Hybrid Workspace: A Boon or Bane?
Enterprisesecuritymag >> cxoinsights

Greg Becker, President & CEO, Silicon Valley Bank

Most organizations have been adopting cloud-based architectures such as Software-as-a- Service (SaaS) to upgrade their workplace learning and development programs. That is owed to the cloud environment’s ability to foster communication and...

What Ways Can Be Adopted For Mitigating Cyber Attacks In Food Safety?
Enterprisesecuritymag >> news

Investment in cybersecurity is vital to processes of risk management to shield food companies from potential attacks. FREMONT, CA: When technology enters all sectors, there is a simultaneous rise in the number of cyber threats to these...

Top 3 Risk Mitigation Steps All Enterprises Should Follow
Enterprisesecuritymag >> news

Securing an extensive cyber-physical infrastructure is a risky task. Listed below are some of the mitigation tips that help minimize overall risk in the airline sector. FREMONT, CA: With rising threats and the new ones that emerge across the...

What Enterprises Should Consider for Effective Risk Management
Enterprisesecuritymag >> news

Risks management controls organizations' capital and earnings threats. These threat issues can stem from various sources, including financial uncertainty, legal liabilities, strategic management errors, and more. FREMONT, CA: In the...

Get Back to your Security Program Fundamentals
Enterprisesecuritymag >> cioviewpoint

Erik Hart, Chief Information Security Officer, Cushman & Wakefield

Information Security is the topic that every organization is trying to answer as part of their strategy, but is there “an answer”? Recently, Gartner reported approximately $114 billion was spent in 2018 on security; an increase of...

Looking from Outside the Box to the Inside for Efficient Risk Management
Enterprisesecuritymag >> cioviewpoint

Erik Hart, CISO, Cushman & Wakefield

Risk management has been a vital part of organizations not just to understand what the risks they are prone to, but also to have a clear picture of the gaps and areas of risks. Most organizations initially took up initiatives of preventing any...

Top 3 Divisions Of IT Risk Management
Enterprisesecuritymag >> news

To effectively evaluate and address risks, companies should follow the best strategies and practices such that the same risks never occur again. Fremont, CA: As businesses rely on information technology (IT) systems, such as computers and...

4 Cloud Computing Security Risks Every Enterprise CIO Must Know
Enterprisesecuritymag >> news

Utilizing cloud-based solutions is a trend that continues to grow over time. When information on cloud increases, the need to secure the data and information increases with it, the enterprises must know what risks they will face in the future,...

A High Risk Data Protection Strategy
Enterprisesecuritymag >> cioviewpoint

Randy Marchany, CISO, Virginia Tech

For years, security experts focused primarily on protecting their organization’s networks from malicious use. Sites like have documented successful attacks against all sectors of commerce, government and education. Only...

The Importance of Quantifying Risk
Enterprisesecuritymag >> cxoinsights

Jamie Samans, Director, Information Systems Security at American Institutes for Research

Your organization has a clear mission and a solid strategy, plus a comprehensive risk management program. However, people are constantly reacting to the effects of uncertainty, and even after years of diligent assessment, risk treatment decisions...

The Evolution of Cyber Attacks, Evolving with the Times
Enterprisesecuritymag >> cxoinsights

Michele Turner, SME, Risk and Compliance Industry, Head of Corporate Business Continuity, Amazon

The world of Malware and Cyber threats has grown significantly since the early 90’s, when PC Cyborg, the first known ransomware attack occurred. With a disgruntled biologist, and 20,000 floppy disks, Healthcare organizations across 90...

Understanding the Risks of IoT
Enterprisesecuritymag >> cxoinsights

David Barker, Director of Digital Product Security, Stanley Black & Decker

With the introduction of every technology wave comes a new attack surface that potentially exposes company data and certainly increases risk. Mobile devices were one of those waves and through mobile device management software, some level of...

Cyber Risk Management: A New Approach to Resolve Cybersecurity Issues
Enterprisesecuritymag >> news

Organizations grapple with constant monitoring, and other cyber threats and enhanced cybersecurity is the only option that businesses have to mitigate the risks. FREMONT, CA: Cyber risk is a threat that every small, medium, and big sized...

Combating Cybersecurity Challenges with Senior Leadership Support
Enterprisesecuritymag >> cioviewpoint

Ram Murthy, CIO, US Railroad Retirement Board

With ever-increasing information security and privacy risks, we must make our systems and processes more robust. Several federal agencies and well-established institutions have legacy systems built using an architecture that was deemed vigorous 40...

How Will Innovation Impact the Practice of Cybersecurity?
Enterprisesecuritymag >> cxoinsights

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

There is a plethora of new and exciting tools and innovation that can be used to support your cybersecurity efforts. Some, like moving to the cloud, will require a change in thinking and posture while others, such as AI, will potentially change...

A Strategic Approach to Enterprise- Wide Risk Management
Enterprisesecuritymag >> cxoinsights

Edward Marchewka, Director, Information and Technology, Gift of Hope Organ & Tissue Donor Network

Please elaborate on the challenges that the organizations face in addressing concerns related to information security. One of the fundamental challenges is having the right resources in order to secure their environment adequately. Today,...

Techno Security & Digital Forensics Conference 2018 - San Antonio
Enterprisesecuritymag >> news

The Texas edition of Techno Security & Digital Forensics Conference will take place September 17-19 at the Hyatt Regency in San Antonio, TX. This event provides a unique education experience that blends together the digital forensics and...

Leveraging Digital Monitoring to Boost Physical Security Efforts
Enterprisesecuritymag >> cxoinsights

Lawrence Mallory, Director, Physical Infrastructure Security, New York Power Authority

The New York Power Authority, the largest state-run utility in the nation, is continually working towards the goal of creating the first all-digital public power utility in the U.S. This aspiration is good news for physical security functions,...

Five Predictions that can change the phase of cyber security in 2018
Enterprisesecuritymag >> news

Cyber security is a topic that is increasingly receiving an awful lot of attention. Especially since the world we live in has companies storing their data in the cloud and depends on networking systems. Generally, when talking about the latest...

Leveraging ERM to drive Information Security (Cybersecurity) results
Enterprisesecuritymag >> cxoinsights

Chris Mandel, SVP & Director, Sedgwick Institute

Managing a risk, including cyber risk means identifying, tracking, scoring and valuing, normalizing and trending risk performance, including the net impacts. These steps are performed in accordance with compliance standards and aligned with risk...