enterprisesecuritymag

Taking control of IT Operations through the Critical Security Controls

Taking control of IT Operations through the Critical Security Controls

Matthew J. Harmon, Principal Consultant, IT Risk Limited

Network Security Forms the Underpinning for Every Business

Network Security Forms the Underpinning for Every Business

Doug Myers, VP & CIO, Pepco Holdings, Inc.

Why Offensive Countermeasures Weaken Our Cybersecurity

Why Offensive Countermeasures Weaken Our Cybersecurity

Nuala O’Connor, President & CEO, Center for Democracy & Technology

Enterprise Security And The Elusive

Enterprise Security And The Elusive

Andre' Allen, CISO, City of Houston

Device Management, Security and the Recipe for M2M Mass Adoption

Device Management, Security and the Recipe for M2M Mass Adoption

Frank Ploumen, Director-Motive M2M Solutions, Alcatel-Lucent

Rethinking Security and Privacy in the Era of Empowered Digital Users

Rethinking Security and Privacy in the Era of Empowered Digital Users

Scott A. Snyder, President & Chief Strategy Officer, Mobiquity, Robert McCarthy, Principal Technical

Mobility x Security

Mobility x Security

Daniel Sobral, CSO, JBS USA

The Future of Cyber Security Defense: Make Way for Bots

The Future of Cyber Security Defense: Make Way for Bots

Carl Herberger, VP Security Solutions, Radware

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

A Deeper View into the Threat Landscape

A Deeper View into the Threat Landscape

James Carder, CISO & VP of LogRhythm Labs