enterprisesecuritymag

iso

The Impact of the Cloud on Information Security
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, Chief Information Officer, WSSC (Washington Suburban Sanitary Commission)

As a CIO for the Wash­ington Suburban Sanitary Commission (WSSC), which is a 100-year-old public wa­ter utility serving 1.8 million customers in Maryland, across 475,000 accounts, I’ve realized the challenge of balancing evolving...

How Do We Know We're Secure?
Enterprisesecuritymag >> cioviewpoint

Joshua Danielson, Chief Information Security Officer, Copart [NASDAQ:CPRT]

How do we know we’re secure?” It’s a question I’ve been asked by senior leadership at every organization I’ve been. I typically reply “how do you guarantee you won’t get into an accident this...

Enterprise Security: What Does it Really Mean?
Enterprisesecuritymag >> cxoinsights

Kevin Powers, Founding Director, Boston College

Whether you’re at a cybersecurity conference, participating in a webinar, or reading an article like this one, you are often bombarded with these catchy sayings regarding enterprise security: “It’s a team sport”;...

ArkTree, SophiaTX Forge Strategic Alliance To Expand Digital Reach In South Africa
Enterprisesecuritymag >> cioviewpoint

Switzerland: South Africa’s blockchain landscape is set to benefit from an exclusive partnership between SophiaTX (a leading Swiss-based blockchain company) and ArkTree (an emerging South African tech company).  As SophiaTX’s...

How's Your Appetite: Tips for Setting and Measuring One for Organizational Cyber Risk
Enterprisesecuritymag >> cxoinsights

Jon Murphy, CISO, Ocwen Financial Corporation

Significant business-as-usual interruptions are increasingly occurring due to cyber-attacks. Daily, more organizations are becoming cybersecurity (cybersec) risk apprehensive. Consequently, the demand to manage the risk, establish appetites, and...

Keeping Data Secure as Information Moves to the Cloud
Enterprisesecuritymag >> cxoinsights

Tommy Richardson, Former CTO of ADP and Chief Technology Officer and SVP of Technology, Nextech's

Data breaches happen every day as hackers infiltrate companies’ computer systems to gain access to private content, such as financial data and protected health information. We’ve all seen the headlines: Yahoo in 2014 with 3 billion...

For DDoS-Hope is NOT a Strategy!
Enterprisesecuritymag >> cxoinsights

Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

So pervasive even into corporate boardrooms, the business magazine Forbes, rana primer about the subject in March of 2017; Distributed Denial of Service (DDoS) attacks are on the rise and NOT run of the mill anymore! Before we get started on...

Why You Can't Afford to Ignore Security Basics
Enterprisesecuritymag >> cioviewpoint

Bill Podborny, CISO, Alliant Credit Union

Cyber security incidents have almost become a daily news event. Between the increase in incidents and the pressure from executive management and boards to protect organizations, it’s easy to get caught up in all the hype surrounding the...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Security Needs to be Everyone's Responsibility
Enterprisesecuritymag >> cioviewpoint

John Petrie, CISSP, CISM, CBM, CISO , Harland Clarke Holdings Corp

METRICS Mapped TO CORPORATE GOALS Petrie developed a metrics program that was mapped to corporate goals for the organization. Clarke American, one of the two companies that joined to form Harland Clarke in May 2007, won a prestigious Malcolm...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >> cxoinsights

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

Why the Cloud May be the Safest Place to Store Your Sensitive Data
Enterprisesecuritymag >> cxoinsights

David Burg, Principal and Global and US Advisory Cybersecurity leader, PwC

The use of cloud computing is officially mainstream across most industries, yet many executives still worry that provider security practices remain inadequate to protect sensitive data and mission-critical workloads. It’s a long-held...

Hyperconnected, Safe and Secure?
Enterprisesecuritymag >> csoinsight

Phil Agcaoili, SVP & CISO, Elavon

In our now hyper interconnected world, critical lifeline services have been connected to the Internet. These lifeline services affect nearly every part of our lives and impact our economic livelihood, our public health and safety, and our national...

Countering Cyber Vulnerabilities & Threats
Enterprisesecuritymag >> cioviewpoint

Roota Almeida, CISO, Delta Dental of New Jersey

Cyber Insurance and the Threat Landscape In the recent years, the threat landscape has significantly changed and will continue to do so. In the near future, healthcare and health insurance industry will continue to be a prime target for...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >> csoinsight

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

Resources To Meet The Security Challenges
Enterprisesecuritymag >> cioviewpoint

Jeff Theiler, SVP, CISO, Hancock Bank

For security professionals, or any management professional for that matter, the key to managing limited resources is to focus on the key risks. Sound governance, risk and compliance practices are an effective way to manage limited information...

Security Needs to be Everyone's Responsibility
Enterprisesecuritymag >> cxoinsights

John Petrie, CISSP, CISM, CBM, CISO , Harland Clarke Holdings Corp

METRICS Mapped TO CORPORATE GOALS Petrie developed a metrics program that was mapped to corporate goals for the organization. Clarke American, one of the two companies that joined to form Harland Clarke in May 2007, won a prestigious Malcolm...

Key Elements of Effective Security Planning
Enterprisesecuritymag >> cioviewpoint

Rickie K Helmer, CEO and ISO/IEC 27001 ISMS expert, NetQuest

Most of us are aware of the fact that security threats of all kinds challenge us once we venture onto the internet, whether we are using it privately or through our daily work. When journeying into new ventures of investment in new technology,...

Public Sector & Cyber Security
Enterprisesecuritymag >>

Phil Bertolini, Deputy County Executive/CIO, Oakland County

As CIOs, we have all attended events where we walked away with nothing to take back to our workplace. We have all read articles that left us confused or wanting more. I have been asked to provide some CIO information/advice that can be used by...