article thumbnail

6 steps the manufacturer of Arm & Hammer and OxiClean took to harden OT cybersecurity

CIO Business Intelligence

In the early days of the pandemic, the company’s Chief Information Security Officer (CISO), David Ortiz, could see that security risk for manufacturers was only getting higher. They also led cybersecurity discovery workshops following the NIST Cybersecurity Framework across more than a dozen factories.

Network 115
article thumbnail

How to Improve Your Organization’s Cyber Resiliency

CIO Business Intelligence

The practice brings together formerly separate disciplines of information security, business continuity, and disaster response (BC/DR) deployed to meet common goals. The HPE GreenLake edge-to-cloud platform is designed with zero-trust principles and scalable security as a cornerstone of its architecture.

How To 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘The key is the cloud’: How to keep up with the speed of innovation

CIO Business Intelligence

Michael Riecica, director of security strategy and risk in Rockwell Automation ’s Chief Information Security Office, will drill into the security aspects of cloud strategy. Another opportunity for interaction with peers and experts will take place in a workshop on cloud as a business strategy platform led by Kevin L.

Cloud 131
article thumbnail

Best practices for developing an actionable cyberresilience road map

CIO Business Intelligence

The practice brings together formerly separate disciplines of information security, business continuity, and disaster response (BC/DR) deployed to meet common goals. The HPE GreenLake Advantage The HPE GreenLake edge-to-cloud platform is designed with zero-trust principles and scalable security as a cornerstone of its architecture.

article thumbnail

Belcorp reimagines R&D with AI

CIO Business Intelligence

The initial stage involved establishing the data architecture, which provided the ability to handle the data more effectively and systematically. “We The team spent about six months building and testing the platform architecture and data foundation, and then spent the next six months developing the various use cases.

Data 105
article thumbnail

What is COBIT? A framework for alignment and governance

CIO Business Intelligence

For example, ISACA says COBIT 2019 isn’t a framework for organizing business processes, managing technology, making IT-related decisions, or determining IT strategies or architecture. Rather, it’s designed strictly as a framework for governance and management of enterprise IT across the organization.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. It's an online resource built by hackers for hackers.