article thumbnail

Course Enterprise Architecture – Step 1 – Strategy

Xebia

This article is the start of sharing the highlights of our course at the Master of Informatics ICT Deeltijdopleidingen – Hogeschool Utrecht This course has been handed over from EA to EA, and currently in hands of Ton Eusterbrock , René Bliekendaal and myself. The course itself is in Dutch and all material is in English.

Course 130
article thumbnail

Connecting the dots on diversity in cybersecurity recruitment

TechCrunch

Mandy Andress is the chief information security officer at Elastic , an enterprise search company, and has more than 25 years of experience in information risk management and security. In its Cybersecurity Workforce Study 2021 , industry body (ISC) 2 found that 2.7 Mandy Andress. Contributor. Share on Twitter.

Security 316
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

M&A action is gaining momentum, are your cloud security leaders prepared?

CIO

Of course, there are a multitude of paths businesses can take to achieve this, all afforded by an increased focus on generative AI and leveraging all the technology has to offer. As cybersecurity professionals, we take a page from Ben Franklin – we know the only certainties in life are death, taxes… and breaches. So, what’s to be done?

article thumbnail

Top 10 governance, risk, and compliance certifications

CIO

It’s crucial to ensure your organization is operating lawfully in every country it operates, that your business is protected from cybersecurity threats, and that your company both manages risk and establishes processes to govern those tasks. Why are GRC certifications important? Is GRC certification worth it?

article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. With every such change comes opportunity–for bad actors looking to game the system.

Trends 268
article thumbnail

Cybersecurity for enterprise: 10 essential PAM considerations for modern hybrid enterprises

CIO

Supporting enterprise security during a cloud migration can be rife with pitfalls that can derail the initiative and ruin the customer experience. She joined the company in the middle of a corporate cloud transformation initiative and inherited a new Privileged Access Management (PAM) solution as part of an enterprise cybersecurity overhaul.

article thumbnail

The evolution of the CIO’s role: From tactical ops to transformational leader

CIO

Over the course of the last decade, enterprise-wide cybersecurity has increasingly become a business priority. After all, when security is one of an organization’s key priorities, every security-related decision can impact processes, changing the way people work, often with profound business implications.

Policies 221