International

What do you see as a big challenge in technology today? If you were to write down a wish list, what solutions are you looking forward to and what are your expectations from technology providers? In my opinion, the biggest challenge we face...

Managing User Access and Identity for Better Security
Enterprisesecuritymag >> cxoinsights

Genady Vishnevetsky, Chief Information Security Officer, Stewart Title

Managing user access and identity has been a growing pain for years. We are no longer supporting just human identities. The latest explosion of new smart devices is not making governance over identity access easier. We have very little control...

Taking a good look into the Cyber Security Profession
Enterprisesecuritymag >> cxoinsights

Candy Alexander, CISSP CISM, Information Systems Security Association

It’s just one of those things, if you are in “it,” you forget that others may not know what the heck you are talking about. That is exactly the case with Cyber Security, or when I first started, it was called Information...

Better Equipping HR Department to Deal with Cybersecurity
Enterprisesecuritymag >> csoinsight

Cyber attacks have been a dreadful phenomenon across the world for the past few years causing financial and reputational damage for the organization across manufacturing, financial services, healthcare, telecommunication, pharmaceuticals,...

Are You Playing With Cyber Fire?
Enterprisesecuritymag >> cxoinsights

Joel White, CPA, CGMA, CISA, CIA, CFE, Senior Director – Internal Audit, Risk & Compliance, Association of International Certified Professional Accountants

Lost revenue. Fewer customers. Potential lawsuits. You know the risks associated with a cyberattack. But, has your organization done everything it can to help prevent one? Here are four signs that you might be playing with fire when it comes to...

Feeling Vulnerable? A Primer on Building a Vulnerability-Based Table Top Exercise
Enterprisesecuritymag >> cioviewpoint

Kristy Westphal, CSIRT, Vice President, Union Bank

Table top exercises are a critical part to any incident response program. One of the toughest components to design in a table top is a realistic scenario that generates not only discussion about how incident responders would react, but to generate...

Influence of AI on Enterprise Workflow
Enterprisesecuritymag >> cxoinsights

Enterprises in all verticals are embracing AI at a rapid pace for their evolution. AI powers many industrial and personal processes ranging from data analytics to personal assistance in smartphones and speaker devices. The disruption of Artificial...

Global Data Protection Regulation...It's time.
Enterprisesecuritymag >> cioviewpoint

Michael Carr, JD, CISSP, CIPP, Director, Global IT Security & Compliance, Hillenbrand

For a couple of years now, I have read quite a few articles and have heard quite a few speakers refer to GDPR as the GLOBAL Data Protection Regulation. Those of us in the Information Security and Privacy profession know that the “G” in...

The Power of Technology for Non-Profit Organizations
Enterprisesecuritymag >> cioviewpoint

Gail Hyde, VP-IT & CIO, Habitat for Humanity International

At Habitat for Humanity International, technology plays a large role in our efforts to help people build strength, stability and independence through shelter and transform communities around the world. Any nonprofit international nonprofits in...

Five Phases of Cloud Security
Enterprisesecuritymag >>

Over the past few years, the adoption of cloud computing in organizations has seen a meteoric rise, going from simple emailing platforms to elaborate HR services and customer relationship management (CRM) systems. Furthermore, as IT provision is...

Need for Digital Forensics and Incident Response Teams
Enterprisesecuritymag >>

Digital forensics is the branch of forensic science that deals with the collection and examination of digital evidence to identify why, when and how a criminal or hacking activity has occurred. Though the use of digital forensics in the corporate...

Time to Think Differently
Enterprisesecuritymag >>

Joseph DiBiase, Director Global Information Security, Interface

As with many of my CISO colleagues, our businesses have been moving (sometimes slowly and sometimes very quickly) to the cloud. We see constant introduction of new SaaS applications and utilization of PaaS and IaaS services from Amazon,...

Creating a
Enterprisesecuritymag >>

Thomas Skill, Associate Provost & CIO, University of Dayton

Let’s face it, cybersecurity isn’t going to get any easier in 2018. As long as there is a financial or geo-political incentive, the threats will keep coming and the level of exploit sophistication will keep rising. Winning this battle...

CIO Hall of Faces
Enterprisesecuritymag >>

Tom Basiliere, CIO, Provant

Among the many kingdoms in the popular “Game of Thrones” series, there is a secluded island that is home to an ancient temple and a clan of assassins. In this temple, there is a special room called the Hall of Faces. Arya, one of the...