BizTech - Technology Solutions That Drive Business https://biztechmagazine.com/rss.xml en VMworld 2018 https://biztechmagazine.com/vmworld-2018 <span>VMworld 2018 </span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 08/20/2018 - 13:21</span> <div><p>Join <em>BizTech</em> magazine as we cover VMworld 2018 in Las Vegas from Aug. 26-Aug. 30, 2018. Be sure to check here for new articles and videos from the conference! </p> </div> <div> <div>Event Image Toggle</div> <div>Off</div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/vmworld-2018" data-title="VMworld 2018" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Aug</span> <span>20</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/vmworld-2018" data-title="VMworld 2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitok%3D9BdHXZ8J%26destination%3D%2F%253Fitok%253D9BdHXZ8J%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/vmworld-2018" data-title="VMworld 2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Mon, 20 Aug 2018 17:21:33 +0000 phil.goldstein_6191 41926 at https://biztechmagazine.com VMWorld 2018 to Focus In on Virtualization, Partnerships https://biztechmagazine.com/article/2018/08/vmworld-2018-focus-virtualization-partnerships <span>VMWorld 2018 to Focus In on Virtualization, Partnerships</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 08/20/2018 - 13:21</span> <div><p>How will virtualization and the continued shift to a multicloud world affect businesses this year and beyond? That is a key question that <a href="https://www.cdw.com/content/cdw/en/brand/vmware.html" target="_blank">VMware</a> will likely address next week when it hosts <a href="https://www.vmworld.com/en/us/index.html" target="_blank">the VMworld 2018 conference</a> from Aug. 26-30 in Las Vegas.</p> <p><strong>Virtualization is the lifeblood of software-defined data centers</strong>, and it is how many organizations are running their applications today. Businesses want flexible pools of storage, computing and networking resources, and VMware wants to enable that. However, businesses need common virtualization tools <strong>as they migrate SDDCs into public cloud environments</strong>.</p> <p>That’s one of the reasons why, at last year’s VMworld conference, <a href="https://biztechmagazine.com/article/2017/08/vmworld-2017-vmware-brings-its-cloud-services-aws">VMware announced the initial availability of VMware Cloud on Amazon Web Services</a>, which provides all of the enterprise software capabilities of VMware, including its SDDC stack, in the public cloud environment of AWS. The offering is sold, operated and supported by VMware.</p> <p><a href="https://siliconangle.com/2018/08/08/ahead-vmworld-virtualization-confronts-cloud/" target="_blank">As Silicon Angle reports</a>, “This move gave VMware customers the option of <strong>running their apps in virtual machines in a fully managed hybrid environment inside a leading public cloud</strong>.” At this year’s conference, VMware is likely going to announce deeper integrations with AWS, and potentially other partnerships.</p> <p>On Aug. 27, VMware CEO Pat Gelsinger and CTO Ray O’Farrell will <a href="https://www.vmworld.com/en/us/learning/general-sessions.html" target="_blank">kick the festivities off with the opening keynote</a> to unveil VMware’s <strong>major announcements and discuss the company’s technology vision</strong>. The next day, Sanjay Poonen, COO of VMware customer operations, will have conversations on stage with several customers who have started undertaking a digital transformation journey. Poonen will also interview <strong>Malala Yousafzai</strong>, the Pakistani activist for female education, an Oxford student and the youngest person ever awarded the Nobel Peace Prize. VMware <a href="https://www.marketwatch.com/press-release/malala-yousafzai-to-speak-at-vmworld-2018-2018-08-09" target="_blank">says in a statement</a> that she “will share her perspective on the challenges that girls face in their communities as well as the bright opportunities to create greater access to education for them across the globe.”</p> <p>There are <a href="https://www.vmworld.com/en/us/learning/tracks.html" target="_blank">several tracks attendees can choose from</a> at the conference, including <strong>data center and cloud, networking and security, digital workspace, leading digital transformation and next-gen trends</strong> — including the Internet of Things, network functions virtualization and DevOps.</p> <p><a href="https://biztechmagazine.com/vmworld-2018"><strong>Keep this page bookmarked</strong></a> for stories and videos from the BizTech team. Follow us on Twitter at <a href="https://twitter.com/BizTechMagazine" target="_blank">@BizTechMagazine</a> or the official conference Twitter account, <a href="https://twitter.com/vmworld" target="_blank">@VMworld</a>, and join the conversation using <a href="https://twitter.com/hashtag/VMworld?src=hash" target="_blank">#VMworld</a>.</p> </div> <div> <div class="field-author"><a href="/author/phil-goldstein" hreflang="en">Phil Goldstein</a></div> </div> Mon, 20 Aug 2018 17:21:32 +0000 phil.goldstein_6191 41931 at https://biztechmagazine.com Digital Sales Assistants vs. Product Filters: What Retailers Need to Know https://biztechmagazine.com/article/2018/08/digital-sales-assistants-vs-product-filters-what-retailers-need-know <span>Digital Sales Assistants vs. Product Filters: What Retailers Need to Know</span> <span><span lang="" about="/user/22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Mon, 08/20/2018 - 13:03</span> <div><p>Retailers today have seen the impact of personalization on customer engagement and satisfaction. They also understand why delivering an individualized shopping experience is no longer optional.</p> <p>“At this point, <strong>personalization is an expectation</strong>,” said mobile wireless expert Preston Harris, speaking at last year’s “<a href="https://www.eiseverywhere.com/ehome/243433" target="_blank">Transforming the Customer Experience with Digital Modernization</a>” CDW summit.