CIOReview
| | December 20176CIOReviewCopyright © 2017 ValleyMedia Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.CIOReviewDECEMBER, 2017Mailing AddressCIOReview44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.402.1463, F:510-894-8405 DECEMBER, 2017 Vol 06 SE 146 Published by ValleyMedia Inc.To subscribe to CIOReviewVisit www.cioreview.com HOMELAND SECURITY SPECIALCIOReviewEditorial StaffSalesT: 510-565-7614Carolynn WaltersJudy ChristinKyle SummersRussell ThomasSam EricssonSyed Haseeb Ahmed Andrew Smithandrew@cioreview.comVisualizersSudhin ThomasManaging EditorJeevan GeorgeWhether it is the massive Equifax credit bureau hack, the terrorist attack in Barcelona or the WannaCry ransomware attack, the year 2017 witnessed an inordinate number of hacks, leaks, and data breaches. A congressional hearing on the rising number of risks to homeland security from diverse ends underscored the importance of preparedness and an aggressive confrontation to the rapidly evolving threats. From securing aviation, cyberspace, and borders, to preventing terrorist attacks and managing incidents, the homeland security stands in need of significant financial, organizational and operational investments to be more vigilant in protecting the homeland. While threats are emerging at a speed equivalent to the technological advancements, security organizations are reshaping their approach to protect civilians and infrastructures with biometrics and identity management. From revamping traditional biometric collection systems to enhancing real-time access to databases from field locations, these security solutions are proactively combating intrusions, improving information sharing, and using analytical capabilities to address a full spectrum of threats--both in private organizations and critical infrastructure sectors. Meanwhile, with massive amounts of data being produced every minute, intrusion within the Internet of Things (IoT) infrastructure has emerged as a central challenge that is capable of posing broader disasters. Considering the implications, enterprises are beefing up their cybersecurity, critical infrastructure protection, and preparedness efforts with state-of-the-art technology solutions.The soaring number of incidents of natural disasters, cyber adversaries, and events of terrorism are propelling the organizations to narrow down their focus on reducing the interval between event detection, intervention and providing the relevant response. Besides facilitating tactical, strategic, and operational planning efforts, organizations need to deploy approaches to asses and monitor operational performance backed by real-time data analytic support.Nevertheless, given the rapid ascension of threats posed to the country, having a robust solution in place is more critical than ever. In this edition, we bring to you the latest in the sphere of homeland security. We hope the insights from the industry pundits and cutting-edge solutions from companies featured in this edition would help you strategize and strengthen your security posture.Let us know your thoughts.Jeevan George Managing Editoreditor@cioreview.comEditorialDetect, Protect and Deter*Some of the Insights are based on the interviews with respective CIOs and CXOs to our editorial staff
< Page 5 | Page 7 >