enterprisesecuritymag

survey

U.S. Businesses and the General Data Protection Regulation
Enterprisesecuritymag >> cxoinsights

Greg Sparrow, SVP/GM, CompliancePoint

The General Data Protection Regulation (GDPR) is a European Union based regulation that requires businesses to protect the personal data and the privacy of any European Union (EU) natural persons when transactions occur within EU states. Data...

Reading the Cloud Tealeaves in 2018
Enterprisesecuritymag >> cxoinsights

Sean Hackett, Research Director Cloud and SaaS, IDC

The key to successfully reading the cloud tealeaves in 2018 will center on one’s ability to more deeply understand the “why” of adoption and the “how” of implementation. There is no question that Cloud adoption for...

Future-Proofing Your Enterprise for the New ICT: Immersive, Cognitive, and Trusted
Enterprisesecuritymag >> cxoinsights

Scott Snyder, Chief Technology and Innovation Officer, Safeguard Scientifics and Senior Fellow, The Wharton School

Over a century ago, Sears grew from an upstart mail-order watch retailer to become one of the top retailers in the U.S., opening physical stores and expanding into other categories such as internet services, credit cards, and even insurance....

Information Security: Your People, Your First Line of Defense
Enterprisesecuritymag >> cioviewpoint

Eddie Borrero, CISO, Robert Half [NYSE:RHI]

A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Why CIOs are Embracing Enterprise Risk Management to Improve Cybersecurity
Enterprisesecuritymag >> cxoinsights

David Burg, Global & U.S. Advisory Cyber Security Leader, PwC

Businesses across sectors and around the world have reached a tipping point on cybersecurity. As risks continue to escalate, it’s becoming clear that existing approaches simply are not working. In The Global State of Information Security...

The Security Vulnerability You Can Prevent As IoT grows quickly, so should your skepticism of data security
Enterprisesecuritymag >> cxoinsights

Jon Gelsey, CEO, Auth0

Auth0 simplifies identity implementation and management, making it easy for developers to implement even the most complex identity solutions for their web, mobile and internal applications, APIs and IoT devices. "The majority of IoT...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Addressing Cyber Security Strategically
Enterprisesecuritymag >> cioviewpoint

David L Stevens, CIO, Maricopa County

Cyber Security has increasingly become more important to an organizations’ ability to conduct business. This stems from the high visibility associated with large data breaches that have been reported by various fortune 500 companies. As a...

The Security Vulnerability You Can Prevent As IoT grows quickly, so should your skepticism of data security
Enterprisesecuritymag >> cxoinsights

Jon Gelsey, CEO, Auth0

Auth0 simplifies identity implementation and management, making it easy for developers to implement even the most complex identity solutions for their web, mobile and internal applications, APIs and IoT devices. "The majority of IoT...

Why the Cloud May be the Safest Place to Store Your Sensitive Data
Enterprisesecuritymag >> cxoinsights

David Burg, Principal and Global and US Advisory Cybersecurity leader, PwC

The use of cloud computing is officially mainstream across most industries, yet many executives still worry that provider security practices remain inadequate to protect sensitive data and mission-critical workloads. It’s a long-held...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Addressing Cyber Security Strategically
Enterprisesecuritymag >> cioviewpoint

David L Stevens, CIO, Maricopa County

Cyber Security has increasingly become more important to an organizations’ ability to conduct business. This stems from the high visibility associated with large data breaches that have been reported by various fortune 500 companies. As a...

Why CIOs are Embracing Enterprise Risk Management to Improve Cybersecurity
Enterprisesecuritymag >> cxoinsights

David Burg, Global & U.S. Advisory Cyber Security Leader, PwC

Businesses across sectors and around the world have reached a tipping point on cybersecurity. As risks continue to escalate, it’s becoming clear that existing approaches simply are not working. In The Global State of Information Security...

Real-time Security Analytics for Visibility and Incident Detection
Enterprisesecuritymag >> cxoinsights

Brian Smith, CTO, Click Security

Gary Loveman, CEO of Caesars Entertainment, says there are three ways to get fired from the hotel and casino company: theft, sexual harassment, and running an experiment without a control group. Analytics has transformed businesses from operating...