enterprisesecuritymag

legal

Why do Projects Take so Long (When Information Security is Involved)?
Enterprisesecuritymag >> cxoinsights

Sam E. Buhrow, Director of Cyber Incident Management & Forensics, Banner Health

Over the years, I’ve had numerous experiences and swapped stories with colleagues of painful projects that “involved” Information Security. Of course, these weren’t projects lead by Information Security. Instead, at some...

Mobility Landscape in Healthcare
Enterprisesecuritymag >> cioviewpoint

Steve Crocker, Chief Information Security Officer at Methodist Le Bonheur Healthcare

Security leaders are constantly challenged by threats from the growing use of mobile devices in the workforce. Nowhere is this more evident than in the healthcare industry. Healthcare has recently seen an explosion of technology innovation aimed...

The Evolving Role of the CCPA Privacy Function: Who Runs Privacy?
Enterprisesecuritymag >> cioviewpoint

George Viegas, Privacy Champion and CISO, Chapman University

While there is a primary focus on emerging trends in privacy-related to Legal regulations, there is, at the same time, considerable changes and evolution happening on the organizational and staffing side of privacy. Historically, the privacy...

Law Firms Adopt Cloud for Security and Simplicity
Enterprisesecuritymag >> csoinsight

FREMONT, CA – In this age of technology, law firms are experiencing an increase in data security risks and cyber threats. The adoption of data security has become imperative to the law firms, not only to sooth the regulators, but also to...

Feeling Vulnerable? A Primer on Building a Vulnerability-Based Table Top Exercise
Enterprisesecuritymag >> cioviewpoint

Kristy Westphal, CSIRT, Vice President, Union Bank

Table top exercises are a critical part to any incident response program. One of the toughest components to design in a table top is a realistic scenario that generates not only discussion about how incident responders would react, but to generate...

"Password Sharing" and its Impact on Enterprise Data Security
Enterprisesecuritymag >> cioviewpoint

One of the extreme threats faced by enterprises in recent times is that of the data breach. Insiders and cybercriminals are keenly aware of the value of data. Many people don’t understand the risk, and they are also unaware of ways to...

QDiscovery Continues its Spate of Receiving Recognition from Industry Experts
Enterprisesecuritymag >> cxoinsights

David Barrett, CEO

Businesses today rely on in-house data, and its right usage can turn out to be a competitive advantage. Unfortunately, along with value, there is a risk that is in the wrong hands or used for illegal purposes, that same data can pose risks. What...

Blockchain Features That can Rule in future
Enterprisesecuritymag >> cioviewpoint

Blockchain Technology is responsible for building an ecosystem of solutions for many industries. Blockchain technology has proved its mettle by providing able security for bitcoins. Enterprises across many industries are looking for ways to...

Scaling a Security Program with MSSPs
Enterprisesecuritymag >> csoinsight

Jeffrey W. Brown, CISO, Life & Retirement, AIG

Outsourced information security services and managed security services providers (MSSPs) are a necessary component of most cybersecurity programs. Even large-scale financial institutions with fully-staffed internal security teams tend to have...

The Great CIO Myth
Enterprisesecuritymag >> cxoinsights

David Tamayo, CIO, DCS Corporation

Recently, after participating in a panel of so-called “experts” at the local chapter of the Society for Information Management, a young IT manager came afterwards to ask me, “How can I become a great defense industry CIO?”...

Establishing a Best-in-Class Global Security Infrastructure
Enterprisesecuritymag >> cioviewpoint

Tim Callahan, SVP, Global Security, and Global Chief Security Officer (CISO), Aflac

Forming a global security infrastructure is never a one-size-fits-all approach, but proven methods can help.  Aflac implemented a global security organization under its general counsel to ensure global view and reach. This...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >> vendor

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

Preventing Cyber-Attacks in Universities with Operational Collaboration
Enterprisesecuritymag >>

Michael Corn, Deputy CIO & CISO, Brandeis University

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging...

Security and Privacy: Stop Plotting Against Each Other
Enterprisesecuritymag >>

Ruby Zefo, VP, Law and Policy Group, Intel Corporation

When I first started working as a grown up, PCs were brand new. I shared one with my office neighbor, mostly for word processing, creating spreadsheets, and creating presentations – which I would then take on a floppy disk to a plotter, a...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >>

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

QBRICS, Inc.: Enterprise Blockchain Platform
Enterprisesecuritymag >>

Brennan Bennett, Co-Founder & COO

QBRICS, Inc envisions creating a blockchain adoption platform and becoming a blockchain solution provider with unique features like quantum safe encryption, artificial intelligence-enabled smart contracts, interoperability between different type...