Cybersecurity Today, 2020 and Beyond
CIO Review >> CXO Insight

Rizwan Hafeez, Managing Director, Information Technology, Blue Cross Blue Shield Association

Cybersecurity is the practice of protecting computer systems, networks, and software programs from digital attacks.

Get Back to your Security Program Fundamentals
CIO Review >> CXO Insight

Erik Hart, Chief Information Security Officer, Cushman & Wakefield

Before you invest in a new tool or platform, take time to assess your security program.

The New Cold War in Cyberspace
CIO Review >> CIO Viewpoint

Liza Massey, CIO, County of Marin

While a recent study found that only a quarter of security events come from within, organizations consider employees the greatest security risk

If You Can Secure It Here…
CIO Review >> CXO Insight

Mike Krygier, Deputy Chief Information Security Officer for Urban Technology, New York City

Two years ago, New York City Mayor Bill De Blasio signed an Executive Order establishing New York City Cyber Command.

Top 3 ITSM Trends Revolutionizing Enterprises Market
CIO Review >> News


The rapid growth of cybercrime in the last year resulted in the corporations becoming more obsessed with data protection and security.

This is a Brave New World
CIO Review >> CXO Insight

Richard Mendoza, Director, Data Privacy & Regulatory Compliance, Realogy Holdings Corp

The most over used phrase in this brave new world of the never-ending mission to monetize information is that “Data is the new Gold Rush”.

The Evolving Roles and Responsibilities of CISOs
CIO Review >> CIO Viewpoint

James Shira, Network & US Chief Information & Technology Officer, PWC

Companies want the leader; they respect the expert, but they need the leader. And CISOs of today and tomorrow who recognize this will distinguish themselves within their organization and beyond.

No Software Patch to fix Communication Bugs and Flaws between CIOs and Boards
CIO Review >> CXO Insight

Scott T. Mathis, CISO, RBC Bank US

The Form 10-K provides just about everything you'd want or need to know about a company's financial statements, core operations and business models, core business processes and mission critical revenue streams

The Impact Of Legacy Systems
CIO Review >> CXO Insight

David Carter, Chief Information Security Officer (CISO), Commonwealth of Kentucky

The term legacy in the world of information technology generally elicits an array of responses- -rarely positive.

How To Build Your Infosecurity Team
CIO Review >> CXO Insight

Kevin Burns, CISO, Draper

one of the challenges all CISOs face in this current information security employment market is building a team and infrastructure that can anticipate and address the numerous and varied information security challenges.

IAM - An Information Security Enabler
CIO Review >> CXO Insight

Tim Skinner, Director Information Security, BlueCross BlueShield of Tennessee

There are new technology standards, tools, and architectures needed that many traditional IAM programs may not have. If your organization has not recently done an IAM strategy and gap analysis for your IAM program, now is the time

Ways to fortify cybersecurity in Retail Industry
CIO Review >> News


Simple compliance, mitigating fraud, and theft, protection of sensitive data and servers, secure digital assets at an end to end security protects your data and assets before, during and after a cyber attack.

How to Protect Corporate Data in a BYOD environment
CIO Review >> News


The benefits of BYOD equalize by the serious challenges it presents concerning the company’s data.

A Different but Effective Approach to Preventing a Cyber Breach
CIO Review >> CXO Insight

Sergio Pinon, Senior Vice President & Director of Security, Ocean Bank

Apply the continued process of Identify, Protect, Detect and Respond and you should be in good shape to prevent a breach

Five Best Practices for DevOps Automation
CIO Review >> News


Open source libraries and frameworks play a crucial role in the DevOps environment that emphasizes the shorter development lifecycles, collaboration, and innovation.

A Planning Guide for Identity and Access Management
CIO Review >> CXO Insight

Ravi Thatavarthy, Information Security Officer, iRobot

In the digital era, a compromise or an unauthorized access of employee identity means lot more beyond compromise of organizational assets.

Cyber Threat Risk and Response for the CIO in the Oil and Gas Sector
CIO Review >> CXO Insight

Jonathan Coombes, CISO, Marathon Petroleum Corporation

No panacea exists to eliminate cyber threats and risks to the O&G sector

Calculating the Value of Essential, Yet Intangible, Data Challenges
CIO Review >> CIO Viewpoint

Scott Gilbert, Chief Information Officer, Marsh & McLennan Companies

The key to properly insuring and mitigating data risks is to first dig much deeper than headlines on data breaches.

In Defense of the Three Lines of Defense
CIO Review >> CXO Insight

Bob Ganim, CISO, Mizuho Americas

The Three Lines of Defense is one of the most important steps toward a more secure cyber environment that an organization can adopt.

Management Systems Ensure Social Responsibility
CIO Review >> CXO Insight

Holly Duckworth, Chief Learning Officer, Kaiser Aluminum

Quality Management System requires an understanding of the social environments and any issues that may be relevant to management systems outcomes.