“Cybersecurity used to be an afterthought—now it creates & protects new business opportunities” —Chris Hughes, CISO
Welcome to Cybersecurity as a Business Enabler, I am your host Chris Hughes. We will be exploring the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. On this page you will find registration links to our upcoming and on demand Cybersecurity Battleground events, the most important “moments” from past interviews and “Prove It” roundtables and exclusive premium content from me and other CISO Acceleration Economy Analysts like Robert Wood. I look forward to hearing from you and being a key part of your journey to make cybersecurity a business enabler at your organization!
Risk is involved with just about everything that happens inside an organization, but who really holds ownership of the risk?
What exactly is Zero Trust and why is it considered so important in today’s digitally connected ecosystem?
When it comes to SMBs, it’s critical that you have a cybersecurity plan. Use this 3-step process to ensure defense against growing risks.
Although working remote has its benefits, there are still some risks with a distributed workforce. It’s critical to ensure endpoint security.
With enterprises undergoing digital transformations to stay competitive, organizations are also competing for managed security services.
Confidentiality, Integrity, and Availability — these are the three primary components of Cybersecurity. Today’s article
John Siefert hosts analysts Bob Evans, Chris Hughes, and Wayne Sadin for a round table discussion on the role of the CISO.
Things will be brighter for users and cybersecurity once all passwords are removed altogether. The future is passwordless, and it’s coming soon.
These six cybersecurity hallmarks can help any organization’s executive board create robust protocols to protect from ransomware.
Ransomware is on the rise and your apps are vulnerable. Find out how to secure them effectively.
With an increase in remote work, multi-factor authentication is essential to protecting sensitive information from being breached.
Many companies have technical sprawl: apps, automation, SaaS & on-premise systems, and much more. What can the CFO do to mitigate risk and create a plan for strategic investments? In this “Back @ IT” episode, Aaron Back chats with Nick Lumsden to explore these areas more.
Recent moves by the White House suggest that compulsory cybersecurity could become a reality in some sectors.
Many businesses are transitioning to the cloud due to its wide range of benefits. Cloud migration makes it possible for your employees to work outside of the office, which is especially important in today’s work environment.
Security is a foundation of any application and optimal network environment. What role does biometrics play in a passwordless future?
Ethical hacker and best-selling author Ted Harrington joins Aaron Back to discuss security as an enabler, its impact on AI and IoT, and the importance of a security foundation