</p> <p>Though customer demands are pushing all retailers toward <strong>personalization</strong>, strategies for achieving that aim can differ — especially when it comes to <strong>online and mobile shopping</strong>.</p> <p>For retailers optimizing their websites or apps, product filters and digital sales assistants offer <strong>two options for helping customers narrow down inventory</strong> to only those items that fit their needs and interests.</p> <h2>Product Filters Promote Convenience, Relevance</h2> <p>According to a <a href="https://medium.com/brandingbrand/ten-years-of-the-app-store-85-of-fortune-500-retailers-now-have-apps-a6f517626a3" target="_blank">recent Branding Brand study</a>, filtering and sorting capabilities come standard on <strong>96 percent</strong> of Fortune 500 retailer apps. But despite widespread adoption, some retailers may not be familiar with the complicated backend processes that make the technology work.</p> <p>Product filtering connects shoppers with the right search results by relying on two key components, <strong>“attributes” and “values,”</strong> which are assigned to a product when it is first published to a digital store. An article published on <a href="https://medium.com/the-ux-chap/perfecting-the-product-filtering-experience-across-mobile-e-commerce-sites-apps-cc86d96d43b7" target="_blank">Medium.com</a> explains the tags in more detail:</p> <p>Attributes are the <strong>physical characteristics of a product</strong> — its size, color, fabric composition, weight, etc. Values, on the other hand, are the variations of those attributes. Here are some examples:</p> <ul><li>Attribute: Size</li> <li>Values: 8, 10, 12, 14, 16, etc.</li> <li>Attribute: Color</li> <li>Values: Red, Orange, Yellow, Green, Blue, Indigo, Violet, etc.</li> <li>Attribute: Fit</li> <li>Values: Petite, Tall, Plus Size, etc.</li> </ul><p>Though it might seem beneficial to provide endless attributes and values, that approach can make shoppers feel overwhelmed by their options. On the other hand, offering too few makes it impossible for the customer to sort through all the noise and find the exact product they desire.</p> <p>Creating a successful filtering function, therefore, relies on the <strong>retailer’s ability to anticipate how customers might identify and characterize each product</strong>. Nowhere is that level of personalization and forethought more evident than in the apparel industry.</p> <p>“Anthropologie lets their customers filter their desired jeans by cut,” writes Regina Henkel in an <a href="https://fashionunited.uk/news/business/10-most-important-trends-in-online-fashion-retail/2018060129971" target="_blank">article on FashionUnited.uk</a>. “Netshoes follows a similar approach and also lists occasions, for example, for which a product can be worn. … At Esprit, customers can see more items with the same fit on each product description page. And Farfetch filters all product groups with specific product characteristics, such as sleeve length or neckline. Thus, customers do not get lost in large selections and quickly find what they are looking for.”</p> <h2>Digital Sales Assistants Take Filtering to the Next Level</h2> <p>While filtering generally drives customers toward items they already want or need, <strong>digital sales assistants</strong> guide shoppers toward products that might not even be on their radars.</p> <p>The technology works by asking customers a series of simple questions — about how, when and where they intend to use the product — that help determine what needs they’re looking to fill. Rather than filtering through attributes and values, digital assistants then match the customer’s responses with relevant products.</p> <p>“This way, even consumers who may lack a clear understanding of the products they need are able to <strong>discover and explore suitable products</strong>,” explains Ada Okoli in an <a href="https://www.mytotalretail.com/article/faceted-search-vs-guided-selling-comparison/" target="_blank">article for Total Retail</a>.</p> <p>And digital sales assistants aren’t a one-size-fits-all solution. “Guided selling adapts to different shoppers by dynamically changing questions based on previous responses,” according to an article on <a href="https://www.guided-selling.org/guided-selling-vs-faceted-search/">Guided-Selling.org</a>. “These solutions adapt to the customer’s individual needs and personalize the experience every time,” it adds.</p> <p>As an added benefit, <strong>digital sales assistants won’t return zero search results to a customer query</strong>. “Intelligent product advisors are able to compute close alternatives whenever there's no exact match to avoid frustrating the user,” Okoli writes.</p> <p>Customers appreciate the enhanced search capabilities: Results of the <a href="https://smartassistant.com/content/downloads/SMARTASSISTANT-Humanizing-Digital-2020.pdf" target="_blank">Humanizing Digital 2020 report</a> indicate that <strong>64 percent</strong> of U.S. shoppers prefer digital sales assistants to product filtering. Another <strong>82 percent</strong> of U.S. respondents say they would feel much more confident making a purchase after using the technology.</p> <p>Those survey findings suggest that, even more than refining product filtering capabilities, adopting digital sales assistants can set retailers apart from their competitors.</p> <p>“[Shoppers] want a website that can quite literally read their mind and surprise them with relevant results in a matter of seconds,” the article on Guided-Selling.org states. “Guided selling does exactly that for your website, making yours the business of choice.”</p> </div> <div> <div class="field-author"><a href="/author/meg-conlan" hreflang="en">Meg Conlan-Donnelly</a></div> </div> Mon, 20 Aug 2018 17:03:08 +0000 juliet.vanwagenen_22746 41921 at https://biztechmagazine.com What Are the Benefits of a Cloud-Based Core Banking Solution? https://biztechmagazine.com/article/2018/08/what-are-benefits-cloud-based-core-banking-solution <span>What Are the Benefits of a Cloud-Based Core Banking Solution?