Topics
Events
Newsletters
Resources
Community
About
About Us
Advertise
Contact Us
Foundry Careers
Reprints
Newsletters
Policies
Privacy Policy
Cookie Policy
Member Preferences
About AdChoices
E-commerce Links
Your California Privacy Rights
Our Network
CIO
Computerworld
Infoworld
Network World
More
Awards
Blogs
Brandposts
Events
Podcasts
Videos
Close
Generative AI
Business Operations
Careers
Industry
IT Leadership
Compliance
Security
Application Security
Business Continuity
Cloud Security
Critical Infrastructure
Cybercrime
Identity and Access Management
Network Security
Physical Security
Privacy
Risk Management
Security Infrastructure
Vulnerabilities
Software Development
Back
Close
Americas
United States
Asia
ASEAN
India
Europe
United Kingdom
Oceania
Australia
Back
Close
Popular Topics
Search
US-EN
Topics
Events
Newsletters
Resources
Community
About
Policies
Our Network
More
Back
Topics
Generative AI
Business Operations
Careers
Industry
IT Leadership
Compliance
Security
Application Security
Business Continuity
Cloud Security
Critical Infrastructure
Cybercrime
Identity and Access Management
Network Security
Physical Security
Privacy
Risk Management
Security Infrastructure
Vulnerabilities
Software Development
Back
About
About Us
Advertise
Contact Us
Foundry Careers
Reprints
Newsletters
Back
Policies
Privacy Policy
Cookie Policy
Member Preferences
About AdChoices
E-commerce Links
Your California Privacy Rights
Back
Our Network
CIO
Computerworld
Infoworld
Network World
Back
More
Awards
Blogs
Brandposts
Events
Podcasts
Videos
Home
Awards
CSO 50 Award 2016
Damon Stokes
Damon Stokes
Award winner no. 46
Blue Cross Blue Shield of Michigan
Rank 46
Information Technology Manager II, Enterprise IT Security
Show me more
Latest
Articles
Podcasts
Videos
feature
Top cybersecurity M&A deals for 2023
By CSO Staff
Sep 22, 2023
24 mins
Mergers and Acquisitions
Mergers and Acquisitions
Mergers and Acquisitions
brandpost
Unmasking ransomware threat clusters: Why it matters to defenders
Sep 21, 2023
3 mins
Cybercrime
news analysis
China’s offensive cyber operations support “soft power” agenda in Africa
By Michael Hill
Sep 21, 2023
5 mins
Advanced Persistent Threats
Cyberattacks
Critical Infrastructure
podcast
CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical
Sep 20, 2023
12 mins
CSO and CISO
podcast
CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers
Sep 07, 2023
17 mins
CSO and CISO
podcast
CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role
Sep 06, 2023
10 mins
CSO and CISO
video
CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical
Sep 20, 2023
12 mins
CSO and CISO
video
What is zero trust security?
Sep 06, 2023
3 mins
Authentication
Zero Trust
Network Security
video
CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role
Sep 06, 2023
10 mins
CSO and CISO
Sponsored Links
dtSearch® - INSTANTLY SEARCH TERABYTES of files, emails, databases, web data. 25+ search types; Win/Lin/Mac SDK; hundreds of reviews; full evaluations
Tomorrow’s cybersecurity success starts with next-level innovation today. Join the discussion now to sharpen your focus on risk and resilience.