Security content on Enterprise CIO Forum

Business Issues, IT Performance

IT skills in 2020 and before

Digital artisans? Tinkerers?

Blog-post by John Dodge,
Community Manager
, Mon, 03/02/2015 - 19:52

"Future proof your IT career: 8 tech area that will still be hot in 2020" at is an article containing non-obvious gems that can spur 'ahah!' moments.

CIO Leadership, Technology, Security

Information Security: Quantifying Cyber Threats

Blog-post by Jean-Christophe Gaillard, Thu, 02/26/2015 - 16:45

In line with the 2015 World Economic Forum (WEF), which took place in Davos, Switzerland in January, the Partnership for Cyber Resilience published its latest report “Towards the Quantification of Cyber Threats” – in collaboration with Deloitte.

The report summarises the activities of the Partnership across 2014, which have been focused on the modelling of “cyber value-at-risk” - in an attempt to build a common cyber security framework amongst stakeholders.

Business Issues, CIO Leadership, Technology, Big Data, Cloud, Mobility, Security

Fraud at United and American Airlines Highlights Security Problems with Loyalty Reward Programs

Blog-post by Thu Pham, Fri, 01/23/2015 - 17:31

Ten thousand American Airlines, and three dozen United Airlines, accounts were targets of fraud, with criminals reusing credentials to access customer loyalty reward points and use them to book or upgrade flights late last month, according to recent reports.


CIO Leadership, Cloud, IT Infrastructure, Security

ECF's top ten blog posts for 2014

IT project management, converged infrastructure and security top the list.

Blog-post by John Dodge,
Community Manager
, Mon, 12/22/2014 - 18:42

Here's the most popular Enterprise CIO Forum blog posts as measured in page views for 2014. Note that one is from 2013 and another from 2012. However, they made the top ten list in page view popularity for 2014 (Jan. -Dec. 21 when this was being written).

To all our ECF members, we wish you a safe and happy holiday season. Here's the list:

1) Three mistakes that will get you fired

July 18, Terence Ngai, 82,928 page views

(2) (2)

Technology, Cloud

Why lawyers need the cloud

Blog-post by Rick Blaisdell, Fri, 12/19/2014 - 13:40

Cloud computing is not just a cool technology for early adopters. It is now the digital backbone for individuals and businesses that demand highly secure, scalable, accessible and centrally managed data centers maintained by highly trained IT professionals.

Business Issues, Security

Banks could make retailers pay for poor data and security governance

Federal judge rules in favor of banks.

Blog-post by Myles Suer, Tue, 12/16/2014 - 23:20

A couple months ago, I reached out to a set of CIOs on the importance of good governance and security. All of them agreed that both were incredible important. However, one CIO retorted a very pointed remark by saying that “the IT leadership at these breached companies wasn’t stupid”. He continued by saying that when selling the rest of the C-Suite, the discussion needs to be about business outcomes and business benefits.  For this reason, he said that CIOs have struggled at selling the value of investments in governance and security investment.

(1) (1)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, IT Infrastructure, IT Performance, Mobility, Security, Services

2015 CIO and CISO Priorities: Cybersecurity, the Cloud and IT Budget

Blog-post by Thu Pham, Mon, 12/15/2014 - 20:44

What are some of the top concerns of Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) today? According to a 2014 TechAmerica Federal CIO and CISO Survey – it’s improving cyber security. As new threats increase, risk management involves both educating users about security risks such as phishing attempts as well as building up network protection with continuous monitoring.


Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, IT Performance, Mobility, Security, Services

Security in 2015: The Enterprise Begins to Favor Integrated Cloud Services vs. On-Premise Point Solutions

Blog-post by Paul Lipman, Mon, 12/15/2014 - 19:57

Today’s Chief Information Security Officer (CISO) is faced with an over-load of point products (NAC, IDS, IPS, Endpoint Security, Web Gateway, Next Generation Firewall and APT to name just a few) provided by a plethora of vendors. These products are typically deployed in some on-premise configuration and tend to be difficult, if not impossible, to integrate together – resulting in severe visibility limitations across the organization’s security posture.

(1) (1)

Business Issues, CIO Leadership, Technology, Big Data, Cloud, IT Infrastructure, Mobility, Security

Can Your Security Protection Keep Up with Roaming Mobile Workers?

Blog-post by Paul Lipman, Tue, 11/18/2014 - 16:58

As 2014 comes to a close, many of us in the security industry cringe as we look back at a year full of massive, high profile security breaches. In spite of major investments of capital and time by large corporations, attackers are still getting through their defensive perimeters, and dwelling undetected long enough to do extensive damage. It’s become painfully clear that enterprises today are so interconnected, any gap in their widely dispersed infrastructures or ecosystems can provide an entry point for sophisticated cybercriminals.


Business Issues, Applications, Mobility, Security

So many security concerns and topics, so little time

"Fake cell towers!?" See conversation 2.

Blog-post by John Dodge,
Community Manager
, Fri, 11/14/2014 - 15:42

Our #CIOchat yesterday about security nightmares touched on human error, penetration testing, privacy, Point of Sale vulnerabilities, training, education, layered security, 7x24 threat monitoring and who should be charge of enterprise cyber security. The sheer number of topics expresses the complex and never ending task of keeping enterprise data secure.

Syndicate content