enterprisesecuritymag

risk

Upholding the Principle of Cyber-Awareness
Enterprisesecuritymag >> cxoinsights

Gabor L. Varjas, Group Chief Information Security Officer, MOL Group

MOL Group is an integrated, international oil and gas company, headquartered in Budapest, Hungary. It is active in over 30 countries with a dynamic international workforce of 25,000 people and a track record of more than 100 years in the...

Devising Effective Disaster Recovery Strategies
Enterprisesecuritymag >> cxoinsights

David Nichols, Chief Risk Officer, Xinja

Every organization requires a comprehensive disaster recovery strategy in response to natural as well as human-induced disasters, which eliminates the element of surprise and facilitates an all-round recovery of systems. Oftentimes, even the most...

Devising Effective Disaster Recovery Strategies
Enterprisesecuritymag >> cxoinsights

David Nichols, Chief Risk Officer, Xinja

Every organization requires a comprehensive disaster recovery strategy in response to natural as well as human-induced disasters, which eliminates the element of surprise and facilitates an all-round recovery of systems. Oftentimes, even the most...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

How Will Innovation Impact the Practice of Cybersecurity?
Enterprisesecuritymag >> cxoinsights

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

There is a plethora of new and exciting tools and innovation that can be used to support your cybersecurity efforts. Some, like moving to the cloud, will require a change in thinking and posture while others, such as AI, will potentially change...

How Will Innovation Impact the Practice of Cybersecurity?
Enterprisesecuritymag >> cxoinsights

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

There is a plethora of new and exciting tools and innovation that can be used to support your cybersecurity efforts. Some, like moving to the cloud, will require a change in thinking and posture while others, such as AI, will potentially change...

The Guardian of Electric Utilities
Enterprisesecuritymag >> cxoinsights

Bill Lawrence, NERC Vice President, Chief Security Officer, and Director of the Electricity Information Sharing and Analysis Center

The Electricity Information Sharing and Analysis Center (E-ISAC), run by the North American Electric Reliability Corporation,is using twokey tools to reduce cyber and physical security risk to the enterprise systems of electric utilities. The...

iComply Launches Public Beta to Deliver Legitimacy to Security Token Platforms and Exchanges
Enterprisesecuritymag >> cxoinsights

VANCOUVER, British Columbia -  iComply Investor Services ("iComply"), a leading global regtech platform for digital finance and cryptocurrencies is announcing the launch of its public beta following the closure of a...

Cybersecurity in the Era of Open Banking
Enterprisesecuritymag >> cxoinsights

Istvan Rago, Country Chief Security Officer, Head of Security Management, Erste Bank Hungary

Open banking The European Union has reshaped rules of payment services by the Second edition of Payment Services Directive (PSD2), granting third parties access to customers’ payment account. Although PSD2 is effective, since January...

Cybersecurity in the Era of Open Banking
Enterprisesecuritymag >> cxoinsights

Istvan Rago, Country Chief Security Officer, Head of Security Management, Erste Bank Hungary

Open banking The European Union has reshaped rules of payment services by the Second edition of Payment Services Directive (PSD2), granting third parties access to customers’ payment account. Although PSD2 is effective, since January...

It's Time to Take the NYDFS Cybersecurity Regulation Seriously
Enterprisesecuritymag >> cxoinsights

Tom Stamulis, Senior Director, Alvarez & Marsal

It has been six months since the New York Department of Financial Services (NYDFS) released its controversial cybersecurity regulation (23 NYCRR 500) on March 1st. If your organization is considered a Covered Entity affected by the regulation, it...

It's Time to Take the NYDFS Cybersecurity Regulation Seriously
Enterprisesecuritymag >> cioviewpoint

Tom Stamulis, Senior Director, Alvarez & Marsal

It has been six months since the New York Department of Financial Services (NYDFS) released its controversial cybersecurity regulation (23 NYCRR 500) on March 1st. If your organization is considered a Covered Entity affected by the regulation, it...

Payment Security theft
Enterprisesecuritymag >> cxoinsights

Digitization is the master key that resolves a host of agendas. It has enabled hassle-free transfers in the nick of time; financial institutions use the internet for monetary transactions to mitigate the challenges that physical barriers presented...

Techno Security & Digital Forensics Conference 2018 - San Antonio
Enterprisesecuritymag >> cxoinsights

The Texas edition of Techno Security & Digital Forensics Conference will take place September 17-19 at the Hyatt Regency in San Antonio, TX. This event provides a unique education experience that blends together the digital forensics and...

Techno Security & Digital Forensics Conference 2018 - San Antonio
Enterprisesecuritymag >> cxoinsights

The Texas edition of Techno Security & Digital Forensics Conference will take place September 17-19 at the Hyatt Regency in San Antonio, TX. This event provides a unique education experience that blends together the digital forensics and...

Information Security is More than Information Technology
Enterprisesecuritymag >> cxoinsights

Nick Coussoule, SVP & CIO, BlueCross BlueShield of Tennessee

Training. Education. Role play. More training. These are the key ingredients of a secure organization, because at its core, information security is about people. Generally they are the weakest link in the security chain, yet they are also the...

How's Your Appetite: Tips for Setting and Measuring One for Organizational Cyber Risk
Enterprisesecuritymag >>

Jon Murphy, CISO, Ocwen Financial Corporation

Significant business-as-usual interruptions are increasingly occurring due to cyber-attacks. Daily, more organizations are becoming cybersecurity (cybersec) risk apprehensive. Consequently, the demand to manage the risk, establish appetites, and...

Battlefield Principles for Cybersecurity Leaders
Enterprisesecuritymag >>

Jake Margolis, CISO, Metropolitan Water District of Southern California

Prior to becoming a CISO, I served in the California National Guard and U.S. Army as an Information Assurance professional and Brigade Signal Officer. The lessons and experiences that shaped my career were not learned through technical training or...

Cyber Incident and Breach Response Planning: Is It an Option Any Longer?
Enterprisesecuritymag >>

Jim Holtzclaw, SVP, Marsh Risk Consulting’s Cybersecurity Consulting and Advisory Services Practice

Cyber threats and related breach events are a fact of life for today’s organizations. Almost every business relies on the internet or utilizes connected technologies in some way in their operations or to generate revenue. A well-developed...

5 Practical Ingredients to Perform CriticalVulnerability Management Testing
Enterprisesecuritymag >>

Tim Callahan, SVP, Global Chief Security Officer, Aflac

We should all be careful not to overuse the public lessons learned from the Equifax event. There are probably facts that an outsider just doesn’t know, and there likely are deeper root causes that led to their breach. But, we should not...