267 results on '"CISO"'
Search Results
2. Procurement Of Digital Wall (network Electronic Console) For Cybersecurity Command And Control Centre (4c) At Cybersecurity Centre Of Excellence (ccoe), Ciso Office, Hyderabad Through Gem Portal
3. CISO Global and Ransomware Pioneer Halcyon Join Forces
4. The CISO Pilgrimage.
5. Cybersecurity Industry Veteran Yossi Barkalifa Joins Laika as New CISO and Head of Customer Solutions
6. In the driver's seat: Preston Wood is one CISO on top of the integration of enterprise security and networking operations, says Jim Carr
7. Anatomy of a CISO.
8. Ellie Mae's Selim Aissi Named Cybersecurity Breakthrough Awards CISO of the Year
9. A View from the CISO: Insights from the Data Classification Process.
10. A key player - New business security concerns make CISO position a hot job
11. United States : SANS to Debut CISO Hot Topic Series at Scottsdale 2016 Cybersecurity Training Event
12. Stop blaming the victim; We must shift the way that we view data breaches, says CISO
13. Why We Need the 'CISO'?
14. Navy Federal CISO sees no trade-off between security and ease of use.
15. CISO Leadership: Essential Principles for Success.
16. Year of the CISO.
17. CISO role evolves towards balancing business and security objectives.
18. Compliance Requirements in Research.
19. THE CRITICAL FIRST STEP TO DATA SECURITY: Management accountants are equipped to apply business performance measurement skills in identifying KPIs for data security and classification.
20. At Texas Health Resources, A Strategic Approach to Evolving Cybersecurity Challenges.
21. Andorra : Marc Rossell: 'We must raise awareness for a change in cybersecurity habits'
22. SPECIAL REPORT: Data Security.
23. INFORMATION SECURITY AND RISK MANAGEMENT.
24. Getting executives on board.
25. MISSING: QUALIFIED SECURITY PROS.
26. AN AI SOLUTION TO THE CYBER LABOR SQUEEZE?
27. Firms turn to AI to fight cyber attackers.
28. TALK THERAPY.
29. Standing before the board.
30. Network Rx.
31. Of influence: the influence of each of these five leaders--either through policy prowess or technical acumen--will continue to ripple through the vast ocean of cybersecurity
32. 30 seconds on ...
33. Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance.
34. DBTA LIVE.
35. FIRST, DO NO HARM.
36. CYBERSECURITY: Learn how to assess risk, protect your customers, and protect your company in the case of a cybersecurity breach.
37. DSCI Successfully Concluded its 9th Best Practices Meet on Cognitive Security in Bengaluru.
38. MAKE IT STOP!
39. Disaster Recovery and Business Continuity Strategies Evolve Forward.
40. NEWS IN BRIEF.
41. WOMEN OF INFLUENCE.
42. 30 seconds on...
43. New risks must be valued.
44. Selling Cybersecurity in the Age of Ransomware.
45. With the Ransomware Crisis, the Landscape of Data Security Shifts in Healthcare.
46. Data Governance & Security for the Cloud and AI Era.
47. Producing 'good enough' automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns.
48. Using machine learning to assist with the selection of security controls during security assessment.
49. "OUR EMPLOYEES USE DEVICES WHICH THEY ARE COMFORTABLE WITH.
50. A SMARTER MIGRATION.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.