enterprisesecuritymag

risk management

How Will Innovation Impact the Practice of Cybersecurity?
Enterprisesecuritymag >> cxoinsights

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

There is a plethora of new and exciting tools and innovation that can be used to support your cybersecurity efforts. Some, like moving to the cloud, will require a change in thinking and posture while others, such as AI, will potentially change...

Techno Security & Digital Forensics Conference 2018 - San Antonio
Enterprisesecuritymag >> cxoinsights

The Texas edition of Techno Security & Digital Forensics Conference will take place September 17-19 at the Hyatt Regency in San Antonio, TX. This event provides a unique education experience that blends together the digital forensics and...

Leveraging Digital Monitoring to Boost Physical Security Efforts
Enterprisesecuritymag >> cxoinsights

Lawrence Mallory, Director, Physical Infrastructure Security, New York Power Authority

The New York Power Authority, the largest state-run utility in the nation, is continually working towards the goal of creating the first all-digital public power utility in the U.S. This aspiration is good news for physical security functions,...

Five Predictions that can change the phase of cyber security in 2018
Enterprisesecuritymag >> cxoinsights

Cyber security is a topic that is increasingly receiving an awful lot of attention. Especially since the world we live in has companies storing their data in the cloud and depends on networking systems. Generally, when talking about the latest...

Leveraging ERM to drive Information Security (Cybersecurity) results
Enterprisesecuritymag >> cxoinsights

Chris Mandel, SVP & Director, Sedgwick Institute

Managing a risk, including cyber risk means identifying, tracking, scoring and valuing, normalizing and trending risk performance, including the net impacts. These steps are performed in accordance with compliance standards and aligned with risk...

Implementing a Cyber-Security Program - The Journey of True Partnership with IT
Enterprisesecuritymag >> cxoinsights

Maurice Edwards, Senior Vice-President Enterprise Risk, Mattress Firm

Over the past 7 years, Mattress Firm has been one of the hottest retailers in the world increasing their store count from over 750 stores to over 3,500 stores resulting from both organic growth and acquisitions. As is the case with many...

Top Five Life-skills I Have Learned from Mentors
Enterprisesecuritymag >> cioviewpoint

Gary Hayslip, CISSP, Vice President & CISO, Webroot Inc.

I am often asked about the importance of mentorship, what value does it provide and has it helped me with my career? Of course, my answer to them is that I am a big proponent of mentorships and yes I actually have several mentors. The formal...

A Framework for Secure, Mission-Ready Cloud Solutions
Enterprisesecuritymag >> cioviewpoint

John Nemoto, VP, CGI Federal Inc

In the past year or so, the U.S. Department of Defense (DoD) has made a number of changes to make it easier for DoD agencies to buy cloud services, including accepting some additional risk for less mission-critical data. The Defense Information...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cxoinsights

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cxoinsights

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

The Art of Cybersecurity
Enterprisesecuritymag >> cxoinsights

Ken Barnhart, Founder & CEO, The Occam Group, Ltd

Fredrick the Great once told his Generals, “That to defend everything is to defend nothing.”  There is no disputing that IT security and Risk Management professionals face an escalating and diversifying threat, but nobody has the...

The State of the Cybersecurity Threat Landscape
Enterprisesecuritymag >> csoinsight

Don Dixon, Board of Directors, Odyssey Logistics & Technology Corporation & Alberto Yepez, Board of Directors, Coveo

Alberto Yepez and Don Dixon are co-founders and managing directors of Trident Capital Cybersecurity, an early stage venture capital fund focused on investing in new technologies in cybersecurity.  ...

Fraud Prevention Best Practices For On-boarding New Customers
Enterprisesecuritymag >> cioviewpoint

Garrett Gafke, CEO, Identity Mind Global

In 2015, 13 million Americans lost more than $15 billion dollars at the hands of identity thieves. Those are staggering figures, and the news gets worse for Financial Technology (FinTech) companies. Fraudsters, thwarted by new...

Ongoing Authorization: Changing how Government does Security Compliance
Enterprisesecuritymag >> cioviewpoint

Jeff Eisensmith, CISO, DHS

The Department of Homeland Security is the steward of a great deal of information. Information used to support the department’s mission, personally identifiable information of the citizens we serve, and that of our employees must be...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >> cxoinsights

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

Addressing Cyber Security Strategically
Enterprisesecuritymag >> cioviewpoint

David L Stevens, CIO, Maricopa County

Cyber Security has increasingly become more important to an organizations’ ability to conduct business. This stems from the high visibility associated with large data breaches that have been reported by various fortune 500 companies. As a...

Hyperconnected, Safe and Secure?
Enterprisesecuritymag >> cioviewpoint

Phil Agcaoili, SVP & CISO, Elavon

In our now hyper interconnected world, critical lifeline services have been connected to the Internet. These lifeline services affect nearly every part of our lives and impact our economic livelihood, our public health and safety, and our national...

Gearing up To Protect against Security Breaches
Enterprisesecuritymag >> csoinsight

Paul Leury, CIO, & David Mason, Director, The Boon Group

Needless to say, for CIOs, security has always been on our radar. But it seems like members of our executive teams are just now joining us in our concern. In response to the increased frequency, impact, and media spectacle of security breaches,...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >>

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

Data-Driven Risk Management
Enterprisesecuritymag >>

Ron Mehring, CISO, Texas Health Resources

When I was asked to write an article for CSO Outlook, I pondered what has been the prominent function or activity that has made the biggest difference in the way I lead  information security. By far, it has to be the employment of robust risk...