enterprisesecuritymag

information security

Five Best Practices for DevOps Automation
Enterprisesecuritymag >> cxoinsights

Open source libraries and frameworks play a crucial role in the DevOps environment that emphasizes the shorter development lifecycles, collaboration, and innovation. It’s important not to neglect the security of these open source...

Upholding the Principle of Cyber-Awareness
Enterprisesecuritymag >> cxoinsights

Gabor L. Varjas, Group Chief Information Security Officer, MOL Group

MOL Group is an integrated, international oil and gas company, headquartered in Budapest, Hungary. It is active in over 30 countries with a dynamic international workforce of 25,000 people and a track record of more than 100 years in the...

Global Data Protection Regulation...It's time.
Enterprisesecuritymag >> cioviewpoint

Michael Carr, JD, CISSP, CIPP, Director, Global IT Security & Compliance, Hillenbrand

For a couple of years now, I have read quite a few articles and have heard quite a few speakers refer to GDPR as the GLOBAL Data Protection Regulation. Those of us in the Information Security and Privacy profession know that the “G” in...

Combating Cyber Menaces by Fortifying Cybersecurity
Enterprisesecuritymag >> cioviewpoint

Joey J. Smith, VP & CISO, Schnuck Markets, Inc.

Cybersecurity has become a major concern for companies as hacking events have increasingly run rampant. Despite the constant efforts of companies to meet security standards, these events continue unabated. I’d like to suggest that companies...

Combating Cyber Menaces by Fortifying Cybersecurity
Enterprisesecuritymag >> cxoinsights

Joey J. Smith, VP & CISO, Schnuck Markets, Inc.

Cybersecurity has become a major concern for companies as hacking events have increasingly run rampant. Despite the constant efforts of companies to meet security standards, these events continue unabated. I’d like to suggest that companies...

It's Time to Take the NYDFS Cybersecurity Regulation Seriously
Enterprisesecuritymag >> cxoinsights

Tom Stamulis, Senior Director, Alvarez & Marsal

It has been six months since the New York Department of Financial Services (NYDFS) released its controversial cybersecurity regulation (23 NYCRR 500) on March 1st. If your organization is considered a Covered Entity affected by the regulation, it...

It's Time to Take the NYDFS Cybersecurity Regulation Seriously
Enterprisesecuritymag >> cioviewpoint

Tom Stamulis, Senior Director, Alvarez & Marsal

It has been six months since the New York Department of Financial Services (NYDFS) released its controversial cybersecurity regulation (23 NYCRR 500) on March 1st. If your organization is considered a Covered Entity affected by the regulation, it...

The Job of Cybersecurity is Presently Addressed as an
Enterprisesecuritymag >> cioviewpoint

Paul Garrin, CIO Partner, Tatum, A Randstad Company

Cybersecurity is an IT voice/data network vertical that keeps some CIO’s awake at night. The history of the office of the CIO has evolved over time. Early on, the CIO ran IT and simply managed the hardware platforms, computers, firewalls,...

The Job of Cybersecurity is Presently Addressed as an
Enterprisesecuritymag >> cioviewpoint

Paul Garrin, CIO Partner, Tatum, A Randstad Company

Cybersecurity is an IT voice/data network vertical that keeps some CIO’s awake at night. The history of the office of the CIO has evolved over time. Early on, the CIO ran IT and simply managed the hardware platforms, computers, firewalls,...

Enterprise Security: What Does It Really Mean?
Enterprisesecuritymag >> cioviewpoint

Kevin Powers, Founding Director, Boston College

Whether you’re at a cybersecurity conference, participating in a webinar, or reading an article like this one, you are often bombarded with these catchy sayings regarding enterprise security: “It’s a team sport”;...

Enterprise Security: What Does It Really Mean?
Enterprisesecuritymag >> cioviewpoint

Kevin Powers, Founding Director, Boston College

Whether you’re at a cybersecurity conference, participating in a webinar, or reading an article like this one, you are often bombarded with these catchy sayings regarding enterprise security: “It’s a team sport”;...

Techno Security & Digital Forensics Conference 2018 - San Antonio
Enterprisesecuritymag >> cxoinsights

The Texas edition of Techno Security & Digital Forensics Conference will take place September 17-19 at the Hyatt Regency in San Antonio, TX. This event provides a unique education experience that blends together the digital forensics and...

Information Security is More than Information Technology
Enterprisesecuritymag >> cxoinsights

Nick Coussoule, SVP & CIO, BlueCross BlueShield of Tennessee

Training. Education. Role play. More training. These are the key ingredients of a secure organization, because at its core, information security is about people. Generally they are the weakest link in the security chain, yet they are also the...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cioviewpoint

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Cybersecurity Advice that Organizations Need to Follow
Enterprisesecuritymag >> cioviewpoint

The adoption of sophisticated cybersecurity measures has become inevitable for most organizations today to not just shield their data from external threats but significantly increase returns. Several cybersecurity veterans recently suggested...

Cybersecurity Advice that Organizations Need to Follow
Enterprisesecuritymag >> cioviewpoint

The adoption of sophisticated cybersecurity measures has become inevitable for most organizations today to not just shield their data from external threats but significantly increase returns. Several cybersecurity veterans recently suggested...

Time to Think Differently
Enterprisesecuritymag >>

Joseph DiBiase, Director Global Information Security, Interface

As with many of my CISO colleagues, our businesses have been moving (sometimes slowly and sometimes very quickly) to the cloud. We see constant introduction of new SaaS applications and utilization of PaaS and IaaS services from Amazon,...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >>

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >>

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...

Eliminating Passwords: The Journey
Enterprisesecuritymag >>

Bret Arsenault, CVP & CISO, Microsoft

According to one estimate, the average person has 27 online accounts with user names and passwords. Choosing the right password is as confusing as trying to remember dozens of passwords—it should be complex, more than 8 characters long, it...