Premium Content

Access "Information Security magazine 2009 Security 7 Award winners"

Published: 19 Oct 2012

Information Security magazine announces the winners of the fifth annual Security 7 Awards. The awards recognize the efforts, achievements and contributions of practitioners in the financial services/banking, telecommunications, manufacturing, retail, government/public sector/non-profit, education and healthcare/pharmaceutical industries. Winners have made noteworthy contributions to their organization or the security community in areas such as, but not limited to, research, policy and process development, product development, standards work and community contributions. These individuals have made an impact on the advancement of, research of, application of and management of information security technologies, policies and practices. This year, each of the seven winners was asked to write a first-person essay on a subject matter they are passionate about. The subjects range from critical infrastructure protection, to national security, to communicating effectively about risk with senior management. The winners represent the best the information security ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Is your mobile security strategy combating the wrong enemy?
    ism_0414.png
    E-Zine

    As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...

  • What's the best focus for MDM strategy now?
    best_focus_for_MDM.png
    E-Handbook

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...

  • Beat the security odds with a cloud risk equation
    ISM_0314.png
    E-Zine

    Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...