Information Security magazine 2010 Security 7 Award winners

Information Security magazine announces the winners of its sixth annual Security 7 Awards.

Information Security magazine announces the winners of the sixth annual Security 7 Awards. The awards recognize the efforts, achievements and contributions of practitioners in the financial services/banking, telecommunications, manufacturing, retail, government/public sector/non-profit, education and healthcare/pharmaceutical industries. Winners have made noteworthy contributions to their organization or the security community in areas...

such as, but not limited to, research, policy and process development, product development, standards work and community contributions. These individuals have made an impact on the advancement of, research of, application of and management of information security technologies, policies and practices.

This year, each of the seven winners was asked to write a first-person essay on a subject matter they are passionate about. The winners represent the best the information security profession has to offer, and their perspectives serve as important benchmarks for the industry today.


INFORMATION SECURITY MAGAZINE'S 6TH ANNUAL SECURITY 7 AWARDS

  Introduction
  PHIL AGCAOILI
Consumerization of IT and enterprise evolution: Consumer devices in the workplace and the shift to cloud services require new security standards.
  BRIAN ENGLE
An effective information security program requires ongoing monitoring: A successful information security program uses ongoing oversight and monitoring to manage risks.
  BLANCA GUERRERO
Online banking security is a balancing act: Online banking security requires providing users with choices in order to minimize risk without becoming intrusive.
  CHRISTOPHER IPSEN
Government transformation through technological innovation: The economic crisis gives government entities the opportunity to change for the better.
  NICK MANKOVICH
Maintaining health care privacy and security: In the world of health care, the more we value privacy, the harder we work to protect it.
  JULIE MYERS
Implementing an information security strategy in a decentralized environment: Implementing data security in a decentralized organization requires a collaborative approach.
  EZZIE SCHAFF
Fighting online fraud requires delicate balance: Countermeasures for thwarting Internet fraudsters must be balanced with customer service.
This was first published in October 2010

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close