enterprisesecuritymag

Establishing Best Practices for a Comprehensive Risk-based Product Security Program

Establishing Best Practices for a Comprehensive Risk-based Product Security Program

Michael McNeil, Global Product Security & Services Officer, Philips

Battlefield Principles for Cybersecurity Leaders

Battlefield Principles for Cybersecurity Leaders

Jake Margolis, CISO, Metropolitan Water District of Southern California

Rethinking E-mail Security

Rethinking E-mail Security

Karthik Devarajan, Director of IT, Maryland Legal Aid

U.S. Businesses and the General Data Protection Regulation

U.S. Businesses and the General Data Protection Regulation

Greg Sparrow, SVP/GM, CompliancePoint

The MDM Ecosystem

The MDM Ecosystem

Sherri Adame, Enterprise Metadata and Master Data Leader | Chief Customer and Reference Data Governance Officer, Cigna

Leadership Framework for Building Elite Teams

Leadership Framework for Building Elite Teams

Douglas Duncan, CIO, Columbia Insurance Group

Creating a

Creating a

Thomas Skill, Associate Provost & CIO, University of Dayton

Data is King! But are you treating it as one?

Data is King! But are you treating it as one?

Madhu Maganti, Director-IT Assurance & Security Services, Doeren Mayhew

Managing Digital Transformation by IT and Security Teams

Managing Digital Transformation by IT and Security Teams

Elena Kvochko, CIO, Group Security Function, Barclays [NYSE:BCS]