#CIOChat

New security technologies: Not your grandmother's risk management plan

Emily McLaughlin, Associate Site Editor

In the wake of several more high-profile corporate breaches -- the very un-merry holiday hacks at Target and Nieman Marcus come to mind -- enterprises are approaching security

    Requires Free Membership to View

initiatives with renewed vigor. Put it this way: You can't rely on your grandmother's security tools when you're aiming to protect a 21st-century enterprise. Are you on top of the newest security technologies and tools that can ward off even the most devious of hackers?

Our coverage of new security technologies

Future State: The advent of biometric authentication

Expert advice: Mobile containerization and sandboxing

Join SearchCIO Wednesday, Feb. 26, at 3 p.m. EST to discuss the latest breed of enterprise security offerings and how CIOs, CISOs and their IT departments can keep your organization safe. Topics we might cover include biometric authentication, mobile application containerization, cloud-based security scanning and more.

TechTarget Associate Site Editor Emily McLaughlin will lead the event from SearchCIO's Twitter handle, @searchCIO. TechTarget writers, editors and contributors will participate, joined by our Twitter followers and others informed about new security technologies and how CIOs can properly weave them into existing operations.

Event details

Date: Wednesday, Feb. 26, 2014
Time:
 3 p.m. EST
Host:
 @searchCIO
Hashtag:
 Use and follow #CIOChat (additional hashtags include #biometrics, #mobileapp, #cloudsecurity, etc.)

Is this your first #CIOChat? No problem. Here are the must-knows:

  • To follow the conversation, type "#CIOChat" into Twitter's search bar. From this new page, click "All" to view tweets in real time.
  • Your first #CIOChat tweet should be introductory, including your name, title and organization.
  • @SearchCIO will pose a series of questions to participants starting at 3 p.m. EST (labeled Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (for Answer 1), A2 and so on, then remember to include "#CIOChat." Each question will follow the new-security-tools theme.
  • Be aware that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
  • Throughout the discussion, retweet (RT) favorite tweets you concur with and reply to those you disagree with.

Please direct questions, RSVPs or other concerns to Emily McLaughlin. Talk to you on Twitter!


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: