Close
  • Home
  • Applications
      • CEM
      • Cognitive
      • Data Security
      • Digital Process Automation
      • E-Invoicing/E-Billing
      • ERP
      • GDPR
      • Infrastructure and...
      • MarTech
      • Mobile Application Development
      • No Code Low Code Platform
      • Payment and Card
      • Risk Management
  • Verticals
      • Automotive
      • Field Service
      • FinTech
      • Legal Tech
      • Managed Services
      • Telecom
  • Technologies
      • Agile
      • Artificial Intelligence
      • Cloud
      • Digital Transformation
      • Remote Work Tech
      • Robotics
      • Simulation
  • Eco System
      • Atlassian
      • HPE
      • IBM
      • Microsoft
      • Oracle
      • Sage
      • Salesforce
  • Vendors
  • News
  • conferences
  • Awards
  • Specials

  • Menu
      • Artificial Intelligence
      • CEM
      • E-Invoicing/E-Billing
      • Field Service
      • HPE
      • Legal Tech
      • MarTech
      • Microsoft
      • Oracle
      • Remote Work Tech
      • Risk Management
  • CEM
  • Oracle
  • Artificial Intelligence
  • E-Invoicing/E-Billing
  • Microsoft
  • Risk Management
  • MarTech
Specials
  • Specials

  • Artificial Intelligence
  • CEM
  • E-Invoicing/E-Billing
  • Field Service
  • HPE
  • Legal Tech
  • MarTech
  • Microsoft
  • Oracle
  • Remote Work Tech
  • Risk Management
×
#

CIO Applications Europe Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications Europe

Subscribe

loading
  • Home
  • Information Security

THANK YOU FOR SUBSCRIBING

Information Security

People-orientation in Information Security

People-orientation in Information Security

Ramón Serres,CISO(Pharmaceuticals), Almirall
  • Taking Holistic Control of Your Enterprise's Security

    Taking Holistic Control of Your Enterprise's Security

    Jaya Baloo, CISO, KPN
  • The Digital Transformation of Service

    The Digital Transformation of Service

    Courtney Dornell, Senior Director, Service Transformation, Otis Americas
  • Security in the Golden Era of AI and IoT

    Security in the Golden Era of AI and IoT

    Carlos Sousa, Chief Information Security Officer, Affidea - Advanced Radiology Diagnostics
'Out of the box' Secure Connectivity for eSIM IoT Devices

'Out of the box' Secure Connectivity for eSIM IoT Devices

Nuno Teodoro, Chief Information Security Officer, TRUPHONE
End to End Data Science in a Global Reinsurance Setting

End to End Data Science in a Global Reinsurance Setting

Uwe Nagel, Head Data Analytics & Insights, Swiss Re Management AG
  • Balance between Opposite Forces / The Pursue for Trust
  • Balance between Opposite Forces / The Pursue for Trust

    Paulo Moniz, Director - Information Security and IT Risk, EDP [ELI: EDP]
  • Artificially Intelligent Malware: not as Futuristic as you Might Think
  • Artificially Intelligent Malware: not as Futuristic as you Might Think

    Martyn Booth, Chief Information Security Officer, Euromoney Institutional Investor PLC
  • CyberWatch: Proactive Cyber Risk Management

    CyberWatch: Proactive Cyber Risk Management

    José A. S. Alegria, CSO, Altice Portugal, Altice Worldwide Coordinator for CyberWatch, Advisory Member, Communication Providers, EUROPOL Cybercrime Centre (EC3)
  • The weakest link?

    The weakest link?

    Bjorn R. Watne, Chief Information Security Officer, Storebrand Group
  • Eight Common Pitfalls in Cybersecurity

    Eight Common Pitfalls in Cybersecurity

    Ramón Serres, CISO, Almirall
  • Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare
TOP VENDORS
Top 10 Information Security Solution Companies - 2020
ON THE DECK

Information Security 2020

Top Vendors

Information Security 2019

Top Vendors

Information Security 2018

Top Vendors

Previous Next

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2023 CIOApplicationsEurope. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap |  Newsletter |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://information-security.cioapplicationseurope.com