APRIL 2017CIOAPPLICATIONS.COM539573131 3 Steps to Elevating Corporate SecurityMark Kelly, CIO, VP-IT & Services, Curvature39 Addressing Cyber Security StrategicallyDavid L Stevens, CIO, Maricopa County48 The Tao of Cyber Security in Today's RealityMarc DeNarie, CIO, NaturEner USA & Canada57 New Defensive Measures against HackersDawn Roth Lindell, CIO, Western Area Power Administration64Business Application Security: Things to Ensure and InsureEd Moyle, Director, ISACA2020Digital Services Powered by HumansPrayson Pate, CTO, ADVA Optical Networking2424The Productivity Gain of Software SecurityJim Routh, CSO, Aetna28One Size Fits All Cyber Security ProgramRichard Rushing, CISO, Motorola34CIOs - Use 3 Cs to Play to Win at Cyber Security in 2017Ron Woerner, CISSP, CISM, Director, Bellevue University42Cyber Security: Threats, Trends and Opportunities for 2017Kevin Curran, Sr. Member, IEEE & Professor of Cyber Security, Ulster University45Protecting Yourself and Your Business in the Coming Block Chain EraJonathan Anderson, CTO of IoT Security, Intel Security46Solving for Data Security and Privacy in IoTCarole Murphy, Product Marketing Manager, HPE Security - Data Security, HPE52What CIOs Need to Know about Cyber Liability InsuranceMike Desai, SVP - Business & Corporate Development, SecureAuth54The Cloud Shift: The Rapid Adoption of Cloud Services and Next Steps for Business OrganizationsAnupam Govil, President & Partner, Avasant666669Attack Phishing from a Different AngleGary Southwell, Founder, Seceon69The Journey toward Cloud-First & the Stages of AdoptionStephen Orban, Global Head of Enterprise Strategy, Amazon Web Services72Cloud IT with a Chance of Meatballs?Jeff Wright, VP and CISO, Allstate76Three Tips for Balancing User Experience and Security in Banking ServicesThelton McMillian, Co-Founder & CEO, Comrade78A Framework for Cultivating a Culture of CybersecuritySteve I. Cooper, CIO, andMichael Maraya, Manager - Cybersecurity Operations, U.S. Department of Commerce2834527278
<
Page 4 |
Page 6 >