Security Archives | Boardroom Events
Phone | +1 786 361 0454

New to site?


Login

Lost password? (X)

Already have an account?


Signup

(X)

Cybersecurity as Competitive Advantage?

Cybersecurity as Competitive Advantage?

New York native Don Devine is a loyal Giants fan, but he points to Bill Belichick’s organizational and coaching skills at the helm of the…

Collaboration tools carry potential security risks

Collaboration tools, such as work product-associated platforms such as Asana and chat-based platforms such as Slack and Yammer, are quickly becoming the norm in businesses…

Endpoint security: How vulnerable is the network?

Managing the network Protecting the integrity of a network takes a multifaceted approach. The use of laptops, tablets and smartphones in a business can increase…

Repairing Broken Data Governance

Building a defensible security program means striking a balance between the need to run a company and the need to secure it Until every…

Flatten the Risk Curve with Deterministic Prevention

There is a slight problem with the received wisdom on cyber defense. Defenders build high walls. Attackers build higher ladders. Walls are expensive. Ladders are…

Measuring Cyber Security Success

Whether you have a dedicated cyber security team of 10 or none, midmarket CIOs are undeniably focused on strengthening their companies current cyber security…

Medical records more lucrative for hackers

Properly securing data is a challenge faced by all modern businesses but is a particular concern for medical information. One of the biggest targets of…

Endpoint Cyber Security: Any Dwell Time Is Too Much

The prevailing model of endpoint cyber security is: monitor, detect, and respond. The idea is to find attacks once they’re inside your infrastructure but before…

Panelists Get Candid About Security Struggles

We’re in the midst of a societal shift. Because Internet users can now conveniently login to virtually any new website with their Facebook or LinkedIn…

Two KPIs Essential for Measuring Security Tools

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation.…
Join Us!