News Stay informed about the latest enterprise technology news and product updates.

New security technologies: Not your grandmother's risk management plan

CIOs are looking to new security technologies such as biometric authentication to ward off hackers. Join us on Twitter to discuss the latest tools.

In the wake of several more high-profile corporate breaches -- the very un-merry holiday hacks at Target and Nieman Marcus come to mind -- enterprises are approaching security initiatives with renewed vigor. Put it this way: You can't rely on your grandmother's security tools when you're aiming to protect a 21st-century enterprise. Are you on top of the newest security technologies and tools that can ward off even the most devious of hackers?

Our coverage of new security technologies

Future State: The advent of biometric authentication

Expert advice: Mobile containerization and sandboxing

Join SearchCIO Wednesday, Feb. 26, at 3 p.m. EST to discuss the latest breed of enterprise security offerings and how CIOs, CISOs and their IT departments can keep your organization safe. Topics we might cover include biometric authentication, mobile application containerization, cloud-based security scanning and more.

TechTarget Associate Site Editor Emily McLaughlin will lead the event from SearchCIO's Twitter handle, @searchCIO. TechTarget writers, editors and contributors will participate, joined by our Twitter followers and others informed about new security technologies and how CIOs can properly weave them into existing operations.

Event details

Date: Wednesday, Feb. 26, 2014
 3 p.m. EST
 Use and follow #CIOChat (additional hashtags include #biometrics, #mobileapp, #cloudsecurity, etc.)

Is this your first #CIOChat? No problem. Here are the must-knows:

  • To follow the conversation, type "#CIOChat" into Twitter's search bar. From this new page, click "All" to view tweets in real time.
  • Your first #CIOChat tweet should be introductory, including your name, title and organization.
  • @SearchCIO will pose a series of questions to participants starting at 3 p.m. EST (labeled Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (for Answer 1), A2 and so on, then remember to include "#CIOChat." Each question will follow the new-security-tools theme.
  • Be aware that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
  • Throughout the discussion, retweet (RT) favorite tweets you concur with and reply to those you disagree with.

Please direct questions, RSVPs or other concerns to Emily McLaughlin. Talk to you on Twitter!

Dig Deeper on Enterprise data privacy management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.