Mobile application security testing: The unique characteristics of device security models
Sanjay Zalavadia, VP of Client Services, Zephyr
How to Create a Successful Security Culture Program
Masha Sedova, Senior Director of Trust Engagement, Salesforce
Closing the Cybersecurity Skills Gap - Calling All Women
Michelle Johnson Cobb Vice President, Worldwide Marketing for Skybox Security
Why Integrated Security Platforms Are a Win-Win for VARs and Their Customers
Stewart Fox, EVP of Worldwide Sales for Skybox Security
So What Does General Counsel Have to Do with Cyber-Security, Anyway?
Ronald N Sarian, VP and General Counsel, eHarmony
Security in Digital Age
David Behen, DTMB Director & State CIO, State of Michigan
Combating Security Threats In BYOD
Altaf Halde, Managing Director, Kaspersky Labs - South Asia
When the Internet of Things met Analytics
Salil Godika, Chief Strategy & Marketing Officer, Happiest Minds Technologies
CIO Viewpoint
From VPNs to Zero Trust: The Transition to a...
By Shankar Venkatesan, Senior IT Leader, Avalon Technologies
The Cyber Security Spar in Integrating IT and...
By Vimal Goel, CIO, HPCL-Mittal Energy
Towards Cyber Resilience: A Data-Centric...
By Puneet Gupta, Vice President & Managing Director, NetApp India/SAARC
CXO Insights
Emerging Trends, Challenges & Future Prospects...
By Sujoy Brahmachari, CIO & CISO, Rosmerta Technologies
Exploring Data-First Security and Automation in...
By Maheswaran S, Country Manager - S.Asia, Varonis Systems
Securing IT-OT Converged Infrastructure