enterprisesecuritymag

Cybersecurity Enabled by Zero Trust

Cybersecurity Enabled by Zero Trust

Raj Badhwar, SVP, Chief information security officer, Voya Financial

The Need for IoMT Asset Management

The Need for IoMT Asset Management

Michael Sardaryzadeh, Information Security Officer, Texas A&M University

The Security Assurance Threat

The Security Assurance Threat

Dan Polly, Director, Enterprise Information Security at First Financial Bank

The Threat in Your Pocket

The Threat in Your Pocket

Veysel Erdag, Chief Information Security Officer at University of Arkansas at Little Rock

Implementing Software-Defined Everything in the Data Center

Implementing Software-Defined Everything in the Data Center

Jim Livingston, CTO, University of Utah Health

Protecting the Castle: Business' changing security landscapes

Protecting the Castle: Business' changing security landscapes

Vincent J. Simonowicz, CIO, City of Rock Hill, SC

BYOD: How to Safeguard Your Company's Data with Policies and Procedures That Address Visual Security Threats

BYOD: How to Safeguard Your Company's Data with Policies and Procedures That Address Visual Security Threats

Rebecca Herold, President of SIMBUS LLC, CEO of the Privacy Professor and 3M Privacy Consultant

The Guardian of Electric Utilities

The Guardian of Electric Utilities

Bill Lawrence, NERC Vice President, Chief Security Officer, and Director of the Electricity Information Sharing and Analysis Center

The Path to Drive Success with MSSP

The Path to Drive Success with MSSP

David Stern, CISO, BGC Partners