enterprisesecuritymag

Implementing Software-Defined Everything in the Data Center

Implementing Software-Defined Everything in the Data Center

Jim Livingston, CTO, University of Utah Health

Protecting the Castle: Business' changing security landscapes

Protecting the Castle: Business' changing security landscapes

Vincent J. Simonowicz, CIO, City of Rock Hill, SC

BYOD: How to Safeguard Your Company's Data with Policies and Procedures That Address Visual Security Threats

BYOD: How to Safeguard Your Company's Data with Policies and Procedures That Address Visual Security Threats

Rebecca Herold, President Of SIMBUS LLC, CEO Of The Privacy Professor And 3M Visual Privacy Leaders Council , Faculty Member OF IAPP - International Association Of Privacy Professionals

How Will Innovation Impact the Practice of Cybersecurity?

How Will Innovation Impact the Practice of Cybersecurity?

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

The Guardian of Electric Utilities

The Guardian of Electric Utilities

Bill Lawrence, NERC Vice President, Chief Security Officer, and Director of the Electricity Information Sharing and Analysis Center

The Path to Drive Success with MSSP

The Path to Drive Success with MSSP

David Stern, CISO, BGC Partners

Five Enterprise IT Security Stats That May Surprise You

Five Enterprise IT Security Stats That May Surprise You

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Clear Focus Areas Required For Information Security

Clear Focus Areas Required For Information Security

Jan Billiet, Director IS Security & Risk Management, Philip Morris International