enterprisesecuritymag

What RSA 2015 can Tell CIOs about the Evolution of Security

What RSA 2015 can Tell CIOs about the Evolution of Security

Robert Clyde, CISM, International VP, ISACA

Ensuring Digital Security in Sacramento County

Ensuring Digital Security in Sacramento County

Rami Zakaria, CIO, Sacramento County

Cyber Incident and Breach Response Planning: Is It an Option Any Longer?

Cyber Incident and Breach Response Planning: Is It an Option Any Longer?

Jim Holtzclaw, SVP, Marsh Risk Consulting’s Cybersecurity Consulting and Advisory Services Practice

The New Rise of Time Series Databases

The New Rise of Time Series Databases

Michael Risse, VP, Seeq Corporation

Financial Leadership through Technology

Financial Leadership through Technology

Mike Bailey, CPA, Director of Information Technology, City of Redmond, WA

It's Time to Take the NYDFS Cybersecurity Regulation Seriously

It's Time to Take the NYDFS Cybersecurity Regulation Seriously

Tom Stamulis, Senior Director, Alvarez & Marsal

The Goldilocks Theory for Risk Management

The Goldilocks Theory for Risk Management

Patricia Titus, Chief Privacy & Information Security Officer, Markel Corporation [NYSE:MKL]

Why is Hyper-converged is the new Wave

Why is Hyper-converged is the new Wave

Michael Morey, AVP Infrastructure, National Life Group