Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Hold on to your company’s millions: Build your security metrics blueprint at HP Discover

45-20130728_06_Young_Professional_Workspace_z_S4U5282.pngAs a chief information security officer (CISO), why should you stay awake at night worrying about the millions your company might be losing by the time you wake up the next morning? How can you protect the crown jewels? You need to seize the opportunity to shape the discussion at the senior-executive level and make it known across the business how important it is to manage information risk. And you need to be able to assign a monetary value to the information it holds.

 

At HP Discover in Barcelona, as we focus on security trends and solutions, during the session DT5800 you’ll hear about three big ideas to drive information and enterprise security.

Don’t miss these great discussions on enterprise security

Enterprise Security RoundupCyber threats are getting more sophisticated and unpredictable than ever, making security a front-and-center concern for enterprises and CIOs. HP’s Enterprise Security experts have been discussing the hottest security topics on the Enterprise Security Trends blog – don’t miss these great posts and feel free to add your own comment to join the discussion

Cloud Computing, Data Centers, Security, CIOs: Around Enterprise Services, Oct 14

By Alison Watterson, Enterprise Services WW Marketing

 

Here is a summary of the Enterprise Services blog topics for this past week:

  • roundabout.jpgSecuring Your Applications: How to Avoid Building Enterprise Security on a House of Cards
  • Why is the Health Information Exchange (HIE) Important? REALLY! Part 1
  • What’s Wrong with 99.999% Uptime When It Comes to Applications Management?
  • Data centers being built globally to accelerate enterprise agility and innovation
  • Smart Metering as an example of things to come
  • 5 Simple Steps to Better Information Security
  • Disruptive megatrends demand dynamic enterprise and IT
  • The world has changed, I feel it in the clouds
  • Can Cyber Attacks be considered Cyber Warfare?
  • Nadhan's Top 5 Cloud Computing aftershocks in the world of IT Outsourcing
  • Frustrated by the risks of shipping tapes off-site?
  • Are the underlying technology details a distraction for the CIO?
  • Top 5 Enterprise Security Challenges with "Bring Your Own Device"
Search
Showing results for 
Search instead for 
Do you mean 
Follow Us
Featured


About the Author(s)
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.