enterprisesecuritymag

With an Aim to Optimize Telematics Security

With an Aim to Optimize Telematics Security

Kevin Baltes, CISSP Director & CISO – Product Cyber security, General Motors

Enterprise Architecture: Your Tool for Right- Sizing Security

Enterprise Architecture: Your Tool for Right- Sizing Security

Ted Kieffer, Director Enterprise Architecture, Grainger

For DDoS-Hope is NOT a Strategy!

For DDoS-Hope is NOT a Strategy!

Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

Seven security priorities for 2017

Seven security priorities for 2017

Jeff Harris, VP of security solutions, Ixia

Taking the Offensive Stance to Reflect Threats

Taking the Offensive Stance to Reflect Threats

Bill Donohue, CIO, GI-Logic, Inc.

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Louis J. Capponi, MD, FACP, Chief Medical Informatics Officer & Interim CIO, SCL Health

Business Goals for Implementing a Vulnerability Management Solution

Business Goals for Implementing a Vulnerability Management Solution

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest