enterprisesecuritymag

Risk Management in Times of Chaos. How To Survive It All?

Risk Management in Times of Chaos. How To Survive It All?

Magdalena Skorupa, Cyber Risk, Data Privacy & IT Compliance Director, Reckitt Benckiser Group

A Look in the SUNBURST Backdoor C2 Communication Protocol

A Look in the SUNBURST Backdoor C2 Communication Protocol

Igor Lahav, Security Researcher, Cynet, Inc.

Fraud in the Time of COVID

Fraud in the Time of COVID

Patrick Dutton, Regional Head, Intelligence and Analytics, HSBC

Cybersecurity: Shifting from Concept to Culture

Cybersecurity: Shifting from Concept to Culture

Doug McGovern, CIO and Director of IT Services, National Geospatial-Intelligence Agency

Adapting to the Cloud Without Compromising Security

Adapting to the Cloud Without Compromising Security

Michael Bouchet, VP-Global Infrastructure Services, RELX Group

Ever-Changing Cyber Security of Business Community

Ever-Changing Cyber Security of Business Community

Jim Sills, CIO/Cabinet Secretary, State of Delaware

Addressing Cyber Security Strategically

Addressing Cyber Security Strategically

David L Stevens, CIO, Maricopa County

The Public Sector CIO: Chief Cyber security Officer?

The Public Sector CIO: Chief Cyber security Officer?

David Whicker, CIO, Rockingham County

Public Sector & Cyber Security

Public Sector & Cyber Security

Phil Bertolini, Deputy County Executive/CIO, Oakland County

Is it the Best of Times or the Worst of Times for Information Security?

Is it the Best of Times or the Worst of Times for Information Security?

Mark Connelly, Chief Information Security Officer, Thomson Reuters