enterprisesecuritymag

Relevance of Generalists vs Specialists in Enterprise Security Management

Relevance of Generalists vs Specialists in Enterprise Security Management

Vishwanath Nair, Head of Information Security and Risk, Western Sydney Local Health District

Managing Third-Party Risk

Managing Third-Party Risk

Jacqui Kernot, Partner, Ernst & Young

Redefining the Role of CISO in the 4th Industrial Revolution

Redefining the Role of CISO in the 4th Industrial Revolution

Marco Figueroa, Group Chief Information Security Officer, NSW Department of Customer Service

Cyber Risk Strategy and the Evolving Role of the CISO

Cyber Risk Strategy and the Evolving Role of the CISO

Richard Harrison, Chief Information Security Officer, healthAlliance

How to Protect Your Business by Following The Ten P's of Security

How to Protect Your Business by Following The Ten P's of Security

Michael Meyer, Chief Risk Officer (CRO) and Chief Security Officer (CSO), MRS BPO, LLC

The Changing Landscape of Cyber Security

The Changing Landscape of Cyber Security

Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

Network Security Forms the Underpinning for Every Business

Network Security Forms the Underpinning for Every Business

Doug Myers, VP & CIO, Pepco Holdings, Inc.

Big Data Analysis and Thought Diversity: Lessons From Anscombe's Quartet

Big Data Analysis and Thought Diversity: Lessons From Anscombe's Quartet

Aaron Ferguson, Technical Director-Cyber & Information Analytics Office, National Security Agency

Leaders have a Duty-of-Care for Preventing, Mitigating and Transferring the Risks of a Cyber Attack

Leaders have a Duty-of-Care for Preventing, Mitigating and Transferring the Risks of a Cyber Attack

Arturo Perez-Reyes, SVP Cyber and Technology, HUB International