enterprisesecuritymag

hr

The Right Side of the Analytics Revolution Begins with Underwriting
Enterprisesecuritymag >> cxoinsights

Dax Craig, Chief Executive Officer and President, Valen Analytics

Dax Craig, Chief Executive Officer and President, Valen Analytics As the adoption of data and predictive analytics continues to grow in property/casualty (P&C) insurance, so does the segmentation and sophistication of the market. As a...

Putting Customers in Control of their data
Enterprisesecuritymag >> cxoinsights

Marty Ellingsworth, President, Salt Creek Analytics

Marty Ellingsworth, President, Salt Creek Analytics Now that “everyone has a smartphone” and the sharing economy is in full swing, companies engage customers and do more via mobile, cloud, and analytic platforms. Variety of new...

Transforming Your Business through Secure Mobile Strategies
Enterprisesecuritymag >> cxoinsights

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung All too often, I see organi­zations that are looking to improve their mo­bile strategies fall into the same patterns and quicksand in these efforts....

How to get your information security to lift more weight
Enterprisesecuritymag >> cxoinsights

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security Information security sometimes appears to be stuck, still suffering from the same basic problems: weak passwords, unpatched vulnerabilities, and too much (or too little)...

The Changing Face of CDN
Enterprisesecuritymag >> cxoinsights

Will Hughs, President, Americas-Global Head of OTT, Telstra

Will Hughs, President, Americas-Global Head of OTT, Telstra In today’s competitive business world, organisations are always looking to improve the user experience for their customers and in doing so, gain an important competitive...

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services....

Safer Deposits: Beating the Cyber-threats Targeting Banks
Enterprisesecuritymag >> cxoinsights

Gadi Naveh, Threat Prevention Evangelist, Check Point Software Technologies, Ltd

When the prolific career criminal Willie Sutton was asked why he specifically targeted banks, he reportedly replied: “Because that’s where the money is.” So it’s no surprise that cyberattacks against banks have increased...

Consolidation of GSA IT
Enterprisesecuritymag >> cioviewpoint

David Shive, CIO, GSA

David Shive, CIO, GSA On July 30 of this year I was honored to be named the Chief Information Officer (CIO) of the United States General Services Administration (GSA). The role of CIO here at GSA comes with a legacy of innovation, early...

Leading IT through Collaboration
Enterprisesecuritymag >> cioviewpoint

Brenda Decker, CIO, State of Nebraska

Brenda Decker, CIO, State of Nebraska Each and every day the Chief Information Officer of any organization is presented with new opportunities to use technology to provide services to constituents. State Government CIO’s are no...

All Identities Matter
Enterprisesecuritymag >> cxoinsights

Daniel Krantz, CEO, Real-Time Technology Group

Clear and Present Insider Threat Now more than ever before, risk managers are faced with increasing physical security threats. Irrespective of the political debates, facility owners and operators are forced to implement changes in their...

All Identities Matter
Enterprisesecuritymag >> cxoinsights

Daniel Krantz, CEO, Real-Time Technology Group

Clear and Present Insider Threat Now more than ever before, risk managers are faced with increasing physical security threats. Irrespective of the political debates, facility owners and operators are forced to implement changes in their...

Hit the Reset button, not the Panic button
Enterprisesecuritymag >> cxoinsights

Lakshmi Hanspal, VP-Security, Privacy & Governance (CISO), SAP Ariba

Imagine all the times in your life that you wished you had a Reset button –from tottering toddler, to whimsical teen, to the Millennials and adults of today - what would you have done differently? Resetting is the process of re-examining...

Sensitive Data Protection Processes-A Key to IT Security
Enterprisesecuritymag >> cxoinsights

Randy Marchany, CISO, Virginia Tech IT Security Office

One of the common mistakes organizations make is to focus on the technologies rather than protecting the organization’s sensitive data. Certainly, protecting devices is a necessary task but it’s the data that counts. There are no...

Enterprise Security And The Elusive
Enterprisesecuritymag >> csoinsight

Andre' Allen, CISO, City of Houston

Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >> cxoinsights

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the Digital Age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >> cioviewpoint

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

Addressing Cyber Security Strategically
Enterprisesecuritymag >> cioviewpoint

David L Stevens, CIO, Maricopa County

Cyber Security has increasingly become more important to an organizations’ ability to conduct business. This stems from the high visibility associated with large data breaches that have been reported by various fortune 500 companies. As a...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >> cioviewpoint

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >> cxoinsights

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the digital age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Rebuilding Your Information Security Program - From Scratch
Enterprisesecuritymag >> csoinsight

Larry Schwarberg, CISO, Omnicare

The Information Security field has continued to grow and develop as a part of the enterprise culture. Most existing Information Security programs were pieced together over time as security technologies became more advanced, threats evolved,...