enterprisesecuritymag

Managed Security Services Do Not Replace Knowing What Your Organizational Needs Are

Managed Security Services Do Not Replace Knowing What Your Organizational Needs Are

Lester Godsey, CISM & PMP, Chief Information Security and Privacy Officer, City of Mesa

Importance Of Adopting a Multi-Pronged Approach to Secure Networks

Importance Of Adopting a Multi-Pronged Approach to Secure Networks

Robbie Corley, CISO,Kentucky Community & Technical College System

Eliminating the Risk of Your Wireless Network

Eliminating the Risk of Your Wireless Network

Richard Timbol, ISSM/CISO, Davis Polk & Wardwell LLP

Seven security priorities for 2017

Seven security priorities for 2017

Jeff Harris, VP of security solutions, Ixia

Taking the Offensive Stance to Reflect Threats

Taking the Offensive Stance to Reflect Threats

Bill Donohue, CIO, GI-Logic, Inc.

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Louis J. Capponi, MD, FACP, Chief Medical Informatics Officer & Interim CIO, SCL Health

Business Goals for Implementing a Vulnerability Management Solution

Business Goals for Implementing a Vulnerability Management Solution

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest