Information Security magazine announces the winners of the sixth annual Security 7 Awards. The awards recognize...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
the efforts, achievements and contributions of practitioners in the financial services/banking, telecommunications, manufacturing, retail, government/public sector/non-profit, education and healthcare/pharmaceutical industries. Winners have made noteworthy contributions to their organization or the security community in areas such as, but not limited to, research, policy and process development, product development, standards work and community contributions. These individuals have made an impact on the advancement of, research of, application of and management of information security technologies, policies and practices.
This year, each of the seven winners was asked to write a first-person essay on a subject matter they are passionate about. The winners represent the best the information security profession has to offer, and their perspectives serve as important benchmarks for the industry today.
INFORMATION SECURITY MAGAZINE'S 6TH ANNUAL SECURITY 7 AWARDS
Consumerization of IT and enterprise evolution: Consumer devices in the workplace and the shift to cloud services require new security standards.
An effective information security program requires ongoing monitoring: A successful information security program uses ongoing oversight and monitoring to manage risks.
Online banking security is a balancing act: Online banking security requires providing users with choices in order to minimize risk without becoming intrusive.
Government transformation through technological innovation: The economic crisis gives government entities the opportunity to change for the better.
Maintaining health care privacy and security: In the world of health care, the more we value privacy, the harder we work to protect it.
Implementing an information security strategy in a decentralized environment: Implementing data security in a decentralized organization requires a collaborative approach.
Fighting online fraud requires delicate balance: Countermeasures for thwarting Internet fraudsters must be balanced with customer service.