enterprisesecuritymag

Information Security against Cyber attacks

Information Security against Cyber attacks

Brad Peterson, EVP & CIO, Nasdaq

Finding Synergy Between Cybersecurity and Data Management

Finding Synergy Between Cybersecurity and Data Management

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Faster Risk Mitigation? Accelerate your Sector

Faster Risk Mitigation? Accelerate your Sector

Brad Wheeler, Vice President for IT & CIO, Indiana University Bloomington and Board Member of IU Health Bloomington Hospital

Reading the Cloud Tealeaves in 2018

Reading the Cloud Tealeaves in 2018

Sean Hackett, Research Director Cloud and SaaS, IDC

Leveraging Digital Monitoring to Boost Physical Security Efforts

Leveraging Digital Monitoring to Boost Physical Security Efforts

Lawrence Mallory, Director, Physical Infrastructure Security, New York Power Authority

5 Takeaways On How Governments Are Becoming

5 Takeaways On How Governments Are Becoming

Tony Batalla, Head of Information Technology/ Director for the City of San Leandro, CA

Boosting Productivity with a Healthy Software Stack

Boosting Productivity with a Healthy Software Stack

Adrienne Weissman, Chief Crowd Officer and EVP of Partnerships, G2 Crowd

8 Cyber Security Improvements to Reach the Next Level of Maturity

8 Cyber Security Improvements to Reach the Next Level of Maturity

Michael Benz, VP Information Technology, Kraus-Anderson Construction Co.

Software-Defined Security: The Missing Piece in Your SDDC Strategy

Software-Defined Security: The Missing Piece in Your SDDC Strategy

Shishir Singh, VP, Network Security, Intel Security

Moving toward Successful SSH Key Management for Greater Network Security

Moving toward Successful SSH Key Management for Greater Network Security

Matthew McKenna, CSO, SSH Communications Security