enterprisesecuritymag

roi

Top 5 Steps CIOs Should Execute to Upgrade On-Premises IAM Environment
Enterprisesecuritymag >> cxoinsights

Every enterprise should consider a few parameters before moving IAM to the cloud. The steps given below help organizations to observe their data and secure it keenly. FREMONT, CA: With the evolving on-premises identity and access management...

What are the Problems the Security Personnel have to deal with VM Program?
Enterprisesecuritymag >> cioviewpoint

Challenges are an important part of every security program. Security professionals can eradicate most of the security issues if they are backed up by the management. It is essential for the management of every company to focus on their security...

Fastman Launch Access Manager and Digital Signature Automation Platforms for DocuSign
Enterprisesecuritymag >> cioviewpoint

The two anticipated updates from Fastman provide the latest digital signature and OpenText read-only License compliance solutions. FREMONT, CA: Fastman, a platform for providing information security and management services and solution for...

The World of Cybersecurity - An Investor's Eye View
Enterprisesecuritymag >> cxoinsights

Daniel Gomez, Investor, Fusion Fund

1) What sort of opportunities does Fusion Fund target? Fusion Fund is an early stage venture firm based in Palo Alto, CA that invests in companies that monetize core technical advantages in their business model. We leverage our team’s...

Innovation is the Key to Success
Enterprisesecuritymag >> cxoinsights

Kim Jacques, CIO, Lombard International

What do you see as a big challenge in technology today? If you were to write down a wish list, what solutions are you looking forward to and what are your expectations from technology providers? In my opinion, the biggest challenge we face...

The "Cambrian" Robotic Explosion has Begun
Enterprisesecuritymag >> cxoinsights

David Tamayo, CIO, DCS Corporation

In the early 1990’s Juarez, Mexico, I was interviewing local management of a large multinational corporation who assembled large television sets. For each TV, there were 3,200 people in a line assembly each earning $0.57 per hour and when my...

Challenges of AI adoption in an Enterprise
Enterprisesecuritymag >> cioviewpoint

It is evident that the enterprise leaders are taking a serious interest in understanding the adoption of Artificial intelligence (AI) and Machine learning (ML) because these can provide better ROI (Return on Investment). But,...

Implementations of Artificial Intelligence and Machine Learning
Enterprisesecuritymag >> cioviewpoint

Artificial intelligence (AI) and machine learning (ML) are the new age technologies that already have made an impact on the workflow of industries. Tech giants have utilized them optimally and continue to do the same as these...

You Want to Do What With your Data?
Enterprisesecuritymag >> cxoinsights

Andrew Sohn, SVP - Global Digital and Analytics Srvcs, Crawford & Company

Any business that’s over a few months old has a lot of data. Businesses that are several years old have tons of data. Large, established businesses and digital native companies are drowning in data, and are having a hard time just figuring...

Data is the Lifeline of Today's Businesses; But Why Are So Many Business Leaders Still Making Guesswork?
Enterprisesecuritymag >> cioviewpoint

Eric Thain, General Manager, HK Express

There is no doubt on the importance of data in today’s businesses. The C-Suite recognizes the need to focus on data and in fact, data and analytics ranks the highest of the top five investment priorities for CEOs today (according to the...

Leading the Technological Wave
Enterprisesecuritymag >> cioviewpoint

Denise Dettingmeijer, CFO, Randstad North America

Current Role of a CFO I have always had IT report to me as the Chief Financial Officer (CFO). It was an eye-opening transition for me as CFO of Randstad, when figuring out how to place the business, company and external functions around an IT...

CIO Hall of Faces
Enterprisesecuritymag >> csoinsight

Tom Basiliere, CIO, Provant

Among the many kingdoms in the popular “Game of Thrones” series, there is a secluded island that is home to an ancient temple and a clan of assassins. In this temple, there is a special room called the Hall of Faces. Arya, one of the...

AI becomes "Personal"
Enterprisesecuritymag >> cxoinsights

Sherif Mityas, CIO & CSO, TGI Fridays

Imagine it’s Thursday night, the kids have soccer practice and you’re always looking for a place to pick-up dinner on the way home. The kids love pasta, your spouse prefers salad, and you’re craving your favorite burger. But the...

Journey from Intelligent Automation (IA) to Artificial Intelligence (AI)
Enterprisesecuritymag >> cxoinsights

Sanjay Choubey, VP-IT, Briggs & Stratton

Imagine it’s Thursday night, the kids have soccer practice and you’re always looking for a place to pick-up dinner on the way home. The kids love pasta, your spouse prefers salad, and you’re craving your favorite burger. But the...

The Power of Artificial Intelligence (AI)
Enterprisesecuritymag >> cioviewpoint

Aaron Gette, CIO, The Bay Club Company

If you’re an avid fan of HBO's Silicon Valley, as I am, you may have recently downloaded the iOS app “Not Hotdog,” that was introduced on the show and developed in real life using real AI, in a ruse of ingenious marketing....

Evolving Data Security Involves Database Architecture
Enterprisesecuritymag >>

Tom Basiliere, CIO, Provant

A few weeks ago, my wife got a call from my daughter. She called to ask us about the risk of using a mobile funds exchange service that required her to enter her bank account number into a mobile app so that funds could be transferred in and out...

Addressing Cyber Attacks
Enterprisesecuritymag >>

Mark Connelly, CISO, Boston Consulting Group

Cyber attacks are in the news every day. The frequent headlines and intense media scrutiny have brought the topic to the forefront of public attention. Could this be the worst of times for information security? Given the reports, it may seem...

Think Fighting Email Fraud is Someone Else's Job? Here's the Real Cost of Doing Nothing
Enterprisesecuritymag >>

Dennis Dayman, Chief Privacy and Security Officer at Return Path

Cyberattacks against your brand can be very damaging and costly to both your revenue and your reputation. Cyberattacks are more than someone breaking into your databases or systems and stealing data; instead, this term refers to fraud and the...

Think Fighting Email Fraud is Someone Else's Job? Here's the Real Cost of Doing Nothing
Enterprisesecuritymag >>

Dennis Dayman, Chief Privacy and Security Officer at Return Path

Cyberattacks against your brand can be very damaging and costly to both your revenue and your reputation. Cyberattacks are more than someone breaking into your databases or systems and stealing data; instead, this term refers to fraud and the...

Security in the Age of IoT
Enterprisesecuritymag >>

Delano Collins, CIO, EDTS, LLC

IoT or the “Internet of Things” refers to the growing trend of network connectivity and shared intelligence between disparate devices. Nowhere is this evident in our practice, than in our automation and video surveillance solutions....