enterprisesecuritymag

utilities

A Cyber Security Metrics Tool for Utilities
Enterprisesecuritymag >> cxoinsights

Mark McGranaghan, VP, Distribution & Utilization, EPRI

As cyberthreats grow and become more sophisticated, utilities must constantly evaluate and improve the effectiveness of security programs. Moreover, utilities must manage their security programs across both traditional information technology (IT)...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Meeting the Cybersecurity Challenge
Enterprisesecuritymag >> cioviewpoint

Scott Self, CIO, Tennessee Valley Authority

In an unassuming room anywhere in the world, a shadowy figure faces a computer screen. He isn’t armed with a gun or a bomb, because he doesn’t need one; he is a criminal who does his work with a keyboard and mouse. And if he is able,...

Provensec: Vulnerability Management Platform Built in the Cloud
Enterprisesecuritymag >> vendor

Russell Poffenroth, VP, Sales & Marketing

Provensec, a well-known vulnerability management solution provider, has become a leader in the safety and vulnerability assessment market. The security market in the enterprise traditionally focuses on alleviating elements of fear, uncertainty,...