Strengthening Enterprise Security with Unique Strategies
Capitalmarketsciooutlook >> news

By incorporating integrated security methods, robust infrastructure, better risk-analysis programs, effective policies, and building a shared responsibility, the cybersecurity can be well maintained across the organization. In the digital...

Machine Learning Playing an Important Role in Cybersecurity
Capitalmarketsciooutlook >> news

Vendors are overusing the term Artificial Intelligence (AI). Chief Information Security Officers (CISOs) are interested in Machine Learning (ML) but are skeptical of AI. Security teams in companies receive too many alerts, and most of the signals...

The Data Driven World
Capitalmarketsciooutlook >> cioviewpoint

Alex Pettit, CIO, State of Oregon

We live in a data driven world, where big data is being generated by every digital process, systems, gadgets, and sensors around us. Organizations and government agencies are adopting advanced data analytics strategy to derive real-time insights...

It Is about Having the Right Safety Mechanisms
Capitalmarketsciooutlook >> cioviewpoint

Patricia Titus, CIO, Markel Corporation

Companies need the flexibility to transform the way they do business in order to meet the market demands and security needs to transform its thinking. We know that technology hasn’t stopped evolving therefore adoption continues to grow at...

Information Security is More than Information Technology
Capitalmarketsciooutlook >> cioviewpoint

Nick Coussoule, SVP & CIO, BlueCross BlueShield of Tennessee

Training, education, role play, and more training are the key ingredients of a secure organization, because at its core, information security is about people. Generally they are the weakest link in the security chain, yet they are also the first...

The Road to an IT Global Operating Model
Capitalmarketsciooutlook >> cioviewpoint

Keith Dennelly, CIO, Asset Management, Fidelity Investments

For years, the technology team serving Fidelity Investments’ asset management division was managed as a collection of independent groups that built customized solutions for their respective business areas. It resulted in redundant...

Is There Auditable Security in the Cloud?
Capitalmarketsciooutlook >> cioviewpoint

Preston Williams III, Senior Partner and CIO, GBC Global Services

I recently watched the CSPAN coverage of cloud computing in political campaigns held at the Graduate School of Political Management at George Washington University. Participants shared their views about cloud computing in campaigns, but the issue...