enterprisesecuritymag

Employing Strategies For Cyber Security

Employing Strategies For Cyber Security

Sunil Garg, CIO, Exelon

The Job of Cybersecurity is Presently Addressed as an

The Job of Cybersecurity is Presently Addressed as an

Paul Garrin, CIO Partner, Tatum, A Randstad Company

Case Studies
It's Time to Take the NYDFS Cybersecurity Regulation Seriously

It's Time to Take the NYDFS Cybersecurity Regulation Seriously

Tom Stamulis, Senior Director, Alvarez & Marsal

Face as the New Data Point: The Good, Bad and the Ugly of Facial Recognition Technologies

Face as the New Data Point: The Good, Bad and the Ugly of Facial Recognition Technologies

Riku Vassinen, Head of Digital Transformation, JWT Singapore

Combating Cyber Menaces by Fortifying Cybersecurity

Combating Cyber Menaces by Fortifying Cybersecurity

Joey J. Smith, VP & CISO, Schnuck Markets, Inc.

Why Governors Are Your Cybersecurity Allies

Why Governors Are Your Cybersecurity Allies

David Forscey, Senior Policy Analyst, Cybersecurity, Homeland Security & Technology, National Governors Association

 How to Create a Successful Security Culture Program

How to Create a Successful Security Culture Program

Masha Sedova, Senior Director of Trust Engagement, Salesforce