csooutlook

Cyber Security and your Board

By Jamie Cutler, CIO, QEP Resources

It's Time to Turn Security Inside Out

By Gilad Raz, Chief Information Officer, Varonis

"Corporate Considerations: Dispelling the Myths of Cyber Security"

By Neil Jarvis, CIO, Fujitsu America, Inc.

Cybersecurity: A View from the Business Community

By Ann M. Beauchesne, SVP, National Security & Emergency Preparedness, U.S. Chamber of Commerce

Best Practices to Create Secure Policies and Take Full Advantage of IoT Evolution

By Jackson Shaw, Senior Director, Product Management, Dell

Best Practices to Create Secure Policies and Take Full Advantage of IoT Evolution

Everyone’s talking about the Internet of Things that infinite network of physical objects that collect and transmit data autonomously.

The Security Vulnerability You Can Prevent As IoT grows quickly, so should your skepticism of data security

By Jon Gelsey, CEO, Auth0

The Security Vulnerability You Can Prevent  As IoT grows quickly, so should your skepticism of data security

Auth0 simplifies identity implementation and management, making it easy for developers to implement even the most complex identity solutions for their web, mobile and internal applications,

CIO... Only Until the Next Data Breach

By Bob Fecteau, CIO, SAIC

Hype vs. Reality Cyber security is no doubt a significant global challenge, but I question whether we are expecting too much from our IT professionals and if we are giving them proper

Leaders have a Duty-of-Care for Preventing, Mitigating and Transferring the Risks of a Cyber Attack

By Arturo Perez-Reyes, SVP Cyber and Technology, HUB International

Leaders have a Duty-of-Care for Preventing, Mitigating and Transferring the Risks of a Cyber Attack

Large enterprises like Target, Sony and Home Depot may have grabbed headlines for recent cyber attacks, but small to mid-size businesses are the most exposed and the easiest prey.

Countering Cyber Vulnerabilities & Threats

By Roota Almeida, CISO, Delta Dental of New Jersey

Countering Cyber Vulnerabilities & Threats

Cyber Insurance and the Threat Landscape:In the recent years, the threat landscape has significantly changed and will continue to do so.

A Deeper View into the Threat Landscape

By James Carder, CISO & VP of LogRhythm Labs

A Deeper View into the Threat Landscape

The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime

Cloud Adoption A Road for Digital Business Growth

By Joan Pepin, VP of Security, CISO, Sumo Logic

Cloud Adoption A Road for Digital Business Growth

I believe the most important foundational thing CISOs and security professionals can do is to understand the expectations of the CEO, board, executive staff and peers or employees.

Hacking Team, Ransomware, and Virtualization-Enhanced Security

By Clinton Karr, Sr. Security Strategist, Bromium

Hacking Team, Ransomware, and Virtualization-Enhanced Security

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data.

Lessons Learned from a Barber

By Bruce Valk, CIO & VP, Silver Star Brands

Growing up as a barber’s son in a small rural Wisconsin town, I was unknowingly an early student of emotional intelligence as I listened to and observed the diverse clientele.

Security: From the Back Room to the Boardroom

By Bret Arsenault, VP & CISO, Microsoft Corporation

Security: From the Back Room to the Boardroom

Without a clear understanding of your security business and how it relates to the rest of your company, there is a risk of resource overcompensation in trying to mitigate cyber security threats.

Changing The Tenor Of The Conversation

By Mark Combs, CISO, WVU Healthcare

Changing The Tenor Of The Conversation

If government enforced penalties are really effective, then why are we still seeing breaches of sensitive information?

Five Enterprise IT Security Stats That May Surprise You

By Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Five Enterprise IT Security Stats That May Surprise You

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever the same.

Preventing Cyber-Attacks in Universities with Operational Collaboration

By Michael Corn, Deputy CIO & CISO, Brandeis University

Preventing Cyber-Attacks in Universities with Operational Collaboration

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging corporate networks.

Understanding Risks Helps Prioritization And Focus

By Elizabeth Hackenson, CIO and SVP of Global Business Services, AES

Understanding Risks Helps Prioritization And Focus

Information security is a broad challenge facing most businesses today and while given significant attention in recent years, it has intensified in the last 18 months.

Hyperconnected, Safe and Secure?

By Phil Agcaoili, SVP & CISO, Elavon

Hyperconnected, Safe and Secure?

In our now hyper interconnected world, critical lifeline services have been connected to the Internet. These lifeline services affect nearly every part of our lives and impact our economic livelihood, our public health and safety, and our national security.

Secure Your Cloud

By Sherry Ryan, VP & CISO, Juniper Networks

Secure Your Cloud

Before moving to any cloud environment, be sure that you really understand the vendor’s security strategy, resources, and SLA’s.

Beat the Bad Guys, Prioritize the Risk

By Tim Callahan, VP&CISO, Afla

Beat the Bad Guys, Prioritize the Risk

The modern security professional is being hit from all sides.

Current Issue

Hrtech Magazine