APRIL 2017CIOAPPLICATIONS.COM6APRIL - 21 - 2017CYBER SECURITYSPECIALCopyright © 2017 ValleyMedia, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.Volume 02 - 03Published by ValleyMedia, Inc. To subscribe to CIO ApplicationsVisit www.cioapplications.com Managing EditorSarah WilsonGraphics & ArtJohn ConnorDeclan ColeAmelia StewartShravan KashyapAssistant Managing EditorSenior WritersEditorial StaffAnnie JohnsonAlex D'SouzaAlysia Paul Rachel ClarkBen JacksonDaniel HolmesJames SmithLeah JaneMadeline JonesNaomi DaleAnand JayakumarSalesGeorge Thomasgeorge@cioapplications.comMaria D'Souzamaria.l@cioapplications.com510.757.1040Mailing Address:ValleyMedia, Inc.44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.757.1040 | | August 201663CIOReviewEditorialNavigating the New Breed of ThreatsThe year 2016 saw Cyber threat groups continue to compete and innovate--bringing down more juggernauts of various industries to their knees. 2017, has been no different. The attacks will continue to find new victims. The current IT threat landscape is becoming increasingly sophisticated, with well-funded attackers. Enterprise security teams traditionally adopted a "wait and see" posture, and tried to build up their defenses to mitigate the possible threats they are aware of. Today, however, more enterprises are working towards trying to know what the attackers are innovating concerning cyber attack techniques, their next moves, and build up their defenses to counter the new attack vectors. Embracing new IT-driven technologies opens up wide-ranging opportunities for organizations of all sizes­but the increasing reliance on the internet introduces significant new risks too. In light of the growing volume and sophistication of security breaches, it is no longer sufficient to consider cyber risk as a concern for the IT department. Today, cyber threats require board-level attention and organizations must plan for a co-ordinated recovery in the event of an attack, so that when breaches happen, they can get the business back to full strength, at full speed, with their reputation intact.In light of this, we have come up with this edition of Cyber Security. The magazine brings to the limelight the most promising solution providers in this space. In addition, the insights from prominent industry personnel about the industry will only help the prospective customer to get an in-depth perspective on the state of the industry. We hope you enjoy reading this edition as much as we did compiling it together. Let us know your thoughts.Sarah WilsonManaging Editorsarah@cioapplications.com
< Page 5 | Page 7 >