enterprisesecuritymag

workflow

Road to Transform Digital Media Through Blockchain
Enterprisesecuritymag >> cxoinsights

Blockchain technology has gained popularity in last one year but many industries and sectors find it useful and have put up their views on how blockchain can transform and enhance the workflow. Another such industry is digital media which...

Android in Enterprise BYOD
Enterprisesecuritymag >> cxoinsights

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

The ever-changing cybersecurity strategy - how to get it right?
Enterprisesecuritymag >> cioviewpoint

Nilesh Jain, Vice President of SEA and India, Trend Micro

The cybersecurity landscape is closely interwoven with the ever-changing tech landscape. Advancements in technology must be equally reflected in cybersecurity. With increased adoption of cloud technologies, IoT, and connected systems, just to name...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

The CIO's Role in Promoting Digital Transformation
Enterprisesecuritymag >> cioviewpoint

Thomas Knapp, CIO, Waterstone Mortgage Corporation

All companies in every industry are challenged to define what digital transformation means for their enterprise, and how they will respond and develop strategies for adoption. In the mortgage industry where I operate, it is all about the...

Achieving Information Security in Healthcare
Enterprisesecuritymag >> cxoinsights

Dan Costantino, CISO, Penn Medicine

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs on a continual basis as it matures. It is critical to scrutinize whether you have...

QDiscovery Announces QPrivAlert to Quickly Find Potentially Privileged Communications
Enterprisesecuritymag >> cxoinsights

NEW LONDON, CT – QDiscovery today announced the launch of QPrivAlert, which provides case teams immediate access to and insight about the potentially privileged communications and documents within their dataset, as soon as the documents are...

The Digital Vision
Enterprisesecuritymag >> cioviewpoint

Cynthia Johnson, CIO, California Resources Corporation

The digital oilfield vision includes many use cases of technology. Advancements for the oilfield are keeping up and maybe outpacing Moore’s Law which suggests technology capability doubles every two years. However, the application of...

Why Security is More Pivotal than Ever in the Office of the Future
Enterprisesecuritymag >> cxoinsights

Hiro Imamura, Senior Vice President and General Manager, Business Imaging Solutions Group, Canon U.S.A.

When you think of security in an office setting, what comes to mind? Now picture that same office five years from now. Does the security landscape look the same? As the enterprises of today advance into the “Office of the Future,”...

Exploring the Capability of Blockchain and Big Data Collaboration
Enterprisesecuritymag >> cxoinsights

Blockchain seems to be the buzzword around all thing technology and to endorse this modern technology even big data is embracing its decentralized feature. Companies are scrambling to assimilate the utilization of big data in their day-to-day...

Blockchain Applications in the Energy Industry
Enterprisesecuritymag >> cxoinsights

James W. Vick, SVP Business Information Services, Southwestern Energy

New technologies being born out of necessity, futuristic thinking or simply intelligent innovation, are a constant in any line of business. As a CIO, my job is to shed a critical eye on the horizon ahead and envision what is possible with these...

Creating Efficient Government through Digital Transformation and Collaboration
Enterprisesecuritymag >> cxoinsights

David M. Bessen, Director & CIO, Arapahoe County Government

Being an early adopter of digital transformation creates opportunities for public agencies to gain significant efficiencies, to provide better citizen service and to lay the foundation for adopting AI or algorithmic-driven analyses and...

Securing the Healthcare Technologies
Enterprisesecuritymag >> cxoinsights

Helen Figge, Senior VP, Global Strategies and Development, LumiraDx USA, Inc.

1) What do you see as a big challenge in technology to meet the challenges of your industry? The most practical answer is using the technologies to assist in complying with new government requirements and mandates. The technologies need to be...

Trends Impacting IT Infrastructure
Enterprisesecuritymag >> cioviewpoint

John M. Daane, DoIT (Director of Information Technology) at Emerald Coast Utilities Authority

What do you see as a big challenge in technology to meet the challenges of your industry? There are things that make every industry provider slightly unique, even if they deliver the same service or product. It is the nature of doing business...

Underwriting Workstations Enable Insurance Transformation
Enterprisesecuritymag >> csoinsight

John Belizaire, CEO, FirstBest Systems

A transformational outlook is emerging among chief information officers in property/casualty insurance companies. It is a mandate for change and technology enabled growth. In pursuing this mandate, insurance CIOs and their business counter...

Understanding Insurance Security
Enterprisesecuritymag >> vendor

Sean Murphy, VP & CISO, Premera Blue Cross

Traditionally, the healthcare industry has been reluctant to embrace the cloud. In many cases, for good reason. There were unclear supplier obligations under HIPAA along with sketchy access and data control provisions that really slowed adoption....

The Future Belongs to the Informed
Enterprisesecuritymag >>

Anthony J. Scriffignano, SVP-Worldwide Data

Anthony J. Scriffignano, SVP-Worldwide Data & Insight, Dun & Bradstreet Much like the cortex of the brain and frontal lobes associated with self-control, planning, reasoning and abstract thought, Big Data synthesis is central to the...

Creating a Culture for IT Innovation
Enterprisesecuritymag >>

Steve Rice, CIO, Transportation Security Administration (TSA)

November 19th marked the 15-year anniversary of the Transportation Security Administration (TSA), the first agency charged with securing the Nation’s transportation systems from terrorist attacks. Today TSA operates in more than 450 airports...

Data-Driven Risk Management
Enterprisesecuritymag >>

Ron Mehring, CISO, Texas Health Resources

When I was asked to write an article for CSO Outlook, I pondered what has been the prominent function or activity that has made the biggest difference in the way I lead  information security. By far, it has to be the employment of robust risk...

Deloitte: Multi-pronged Approach for Information Security Assurance
Enterprisesecuritymag >>

Chris Ruggeri, Principal with Deloitte Risk and Financial Advisory

Deloitte, a pioneer among the information security solution providers, is a professional network of multinationals; it is also the world's largest professional services network with revenue and a number of professionals. It is one of the "Big...