</span> <span><span lang="" about="/user/22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Fri, 08/17/2018 - 10:01</span> <div><p>When you walk into a bank, you may be there to get cash out of an ATM, deposit a check or speak with a banker about a loan. You’re probably not thinking about the core banking system that underpins the bank’s operations.</p> <p><a href="https://www.gartner.com/it-glossary/core-banking-systems" target="_blank">Gartner defines</a> a core banking system, as “a back-end system that processes daily banking transactions and posts updates to accounts and other financial records. Core banking systems typically include <strong>deposit, loan and credit processing capabilities</strong>, with interfaces to general ledger systems and reporting tools.” Basically, core systems are the mission-critical systems that facilitate almost every major transaction for banks.</p> <p>Currently, only a <strong>small percentage</strong> of banks have transitioned their core banking systems to cloud-based platforms. Other banks without on-premises core systems often outsource their data to private clouds through their core provider. However, industry analysts and experts expect more banks to migrate as they modernize the systems. Cloud-based core banking lets banks automate processes, deploy new services for customers in a timelier fashion and gain efficiencies that can redound the bottom line.</p> <p>To successfully make a transition to cloud-based core banking, bank IT leaders need to educate themselves, <strong>find the right technology partners</strong> and be open to a new way of doing business.</p> <h2>How Cloud-Based Core Banking Helps Banks</h2> <p>Cloud-based core banking is still relatively new, and has <a href="https://www.zdnet.com/article/ge-capital-one-give-aws-the-rub-at-reinvent/" target="_blank">only been prevalent in the U.S. for about three years</a>. According to <a href="https://www.cdw.com/content/cdw/en/brand/adobe.html" target="_blank">Adobe</a>’s <a href="https://www.econsultancy.com/reports/digital-intelligence-briefing-2018-digital-trends-in-financial-services" target="_blank">2018 Digital Marketing Study</a>, only seven percent of financial institutions have implemented a cloud-based technology stack.</p> <p>Christopher McClinton, senior vice president of payments and operations at the <a href="https://www.aba.com/Pages/default.aspx" target="_blank">American Bankers Association</a>, <a href="https://biztechmagazine.com/article/2018/02/aba-2018-what-consider-when-upgrading-core-banking-technology">said earlier this year</a> that ABA’s “Core Provider Survey” found that banks are generally receptive to cloud-based core banking.</p> <p>As BizTech reported earlier this year: “According to the survey, <strong>29 percent</strong> said they would consider it, <strong>50 percent</strong> said they were unsure and <strong>21 percent </strong>said they would not consider it. While that obviously reveals a great deal of uncertainty, McClinton said one way to look at the results is that nearly 80 percent of bank respondents are at least open to the idea of cloud-based core banking.”</p> <p>Still, experts and analysts who are steeped in the world of core banking solutions, or CBS, think cloud-based core banking will soon become more mainstream. John Schlesinger, chief enterprise architect at CBS provider Temenos, told<a href="https://www.computerworlduk.com/cloud-computing/cloud-adoption-by-banks-gathers-pace-but-will-core-systems-be-next-3658388/" target="_blank"> Computerworld UK</a> last year that he thinks the majority of new core banking projects launched by 2020 will be in the cloud.</p> <p>James O’Neill, formerly an analyst at financial technology research and advisory firm Celent and now a managing partner at fintech investment firm Motive Partners, <a href="https://www.celent.com/insights/366106616" target="_blank">wrote in June 2017</a> that by <strong>2019</strong>, cloud-based CBS platforms “will have gained enough market traction to become a regular part of a bank’s RFP process.”</p> <p>“Banks and their IT service providers ought to start now in formulating their competitive response to the <strong>coming age of banking in the cloud</strong>,” he wrote.</p> <p>“The migration of CBS platforms to the public cloud presents a rare opportunity to achieve two conflicting objectives at once: reducing costs and capital requirements while increasing agility in the building and running new digital services,” O’Neill noted.</p> <p>According to David Mitchell, president of core banking modernization company Nymbus, the cloud “is a business asset that no modern bank — regardless of size — can afford to bypass.”</p> <p>“It’s become clear that any financial institution relying on a legacy infrastructure cannot compete against faster and more innovative digital competitors,” he tells BizTech.</p> <p>Cloud-based CBSs enable financial institutions to <strong>accelerate their growth in unparalleled ways</strong>, Mitchell says.</p> <p>“Modernizing their existing technology environments enables them to automate operations and workflows, resulting in increased efficiency, security and cost savings,” he says. “With the right digital partner, these organizations are set up to rapidly respond to new digital products and services for serving their current and future consumers.”</p> <h2>Best Practices for Adopting Cloud-Based Core Banking</h2> <p>If you are an IT leader at a bank and are considering adopting a cloud-based CBS, what do you need to think about?</p> <p>Mitchell advises IT leaders gather as much information as possible and immerse themselves in the trend. “Even if they are not going to pursue those opportunities, having educational conversations is a great way to get to know what options they have when they’re finally ready to transition,” he says.