enterprisesecuritymag

Top Skills Needed for Security Guards

Top Skills Needed for Security Guards

Titan Samuel Jonas, Head of Global Sales, Titan Security Europe

Cyber Fraud & Data Breach Protection: Challenges & Best Practices

Cyber Fraud & Data Breach Protection: Challenges & Best Practices

Gregory A. Garrett, CISSP, CPCM, PMP, Head of U.S. & International Cybersecurity And Kirstie Tiernan, National Data Analytics Leader, BDO USA LLP

Data Breaches in the Age of Hyperconnectivity

Data Breaches in the Age of Hyperconnectivity

Maurice Dawson, Director of the Center for Cyber Security and Forensics Education & Asst Prof of Info Tech and Mgmt, Illinois Institute of Technology

How to Interview an Insider Threat Suspect

How to Interview an Insider Threat Suspect

Don Kohtz, Director- Special Investigations Unit, Markel Corporation And Josh Anderson, SIU, Manager - Special Investigations Unit, Markel Corporation

Leveraging Technology and Consumer Education to Reduce Fraud Risk

Leveraging Technology and Consumer Education to Reduce Fraud Risk

Jason Castillo, Head of Enterprise Fraud Management at Citizens Bank

Cybersecurity Assurance: Learning from the Past

Cybersecurity Assurance: Learning from the Past

Cris Ewell, CISO, UW Medicine

Defining SQL Injection and Risk to your Organization

Defining SQL Injection and Risk to your Organization

Monya Demirjian, Corporate Director of Fraud, MGM Resorts International

Healthcare Digitization - Easier and More Secure

Healthcare Digitization - Easier and More Secure

Brian Lancaster, Vice President-Information Technology, Nebraska Medical Center

Scaling Your Application Security Program

Scaling Your Application Security Program

Chris Wysopal, Co-Founder, CTO & CISO, Veracode

Five Enterprise IT Security Stats That May Surprise You

Five Enterprise IT Security Stats That May Surprise You

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab