enterprisesecuritymag

For DDoS-Hope is NOT a Strategy!

For DDoS-Hope is NOT a Strategy!

Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

Seven security priorities for 2017

Seven security priorities for 2017

Jeff Harris, VP of security solutions, Ixia

Mobilizing Quality

Mobilizing Quality

James Pastor, VP of Quality, Adient

Taking the Offensive Stance to Reflect Threats

Taking the Offensive Stance to Reflect Threats

Bill Donohue, CIO, GI-Logic, Inc.

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Better, Faster, Cheaper: How Data Governance is Transforming Healthcare

Louis J. Capponi, MD, FACP, Chief Medical Informatics Officer & Interim CIO, SCL Health

The Public Sector CIO: Chief Cyber security Officer?

The Public Sector CIO: Chief Cyber security Officer?

David Whicker, CIO, Rockingham County

Business Goals for Implementing a Vulnerability Management Solution

Business Goals for Implementing a Vulnerability Management Solution

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

Four Reasons Why You Need a Third-Party Security Assessment

Four Reasons Why You Need a Third-Party Security Assessment

Jeff Cann, CIO, Encore Electric, Inc.

To MSSP or Not?

To MSSP or Not?

Rizwan Jan, Vice President, Chief Information Officer, The Henry M. Jackson Foundation for the Advancement of Military Medicine