</p> <p>A critical element of any transition is <a href="https://www.cdw.com/content/cdw/en/industries/financial-services/financial-services-technology.html" target="_blank">finding the right partners</a> with which to <strong>build meaningful relationships</strong>, Mitchell says. “We put our clients and prospects at the heart of everything we do, and we always act with honesty and integrity,” he says. “We also stress the importance of communication and being transparent. Not only does it make the entire experience better for both parties, but it also creates the foundation needed to be successful.”</p> <p>Banks need to have the <strong>right people and tools in place to make a migration successful</strong>, especially leaders who can adapt to changing technologies, says Mitchell. “They must also ditch the mindset of ‘this is the way it’s always been done,’” he adds. “Having training materials in place and a developed implementation plan will ultimately provide them with the resources they need to succeed.”</p> <p>Another consideration is whether to go with a public or private provider for a cloud-based CBS. Some cloud-based core providers, like Mambu, work with public cloud providers. Last year, Finastra, the company formed by the merger of the bank-technology vendors D+H and Misys, <a href="https://www.finastra.com/about/press-releases/finastra-ibm-strategic-partnership" target="_blank">announced it would run</a> a digital banking and core processing platform in <a href="https://www.cdw.com/content/cdw/en/brand/ibm.html" target="_blank">IBM</a>’s cloud. Public cloud providers can provide <strong>scale and security</strong> for banks.</p> <p>Nymbus’s platform dedicates a private cloud to each client, “ensuring high levels of security that cannot be accessed by other clients in the same data center,” Mitchell says. In doing so, “the hardware, storage and network configuration is ultimately dedicated to each client.”</p> <p>That makes compliance “significantly easier, faster and cheaper to achieve,” Mitchell says. “Unlike the public cloud, the private cloud allows hardware performance, network performance and storage performance to be specified and customized to each institution’s business needs.”</p> <p>Whether banks go with a public or private cloud, they must always ensure that their (and their customers’) data is as secure as possible, which is why a close partnership on cybersecurity is essential in any transition.</p> <p>Cloud-based core banking may not be booming right now, but banks should <strong>take note of the trend</strong> since it can deliver clear benefits and will likely grow more prominent in the years ahead.</p> <p><em>This article is part of </em>BizTech<em>'s <a href="https://biztechmagazine.com/equity">EquITy blog series</a>. Please join the discussion on Twitter by using the <a href="https://twitter.com/search?q=%23FinanceTech&amp;src=typd">#FinanceTech</a> hashtag.</em></p> <p> </p> <p><a data-entity-type="" data-entity-uuid="" href="https://biztechmagazine.com/equity"><img alt="Equity_logo_sized.jpg" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Equity_logo_sized.jpg" /></a></p> </div> <div> <div class="field-author"><a href="/taxonomy/term/11491" hreflang="en">Dan Hansen </a></div> </div> Fri, 17 Aug 2018 14:01:06 +0000 juliet.vanwagenen_22746 41916 at https://biztechmagazine.com How to Keep Online Nonprofit Donations Safe https://biztechmagazine.com/article/2018/08/how-keep-online-nonprofit-donations-safe <span>How to Keep Online Nonprofit Donations Safe</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 08/17/2018 - 09:06</span> <div><p>Digital contributions make up a growing proportion of the total donations nonprofit organizations collect. According to <a href="https://ssir.org/articles/entry/is_online_fundraising_a_bad_idea" target="_blank">research published in 2017 by the <em>Stanford Social Innovation Review</em></a>, the amount of individual donor revenue raised from online giving grew from 17 to 24 percent in just two years.</p> <p>With about one in four donations coming from online sources, nonprofits need to ensure that they are <strong>protecting donors’ information and data and combating fraudulent donations</strong>.</p> <p>As Sean Chisholm, vice president of <a href="https://www.classy.org/" target="_blank">Classy</a>, a crowdfunding platform designed specifically for nonprofits, writes in <a href="https://www.classy.org/blog/the-fight-against-fraudulent-donations/" target="_blank">a company blog post</a>, malicious actors who use stolen credit card information target nonprofits for several reasons. First and foremost, <strong>nonprofits tend to have simple and static donation forms </strong>and checkout pages that are not sophisticated compared to e-commerce websites.</p> <p>Chisholm writes: </p> <blockquote><p>There’s no dynamic shopping cart functionality to contend with, which means that it’s a lot easier for credit card rings to write automated scripts that can churn hundreds or thousands of stolen cards through a page every day. Plus, visitors can input any donation amount that they want on a nonprofit checkout form. This lets fraudsters easily test transaction limits on stolen cards. In short, the very features that make nonprofit donation pages easy to use for legitimate donors also make them attractive targets for credit card rings.</p> </blockquote> <p>Fraudulent donations force nonprofits to <strong>offer donors refunds, pay fees to financial institutions, lose staff time </strong><strong>to</strong><strong> dealing with the issue</strong> and, perhaps most significantly, suffer <strong>a loss of reputation</strong>. Given that dynamic, nonprofits need to take steps not only to defend against fraudulent donations but to protect donor information from being harvested by hackers.</p> <p>Fortunately, there are several best practices and technologies nonprofit IT leaders can use to guard against these threats.