Search

Your search keyword '"CISO"' showing total 267 results
267 results on '"CISO"'

Search Results

1. Battling cyber-threats a joint effort between compliance and information security: LifePoint Health's VP for Compliance Program Operations and Chief Privacy Officer Ellen Hunt and VP and CISO Andy Heins share how they and their teams work 'hand in glove' to protect their company's data from bad actors

2. Procurement Of Digital Wall (network Electronic Console) For Cybersecurity Command And Control Centre (4c) At Cybersecurity Centre Of Excellence (ccoe), Ciso Office, Hyderabad Through Gem Portal

3. CISO Global and Ransomware Pioneer Halcyon Join Forces

4. The CISO Pilgrimage.

6. In the driver's seat: Preston Wood is one CISO on top of the integration of enterprise security and networking operations, says Jim Carr

7. Anatomy of a CISO.

8. Ellie Mae's Selim Aissi Named Cybersecurity Breakthrough Awards CISO of the Year

9. A View from the CISO: Insights from the Data Classification Process.

10. A key player - New business security concerns make CISO position a hot job

12. Stop blaming the victim; We must shift the way that we view data breaches, says CISO

13. Why We Need the 'CISO'?

14. Navy Federal CISO sees no trade-off between security and ease of use.

16. Year of the CISO.

17. CISO role evolves towards balancing business and security objectives.

18. Compliance Requirements in Research.

19. THE CRITICAL FIRST STEP TO DATA SECURITY: Management accountants are equipped to apply business performance measurement skills in identifying KPIs for data security and classification.

20. At Texas Health Resources, A Strategic Approach to Evolving Cybersecurity Challenges.

21. Andorra : Marc Rossell: 'We must raise awareness for a change in cybersecurity habits'

22. SPECIAL REPORT: Data Security.

23. INFORMATION SECURITY AND RISK MANAGEMENT.

24. Getting executives on board.

25. MISSING: QUALIFIED SECURITY PROS.

26. AN AI SOLUTION TO THE CYBER LABOR SQUEEZE?

27. Firms turn to AI to fight cyber attackers.

28. TALK THERAPY.

29. Standing before the board.

30. Network Rx.

31. Of influence: the influence of each of these five leaders--either through policy prowess or technical acumen--will continue to ripple through the vast ocean of cybersecurity

32. 30 seconds on ...

33. Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance.

34. DBTA LIVE.

35. FIRST, DO NO HARM.

38. MAKE IT STOP!

39. Disaster Recovery and Business Continuity Strategies Evolve Forward.

40. NEWS IN BRIEF.

41. WOMEN OF INFLUENCE.

42. 30 seconds on...

43. New risks must be valued.

44. Selling Cybersecurity in the Age of Ransomware.

45. With the Ransomware Crisis, the Landscape of Data Security Shifts in Healthcare.

46. Data Governance & Security for the Cloud and AI Era.

47. Producing 'good enough' automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns.

48. Using machine learning to assist with the selection of security controls during security assessment.

49. "OUR EMPLOYEES USE DEVICES WHICH THEY ARE COMFORTABLE WITH.

50. A SMARTER MIGRATION.

Catalog

Books, media, physical & digital resources