enterprisesecuritymag

Traditional Boundaries Disappears as organizations Move to Cloud

Traditional Boundaries Disappears as organizations Move to Cloud

Anil Katarki, Director, Cyber Security Services, Perspecta

Morphing Enterprise Architecture Tramples Security Capabilities

Morphing Enterprise Architecture Tramples Security Capabilities

Connie Barrera, CISO at Jackson Health System

One Step Closer to Becoming Cybersmart

One Step Closer to Becoming Cybersmart

Nancy Libersky, District Director, U.S. Small Business Administration

Attack Surface Analysis - Response to the Information Security Management

Attack Surface Analysis - Response to the Information Security Management

James Norberg, Security Director, Express Scripts

Search & Destroy: The Importance of Cyber Threat Sharing in Defeating Cybercrime

Search & Destroy: The Importance of Cyber Threat Sharing in Defeating Cybercrime

Gregory Crabb, CISO, VP, United States Postal Service

Finding Synergy Between Cybersecurity and Data Management

Finding Synergy Between Cybersecurity and Data Management

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Entering a New Era of Technology, with IT on your Terms

Entering a New Era of Technology, with IT on your Terms

Dennis Curry, Executive Director & Deputy CTO, KONICA MINOLTA INC

Digital Transformation and IT Leadership, Be the Change

Digital Transformation and IT Leadership, Be the Change

Mark Thiele, CIO and CSO, Apcera & Chairman, IDCA Technical Committee

3 Steps to Elevating Corporate Security

3 Steps to Elevating Corporate Security

Mark Kelly, CIO | VP of IT and Services, Curvature