</p> <p><a href="https://biztechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP: </strong>Get more news from the <em>BizTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Nonprofits Can Use Policies and Tech to Battle Fraudulent Donations</h2> <p>The first step any nonprofit should take is to conduct a risk assessment. Simply because an organization has never experienced a breach does not mean that it will not.</p> <p>As Paul Arnpriester, a national nonprofit business development manager with CDW, <a href="https://blog.cdw.com/security/3-ways-nonprofits-can-achieve-security-compliance-2018" target="_blank">notes in a blog post</a>, “a <a href="https://www.cdw.com/content/cdw/en/solutions/cybersecurity/security-assessments.html" target="_blank">professional risk assessment</a> can help IT and other organizational leaders better understand the ways in which their nonprofit is vulnerable, leading to insights that will inform security improvements, user training and incident response plans.”</p> <p><strong>Once a nonprofit knows its vulnerabilities, it can take steps to plug any gaps in its cybersecurity defenses. </strong>Many nonprofits do not have large IT teams or dedicated IT security staff, and <a href="https://biztechmagazine.com/article/2018/06/what-nonprofits-should-ask-when-hiring-freelance-it-help" target="_blank">turn to outside help on these fronts</a>.</p> <p>There are several security vendors that can offer strong data protection technologies, including <a href="https://www.cdw.com/content/cdw/en/brand/forcepoint.html" target="_blank">Forcepoint</a>, <a href="https://www.cdw.com/content/cdw/en/brand/mcafee.html" target="_blank">McAfee</a>, <a href="https://www.cdw.com/content/cdw/en/brand/paloalto.html" target="_blank">Palo Alto Networks</a> and <a href="https://www.cdw.com/content/cdw/en/brand/trendmicro.html" target="_blank">Trend Micro</a>, among others. Some vendors cater specifically to nonprofits. MobileCause notes that it is <a href="https://www.mobilecause.com/credit-card-processing/pci-dss-certification/" target="_blank">a certified Payment Card Industry Data Security Standard Level 1 security provider</a>, and adheres “to the highest industry standards for data protection.”</p> <p>Nonprofits should ensure that their data protection solution provider is PCI DSS-compliant, and can offer<strong> multifactor authentication, donor fraud protections, credit card and bank account security, and IP security </strong>— especially from international threats.</p> <p>Another key tool nonprofits should turn to is encryption. Chris Teitzel, CEO of encryption key management firm <a href="https://www.lockr.io/" target="_blank">Lockr</a>, notes that nonprofits should<strong> “encrypt communications to and from your website” </strong>with certificates purchased from a trusted certificate authority. Writing <a href="https://givewp.com/website-security-online-donations/" target="_blank">on the blog of GiveWP</a>, a leading Wordpress donation plug-in, he says that nonprofits should look to use Transport Layer Security technology.</p> <h2>Best Practices to Keep Nonprofit Donor Data Secure</h2> <p>In terms of protecting donor data, nonprofit fundraising platform <a href="https://snowballfundraising.com/3-ways-to-protect-your-donors-their-donations/" target="_blank">Snowball Fundraising offers</a> several best practices to follow.</p> <p>Nonprofits should “clearly define what information can be released and under what circumstances,” the firm notes in a blog post, and “any third party that requests access to personal information should be presented with and held accountable to the same policy.”</p> <p>Nonprofits should also<strong> limit which staff members can access donor </strong><strong>data</strong>, since not everyone needs to. Nonprofits need to practice the principle of least privilege and have clear policies and technologies in place to ensure that only those who need to access donor data can do so.</p> <p>“Additionally, anyone that does need access to your donor database should have a separate set of credentials,” the Snowball blog notes. “When each employee is using a different account, you can not only dictate the types of permissions each user has but also detect unauthorized activity easier.”</p> <p>Donors’ sensitive data, including their credit card information, should also be <strong>encrypted or tokenized</strong>. “Typically, tokens replace credit card or account numbers with a series of numbers that are randomly generated using proprietary algorithms,” the Snowball blog adds. “Tokens only keep a small portion of the sensitive information (usually the last four digits) as a means of accurately matching the card owner to the token.”</p> <p>Tokenization makes it more difficult for attackers to gain access to donor data. And it means nonprofits are holding smaller volumes of sensitive information, which simplifies the PCI requirements that must be met, the blog adds. Tokens can also be used repeatedly, and even if tokens are accessed by a hacker, they will not get access to donor data.</p> </div> <div> <div class="field-author"><a href="/author/phil-goldstein" hreflang="en">Phil Goldstein</a></div> </div> Fri, 17 Aug 2018 13:06:10 +0000 phil.goldstein_6191 41911 at https://biztechmagazine.com What Is a CASB, and Why Is It Important? https://biztechmagazine.com/media/video/what-casb-and-why-it-important <span>What Is a CASB, and Why Is It Important?</span> <div><p>The cloud has revolutionized IT, but it also has created new security challenges. To protect their data in the cloud, organizations must shift their focus from infrastructure security to information security. At the CDW Managing Risk SummIT in Boston, we spoke with security experts about how cloud access security broker solutions can provide a unified control point for visibility into cloud applications, use and data. Visit our <a href="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape-0">CDW Managing Risk SummIT landing page</a> to view more articles and videos from the event.