enterprisesecuritymag

Seven security priorities for 2017

Seven security priorities for 2017

Jeff Harris, VP of security solutions, Ixia

Taking the Offensive Stance to Reflect Threats

Taking the Offensive Stance to Reflect Threats

Bill Donohue, CIO, GI-Logic, Inc.

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Louis J. Capponi, MD, FACP, Chief Medical Informatics Officer & Interim CIO, SCL Health

Business Goals for Implementing a Vulnerability Management Solution

Business Goals for Implementing a Vulnerability Management Solution

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

The Way toward a Diligent Security Environment

The Way toward a Diligent Security Environment

Michael Makstman, CISO, City and County of San Francisco

Information Governance = Data Governance + Disclosure

Information Governance = Data Governance + Disclosure

Tera Ladner, Director, Information Governance, Aflac