enterprisesecuritymag

technology

Three Innovative Cybersecurity Technologies of 2018
Enterprisesecuritymag >> cxoinsights

The ongoing war between security experts and cyber actors have become a cat and mouse game. This era of digital transformation is affecting the cybersecurity, and therefore this ever-changing industry has to be more responsible regarding the cyber...

Be Proactive-Make Information Security a Priority
Enterprisesecuritymag >> cxoinsights

Donald Good, Director, Global Legal Technology Solutions, Navigant [NYSC:NCI]

The cyber threat has never been more complex or dynamic. Financial institutions, large and small corporations, medical providers, law firms, accounting firms, and government agencies are targeted with increasing frequency by highly skilled...

Fostering the Culture of 'Security as a Valued Skill' to the Organization
Enterprisesecuritymag >> cioviewpoint

Dr. Andreas Kuehlmann, SVP and General Manager, Synopsys Software Integrity Group

• What do you think are the biggest obstacles that technologists face in working in a more agile and outcomes based model? As organizations transition to a more agile and continuous development model, software security needs to be...

The Power of Technology for Non-Profit Organizations
Enterprisesecuritymag >> cxoinsights

Gail Hyde, VP-IT & CIO, Habitat for Humanity International

At Habitat for Humanity International, technology plays a large role in our efforts to help people build strength, stability and independence through shelter and transform communities around the world. Any nonprofit international nonprofits in...

Fighting Financial Crime with Forensic Technologies
Enterprisesecuritymag >> cioviewpoint

Technology plays a significant role in detecting fraud cases in organizations and decreasing the cost of financial crime compliance and investigations. With this, digital forensics has gone to the fore as controllers, market players and...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cioviewpoint

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

The Digital Vision
Enterprisesecuritymag >> cxoinsights

Cynthia Johnson, CIO, California Resources Corporation

The digital oilfield vision includes many use cases of technology. Advancements for the oilfield are keeping up and maybe outpacing Moore’s Law which suggests technology capability doubles every two years. However, the application of...

Secure Payments Partnership: Payment Security Alliance with Biometrics and AI
Enterprisesecuritymag >> cxoinsights

Biometrics is gaining constant popularity as an authentication tool in numerous industries and contexts, including the financial services sector. Technology developments—especially, enhanced accuracy and lower costs of biometric solutions,...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >> cxoinsights

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

Spring into Action! Growing Enterprise Architecture for Business Seasons
Enterprisesecuritymag >> cxoinsights

Martha Tartal, EA, United States Patent and Trademark Office

“Spring is the time of plans and projects.” Leo Tolstoy The sight of cherry blossoms may signify more than an end to cold weather. Depending on your organization’s budget cycle, the season of IT planning may also be in bloom....

The Rising Managed Security Service Providers
Enterprisesecuritymag >> cxoinsights

As security breaches top the headlines, protecting enterprise information has become a great challenge to businesses of all sizes. Besides, most organizations lack security experts and the required budget to secure their crucial network...

Cloud Costs Love-Hate Relationship Advice Using F1 Tech and Bulk Sugar
Enterprisesecuritymag >> cioviewpoint

Brent E, VP Technology Optimization, Ticketmaster

Interesting Cloud Cost article by CIO I have some advice that has been socialized with hundreds of folks and 100+ enterprises over the years. 8+ years and millions of unique workloads measured and optimized later, I am finding some analogies...

IT Security Enters the Boardroom
Enterprisesecuritymag >> cxoinsights

Bill Bradley, SVP, Cyber Engineering and Technology Services at CenturyLink[NYSE:CTL]

Not too long ago, IT issues such as cybersecurity and data protection were reserved for the back office – and rarely considered by organizations in driving revenue and aligning market strategy. These efforts even ran independent of...

5 Practical Ingredients to Perform CriticalVulnerability Management Testing
Enterprisesecuritymag >> cioviewpoint

Tim Callahan, SVP, Global Chief Security Officer, Aflac

We should all be careful not to overuse the public lessons learned from the Equifax event. There are probably facts that an outsider just doesn’t know, and there likely are deeper root causes that led to their breach. But, we should not...

8 Cyber Security Improvements to Reach the Next Level of Maturity
Enterprisesecuritymag >> cioviewpoint

Michael Benz, VP Information Technology, Kraus-Anderson Construction Co.

Cybersecurity is on everyone’s mind and in everyone’s Twitter feed. Every week, we see troublesome news stories about the latest vulnerability, malicious hack, or data breach. Companies are looking to their CIO, with the expectation...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >> cioviewpoint

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...

The Transformative Role of Software for Payments: Synergies, Opportunities and the Retail Experience
Enterprisesecuritymag >>

Amy Zirkle, Vice President, Industry Affairs, Electronic Transactions Association

There are few industries yet untouched by the tidal wave of technological innovation. Where there is a product to be developed or a service to be delivered, technology is rapidly transforming its related workflows, supply chains, and...

Creating Efficient Government through Digital Transformation and Collaboration
Enterprisesecuritymag >>

David M. Bessen, Director & CIO, Arapahoe County Government

Being an early adopter of digital transformation creates opportunities for public agencies to gain significant efficiencies, to provide better citizen service and to lay the foundation for adopting AI or algorithmic-driven analyses and...

Creating Efficient Government through Digital Transformation and Collaboration
Enterprisesecuritymag >>

David M. Bessen, Director & CIO, Arapahoe County Government

Being an early adopter of digital transformation creates opportunities for public agencies to gain significant efficiencies, to provide better citizen service and to lay the foundation for adopting AI or algorithmic-driven analyses and...

The Industrial IoT Attack Surface
Enterprisesecuritymag >>

Matt Griffiths, Vice President, Data-Driven Transformation, Stanley Black & Decker, Inc.

Across the Industrial Manufacturing sector, the average plant and equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...