</p> <p><strong>&gt;&gt;<a href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report">Download CDW's Cybersecurity Insight Report</a> to learn more about how organizations are managing risk in more effective ways.</strong></p> </div> <span><span lang="" about="/user/81" typeof="schema:Person" property="schema:name" datatype="">matt.mclaughlin</span></span> <span>Thu, 08/16/2018 - 16:01</span> <div> <div>Tweet text</div> <div>See what Eric Andrews of @Symantec and Srini Gurrapu of @McAfee had to say about how a #CASB can improve #cloud #security at the #CDWSummit2018</div> </div> <div> <div>Video ID</div> <div><p>1208110706</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT24650</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/what-casb-and-why-it-important" data-title="See what Eric Andrews of @Symantec and Srini Gurrapu of @McAfee had to say about how a #CASB can improve #cloud #security at the #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Aug</span> <span>16</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/what-casb-and-why-it-important" data-title="See what Eric Andrews of @Symantec and Srini Gurrapu of @McAfee had to say about how a #CASB can improve #cloud #security at the #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/media/video/what-casb-and-why-it-important" data-title="See what Eric Andrews of @Symantec and Srini Gurrapu of @McAfee had to say about how a #CASB can improve #cloud #security at the #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitok%3D9BdHXZ8J%26destination%3D%2F%253Fitok%253D9BdHXZ8J%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> Thu, 16 Aug 2018 20:01:59 +0000 matt.mclaughlin 41906 at https://biztechmagazine.com CASBs Provide Visibility for Companies’ Cloud-based Blind Spots https://biztechmagazine.com/article/2018/08/casbs-provide-visibility-companies-cloud-based-blind-spots <span>CASBs Provide Visibility for Companies’ Cloud-based Blind Spots</span> <span><span lang="" about="/user/22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Thu, 08/16/2018 - 14:40</span> <div><p>As organizations put more of their information on the cloud and conduct more of their business there, they’re discovering that the process of tracking their data is becoming more complicated — and occasionally out of their hands.</p> <p>While they’re able to <strong>monitor data</strong> being transferred within the company, they’re <strong>not always able to see exchanges</strong> from one app to another — for example, when an employee shares company information stored on Box.com to a personal email.</p> <p>“All of our existing network security infrastructure becomes blind to data transfers that happen in the cloud,” said Srini Gurrapu, <a href="https://www.cdw.com/content/cdw/en/brand/mcafee.html?enkwrd=McAfee" target="_blank">McAfee</a>’s chief cloud evangelist, speaking at <a href="https://cdwevents.cio.com/ehome/index.php?eventid=302104&amp;" target="_blank">CDW’s Managing Risk </a><a href="https://cdwevents.cio.com/ehome/index.php?eventid=302104&amp;" target="_blank">SummIT</a><a href="https://cdwevents.cio.com/ehome/index.php?eventid=302104&amp;" target="_blank"> in Boston</a>.</p> <p><strong>Cloud access security brokers</strong> provide a new security avenue for companies that want to store information in the cloud, giving them ways to track east-west traffic, to monitor shadow IT and to kick suspicious users off their networks.</p> <p>CASBs create visibility in areas of the network that companies weren’t previously able to see, said Eric Andrews, vice president of cloud security for <a href="https://www.cdw.com/content/cdw/en/brand/symantec.html?enkwrd=Symantec" target="_blank">Symantec</a>. “And not only can I discover risky apps, I can do something about them,” he added.</p> <p>The average corporate network contains about <strong>2,000 cloud-based apps</strong>, Gurrapu said, everything from <a href="https://www.cdw.com/product/Microsoft-Office365/3378800" target="_blank">Office365</a> to employees’ personal <a href="https://www.cdw.com/content/cdw/en/brand/google-cloud.html" target="_blank">Google Suite</a> accounts. “The cloud means easy sharing,” he said. “That’s a major, major security risk.”</p> <p><a href="https://biztechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP:</strong> Get more news from the BizTech newsletter in your inbox every two weeks!</a></p> <h2>How CASBs Create a Secure Environment</h2> <p>Among the functions that CASBs can provide:</p> <ul><li><strong>The ability to see information flowing from cloud to cloud</strong>, and the ability to stop it if the activity looks suspicious. For example, a company can keep data encrypted even after it’s been downloaded, “and make sure the user has to phone home in order to gain control to that content. They can’t open it without authorization,” Andrews said.</li> <li><strong>More sophisticated user authorization</strong>. Most companies use a simple sign-on procedure; once you’re in, you’re in, Andrews said. But what if someone who is legitimately logged in begins behaving suspiciously? “You want to be able to do things on the fly. You want adaptive authorization,” he said. “As the threat elevates on that user, I can push back to get that user off the system and make them re-verify.”</li> <li><strong>Coordination among cloud services and on-premises technology</strong>. If an organization already has data-loss prevention technology in place, it should be able to coordinate with the cloud service provider to create one monitoring system, Andrews said. CASBs help to integrate the technologies so that the organization has one system with one set of policies. “This is all happening on the back end,” he said. “I don’t have to build new filters every time I find a risky app.”</li> </ul><p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> <h2>CASB Challenges Still Exist for Businesses</h2> <p>CASBs have a few hurdles still to overcome: <strong>no industrywide standards exist</strong> for them yet, though Gurrapu said that’s being worked on. And they’re not effective for situations that involve money transfers.