Starkey, working out of the Department of Technology and Information, is responsible for the enterprise-wide protection of information assets from high consequence events, including cyber and physical terrorism and natural disasters. She chairs the Delaware Information Security Officer Team and is a member of the Governor's Homeland Security Council. She previously served as the chief technology officer at DTI and the CIO for the Delaware Department of Public Safety.
At a time of unprecedented mobile device adoption - and evolving mobile security threats - 72% of organizations rate their state of mobile security as poor-to-adequate. This is the key point to emerge from the results of the Beyond BYOD: 2013 Mobile Security Strategies Survey, produced by Information Security Media...
- Premium Members Only Content - Exclusive Video -
Security leaders agree: You can't realistically say "no" to the bring-your-own-device movement. But you also cannot say "yes" without taking on significant mobile security challenges. None any bigger than identity and access management.
Elayne Starkey of the...
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.
Harkins is responsible for all aspects of information risk and security at Cylance as well as public policy and customer outreach to help improve understanding of cyber risks. He spent 23 years with Intel, most recently as its first Chief Security and Privacy Officer. In this role, he was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services. Before becoming Intel's first CSPO, he was the chief information security officer (CISO), reporting to the chief information officer. Harkins also held roles in finance, procurement and various business operations.
Starkey, working out of the Department of Technology and Information, is responsible for the enterprise-wide protection of information assets from high consequence events, including cyber and physical terrorism and natural disasters. She chairs the Delaware Information Security Officer Team and is a member of the Governor's Homeland Security Council. She previously served as the chief technology officer at DTI and the CIO for the Delaware Department of Public Safety.
Harkins is responsible for all aspects of information risk and security at Cylance as well as public policy and customer outreach to help improve understanding of cyber risks. He spent 23 years with Intel, most recently as its first Chief Security and Privacy Officer. In this role, he was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services. Before becoming Intel's first CSPO, he was the chief information security officer (CISO), reporting to the chief information officer. Harkins also held roles in finance, procurement and various business operations.
Starkey, working out of the Department of Technology and Information, is responsible for the enterprise-wide protection of information assets from high consequence events, including cyber and physical terrorism and natural disasters. She chairs the Delaware Information Security Officer Team and is a member of the Governor's Homeland Security Council. She previously served as the chief technology officer at DTI and the CIO for the Delaware Department of Public Safety.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.