article thumbnail

Here's A New Forum for Cybersecurity Leaders Outside of the Fortune 2000

The Hacker News

CISOs, or their equivalent decision-makers in organizations without the role, have so many constant drains on their attention – keeping their knowledge fresh, building plans to secure their organizations further – that they often find themselves on an island.

InfoSec 106
article thumbnail

The Risk-Conscious, Security-Aware Culture: The Forgotten Critical Security Control

Cisco Security

Chief Information Security Officers (CISOs) across the Global 2000 and Fortune 1000 are obsessed with protecting the workforce endpoints as critical vulnerabilities in the cybersecurity and risk management posture of their enterprises. If you are a CISO or Deputy CISO, please join us in our . CISO Connections program.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Second-Guessing the CISO in an Emergency

Duo's Security Blog

There were probably other constraints that I don’t know about and never will (“the only server we have available for this is running Windows 2000”). We live on to fight the good fight another day. I’ll just raise a glass to the team that managed to get it operating. You should too.

CISO 120
article thumbnail

Cybereason and Doosan Corp Partner to Secure APAC Enterprises

Security Boulevard

Cybereason is excited to announce a partnership with South Korean multinational conglomerate and Global Fortune 2000 leader the Doosan Corporation (Doosan Digital Innovation, or DDI) to protect enterprises from sophisticated cyberattacks on endpoints and across their networks. .

Antivirus 119
article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

Further to the topic of governance, FISMA decided to subordinate the CISO to the CIO, which is an organizational design no longer in favor among enterprises throughout the Fortune 500 and Global 2000. The modern CISO is more than “IT security.” He has also serviced as the CISO of Leonardo DRS and Cubic Global Defense.

CISO 117
article thumbnail

How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications

Webroot

Today, the average enterprise uses over 2000 cloud applications and services , and we expect this number will continue to grow as more businesses realize the efficiency, flexibility and collaboration benefits these services bring.

CISO 85
article thumbnail

Are Women Better Equipped than Men to Handle Stressful Situations in Cybersecurity?

Jane Frankland

Biobehavioral Responses to Stress in Females: Tend-and-Befriend, Not Fight-or-Flight According to researchers at the University of California (and published by Shelley E Taylor and her team in 2000), it turns out that during times of stress, males respond with a ‘fight or flight’ response, designed to compete, and conquer.