</p> <p>“The industry is struggling a little in terms of coming up with new best practices,” Andrews said. “This whole migration to cloud is putting a strain on organizations from a people and process standpoint.”</p> <p>But the hope — and the early experience — is that CASBs create an environment where more risk is spotted earlier, and <strong>resolved more quickly</strong>.</p> <p>“It’s an <strong>automated watchdog</strong> looking over the shoulders of your users,” Andrews said.</p> <p><em><a href="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape-0" target="_blank">Check out our event page</a> for more articles and videos from the Managing Risk SummIT.</em></p> </div> <div> <div class="field-author"><a href="/taxonomy/term/11776" hreflang="en">Elizabeth Neus </a></div> </div> Thu, 16 Aug 2018 18:40:13 +0000 juliet.vanwagenen_22746 41901 at https://biztechmagazine.com Younger Candidates Could Bridge Cybersecurity Talent Gaps https://biztechmagazine.com/article/2018/08/younger-candidates-could-bridge-cybersecurity-talent-gaps <span>Younger Candidates Could Bridge Cybersecurity Talent Gaps</span> <span><span lang="" about="/user/22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Thu, 08/16/2018 - 10:08</span> <div><p>To find tomorrow’s badly needed cyberworker, organizations may start looking at high school students, inexperienced adults and even young hackers.</p> <p>“We work every day to improve our technology, to improve our risk management capabilities for our customers,” said Ed Cabrera, chief cybersecurity officer for <a href="https://www.cdw.com/content/cdw/en/brand/trendmicro.html" target="_blank">Trend Micro</a>, speaking at <a href="https://cdwevents.cio.com/ehome/index.php?eventid=302104&amp;" target="_blank">CDW’s Managing Risk </a><a href="https://cdwevents.cio.com/ehome/index.php?eventid=302104&amp;" target="_blank">SummIT</a> in Boston. “But if you don’t have the right people — in-house or externally — supporting you, it’s not going to get anywhere.”</p> <p>With more than <strong>300,000 open cybersecurity jobs</strong> in the public and private sectors combined, the rush to find workers to fill those positions is on. It takes an average of <strong>nine to 12 months</strong> to fill a position once it opens, said Bob Bragdon, publisher of the online magazine CSO.</p> <p>Most open slots are in jobs that focus on operating and maintaining a security system, protecting and defending the system and securely provisioning it, said Cabrera, a <strong>former CISO for the Secret Service</strong> who also worked for the Department of Homeland Security.</p> <p>The shortages are worse in some parts of the country than in others, he said. Washington, D.C., needs <strong>43,000</strong> more cybersecurity workers; New York City, about <strong>20,000</strong>; and Chicago, <strong>11,500</strong>.</p> <p>“It’s great for us as far as having a low unemployment rate within the industry, but obviously, it’s a problem we have to overcome,” Cabrera said. “Where can you — and how can you — develop the workforce you need to meet this challenge?"</p> <p><a href="https://biztechmagazine.com/register?newsletter" target="_blank">SIGN UP: Get more news from the BizTech newsletter in your inbox every two weeks</a></p> <h2>Colleges, K—12 Schools Could Be Cybersecurity Pipelines</h2> <p>The easy answer is “college campuses,” but although there’s been <a href="https://biztechmagazine.com/article/2018/07/companies-call-community-colleges-address-shortages-tech-talent">increasing collaboration between industry and academia to develop cybersecurity programs</a>, it’s still a slow road, he said.</p> <p>Industry might want to consider younger candidates, even <strong>high school students</strong>, several experts suggested. “These kids, their aptitude is off the charts,” said Nick Bennett, director of professional services for Mandiant. “But the pipeline does not exist. There is not awareness in K–12 that [a cybersecurity career] is an option.”</p> <p>Young adults with little experience may not be the experts companies are looking for, “but in four or five years, they will be a senior person,” said Sadik Al-Abdulla, director of security solutions for CDW.</p> <p>Adults who have not actually considered cybersecurity work may also be a resource. When Cabrera was in the Secret Service, he found it difficult to find good cybersecurity candidates who could also pass the tough security clearance process (and, he added, who were willing to carry a gun).</p> <p>“We had to look at possibly <strong>identifying aptitude within the agent population</strong> that existed for this, and say, OK, we’ll train you,” he said. Some already had computer science backgrounds, others were teachers, but they all had an interest and an aptitude, he added.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> <p>Security expert Brian Krebs, author of the <a href="https://krebsonsecurity.com/" target="_blank">Krebs on Security blog</a>, made a bold suggestion: recruit young hackers before they turn criminal. If colleges can sign seventh- and eighth-graders for sports teams, why can’t companies search out young computer whizzes?</p> <p>“At some point, <strong>we need to have a long-term strategy</strong> in this country about how to get these people involved for the good side,” he said. “There’s an opportunity there.”</p> <p><em><a href="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape-0" target="_blank">Check out our event page</a> for more articles and videos from the Managing Risk SummIT.</em></p> <div class="sidebar_wide">  <h2>4 Places to Find Help with Cyber Careers</h2> <p>Ed Cabrera, chief cybersecurity officer for Trend Micro, suggests these websites as resources for organizations searching for cybersecurity workers:</p> <ul><li> <a href="https://www.cyberseek.org/index.html" target="_blank">CyberSeek</a> (cyberseek.org) outlines possible career paths (and describes them by skill sets rather than title), provides maps of where the jobs are and suggests questions for decision-makers to consider. It’s for employers, students, job seekers, policymakers and more.</li> <li><a href="https://nicerc.org/" target="_blank">NICERC</a> (nicerc.org), the National Integrated Cyber Education Research Center, focuses on K–12, providing professional development, curricula, programs and information on how to attract young students to STEM jobs.</li> <li><a href="https://www.cybercompex.org/" target="_blank">CyberCompEx</a> (cybercompex.org) is a resource for locating cyber competitions at which people of all ages can gain experience.</li> <li><a href="https://niccs.us-cert.gov/" target="_blank">The National Initiative for Cybersecurity Careers and Studies</a> (niccs.us-cert.gov) is a federal program that provides information on training and career opportunities in cybersecurity.</li> </ul></div> </div> <div> <div class="field-author"><a href="/taxonomy/term/11776" hreflang="en">Elizabeth Neus </a></div> </div> Thu, 16 Aug 2018 14:08:48 +0000 juliet.vanwagenen_22746 41896 at https://biztechmagazine.com Why Email Security Is a Vulnerability for Many Organizations https://biztechmagazine.com/media/video/why-email-security-vulnerability-many-organizations <span>Why Email Security Is a Vulnerability for Many Organizations</span> <div><p>Email is a ubiquitous tool, but that also makes it a target for cyberattacks. Organizations have to find a way to protect their data against the increasing sophistication of phishing attacks. At the CDW Managing Risk SummIT in Boston, we spoke to security experts about why the threat has grown, and what organizations can do about it. Visit our <a href="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape-0">CDW Managing Risk SummIT landing page</a> to view more articles and videos from the event.</p> <p><strong>&gt;&gt;<a href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report">Download CDW's Cybersecurity Insight Report</a> to learn more about how organizations are managing risk in more effective ways.</strong></p> </div> <span><span lang="" about="/user/81" typeof="schema:Person" property="schema:name" datatype="">matt.mclaughlin</span></span> <span>Wed, 08/15/2018 - 19:00</span> <div> <div>Tweet text</div> <div>See why #security experts Andy Spencer of @Cofense and Jeff Falcon of @CDWCorp say #phishing has become such a major cyberthreat #CDWSummit2018</div> </div> <div> <div>Video ID</div> <div><p>1785590247</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/why-email-security-vulnerability-many-organizations" data-title="See why #security experts Andy Spencer of @Cofense and Jeff Falcon of @CDWCorp say #phishing has become such a major cyberthreat #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Aug</span> <span>15</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/why-email-security-vulnerability-many-organizations" data-title="See why #security experts Andy Spencer of @Cofense and Jeff Falcon of @CDWCorp say #phishing has become such a major cyberthreat #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/media/video/why-email-security-vulnerability-many-organizations" data-title="See why #security experts Andy Spencer of @Cofense and Jeff Falcon of @CDWCorp say #phishing has become such a major cyberthreat #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitok%3D9BdHXZ8J%26destination%3D%2F%253Fitok%253D9BdHXZ8J%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> Wed, 15 Aug 2018 23:00:06 +0000 matt.mclaughlin 41891 at https://biztechmagazine.com Evolving Attacks Put a Major Strain on the Cybersecurity Workforce https://biztechmagazine.com/media/video/evolving-attacks-put-major-strain-cybersecurity-workforce <span>Evolving Attacks Put a Major Strain on the Cybersecurity Workforce</span> <div><p>The IT security workforce needs a boost. The growing number and sophistication of threats require more security professionals and greater skills. At the CDW Managing Risk SummIT in Boston, we spoke with Ed Cabrera, chief cybersecurity officer for Trend Micro, about how the IT industry can meet the demands of this daunting challenge. Visit our <a href="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape-0">CDW Managing Risk SummIT landing page</a> to view more articles and videos from the event.</p> <p><strong>&gt;&gt;<a href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report">Download CDW's Cybersecurity Insight Report</a> to learn more about how organizations are managing risk in more effective ways.</strong></p> </div> <span><span lang="" about="/user/81" typeof="schema:Person" property="schema:name" datatype="">matt.mclaughlin</span></span> <span>Wed, 08/15/2018 - 18:39</span> <div> <div>Tweet text</div> <div>@Ed_E_Cabrera of @TrendMicro says the #security workforce must evolve to keep pace with cyberthreats #CDWSummit2018</div> </div> <div> <div>Video ID</div> <div><p>1952002183</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT24650</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/evolving-attacks-put-major-strain-cybersecurity-workforce" data-title="@Ed_E_Cabrera of @TrendMicro says the #security workforce must evolve to keep pace with cyberthreats #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Aug</span> <span>15</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/evolving-attacks-put-major-strain-cybersecurity-workforce" data-title="@Ed_E_Cabrera of @TrendMicro says the #security workforce must evolve to keep pace with cyberthreats #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/media/video/evolving-attacks-put-major-strain-cybersecurity-workforce" data-title="@Ed_E_Cabrera of @TrendMicro says the #security workforce must evolve to keep pace with cyberthreats #CDWSummit2018" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitok%3D9BdHXZ8J%26destination%3D%2F%253Fitok%253D9BdHXZ8J%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> Wed, 15 Aug 2018 22:39:01 +0000 matt.mclaughlin 41886 at https://biztechmagazine.com