This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The Chief Information Security Officer (CISO) has become one of the most critical roles in modern organizations. Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities.
But amidst all these flashy, futuristic threats, the biggest cybersecurity risk remains the same as it's always beenhumans. Cybersecurity Through Human Behaviour just confirmed what most of us in the field already know: Cybersecurity isn't just a tech problemit's a behavior problem. And humbly, we're getting it very wrong.
In most organizations, it is common for both the CISO and CIO to have responsibilities around cybersecurity—an issue increasingly pivotal to the effective running of any modern business. Clear, defined cybersecurity ownership can prove integral to successful organizational security positioning.
Cybersecurity governance has undergone a dramatic transformation over the past few decades. We have moved beyond traditional compliance-driven security models to risk-based approaches, integrating cybersecurity into enterprise risk management (ERM) frameworks. But the question remains: where are we headed?
The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs. To read this article in full, please click here
Working in cybersecurity is demanding. Cybersecurity is fast-paced and can be demanding. The cybersecurity industry is one where many professionals feel the effects of burnout, with 77% of workers experiencing work-related stress in a given month. In the context of cybersecurity, burnout can manifest itself in several ways.
Security's all-too-frequent appearance as a front-page headline making topic has put CISOs in the hot seat as CEOs and boards worry that it could be their names next in news stories trying to explain how a breach occurred. Yet the CISO message to the C-suite might not be all that reassuring.
Chief Information Security Officer (CISO) Luis Gonsalves, Head of Security for Portugal’s central bank, and founder of the Cloud Security Alliance’s Portugal Chapter, says Certified Cloud Security Professional (CCSP) stands out from other technical certifications. Read the Full Article. That’s the real differentiator ,” he says.
These events and many more have changed the business landscape and forced CISOs to steer a course through uncertain waters. To read this article in full, please click here
Every chief security executive knows that one of the most important—and perhaps challenging—aspects of the job is getting the funding needed to support the cybersecurity program. The person handing the decision making on budgeting is often the CFO, so CISOs would be wise to learn the best ways to interact with these finance professionals.
Neurodiversity within cybersecurity is progressively becoming a topic of regular, meaningful discussion across the sector. To read this article in full, please click here (Insider Story) To read this article in full, please click here (Insider Story)
Richard Staynings is a renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world.
Being a CISO is a hard job. You can be a superstar, build a world-class cybersecurity program, and follow best practices, providing exceptional protection for the organization. Yup, CISOs have heavy responsibilities. To read this article in full, please click here When this happens, it's your fault.
Back in 2015 and 2017, I ran articles in Inc. Today, however, after, having had literally hundreds of conversations with, and about, Israeli cybersecurity companies, I thought that I would mention to my readers a few of the firms that I find interesting. The firm has also expanded into cybersecurity systems for aircraft.
I didn't take the "traditional" path into cybersecurity, because when I started, there wasn't one. What I'd do differently Define my long-term cybersecurity career path early (offensive, defensive, leadership?) Skip the degree (unless you absolutely need it) I have a degree, but let me be blunt: it didn't get me into cybersecurity.
Misaligned expectations, poor communication and even attempts to bury vulnerabilities create a frustrating and potentially dangerous situation for CISOs. However, as this article demonstrates, 2FA is not foolproof. The post Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24 appeared first on Security Boulevard.
Effective partnerships between CISOs and their cybersecurity vendors are integral to security success. A well-oiled relationship built on trust, communication and mutual understanding can reap significant benefits for a business’s cybersecurity posture. To read this article in full, please click here
The role of the CISO has evolved, and so have the responsibilities. Some believe a CISO must have technical knowledge and experience as a cybersecurity professional, others think leadership skills such as being able to communicate with boards are what matters most. To read this article in full, please click here
Corporate boards are asking their CISOs to inform them more often about cybersecurity risks. Here are some common mistakes that CISOs make when speaking to the board, along with advice for avoiding them. To read this article in full, please click here
In the guidance issued by the Cybersecurity and Infrastructure Security Agency (CISA) in April 2021 on securing one’s supply chain, a portion of the guidance was dedicated to the threat vector posed to entities during their design phase. Some CISOs lack the recognition that the latter is the support element to the former.
Even though there is a growing demand for cybersecurity expertise at the highest levels of business, a significant number of public companies lack even one qualified cybersecurity expert on their board of directors, according to a study by cybersecurity research and advisory firm IANS.
What is it like to not only be a CISO but to also be one in a large, global organization? I recently had the pleasure of speaking with Mark Ruchie, CISO of Entrust, a global tech firm securing data, payments and identities. Mark shared his unique journey into cybersecurity, and he went on to offer excellent […]… Read More.
It doesn’t communicate enough to other executives,” says Marinkovic, who provides virtual CISO services through Tiro Security and serves on the Emerging Trends Working Group with the IT governance association ISACA. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
CISOs will have to manage new security challenges in a post-pandemic world. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
As the world continues to face unprecedented cyber threats, Chief Information Security Officers (CISOs) are facing a growing number of challenges in their roles. In 2023, these challenges are likely to increase, and CISOs will have to be well-equipped to overcome them. Failure to do so can result in hefty fines and penalties.
The oath Marene Allison took years ago to defend and protect the United States is the same tenet that now guides her work maintaining cybersecurity at one of the largest pharmaceutical and consumer packaged goods manufacturers in the world. To read this article in full, please click here Allison is accustomed to missions.
Global cybersecurity concerns are returning to pandemic levels as 68% of CISOs from 16 countries said they fear a cyberattack in the next 12 months, according to a ProofPoint survey. To read this article in full, please click here
AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Everybody within an organization should work to establish and maintain good cybersecurity habits and measures, but much of the security burden falls on the chief information security officer (CISO).
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. To read this article in full, please click here Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
The 5 th annual Life and Times of Cybersecurity Professionals report from ESG and the Information Systems Security Association ( ISSA ) provides valuable insight into the challenges cybersecurity pros face, how they see themselves relative to the rest of the organization, and what brings them job satisfaction, among many other data points.
Anyone who ever attended an RSA conference understands that cybersecurity vendors introduce hundreds of amazing, innovative products every year. Faced with a severe shortage of security professionals and up against rapidly evolving threats, CISOs are looking for strategic partners, advisory services, and vendors that offer broad platforms.
A global cybersecurity skills shortage continues to plague the industry. An estimated three million-plus cybersecurity roles are unfilled across the globe. That gap is unlikely to shrink without intervention from hiring companies and CISOs.
Embrace the challenges of cybersecurity leadership For many of us in the security industry, it ' s the pinnacle of our career. And now, you finally got that call, to be a CISO at an organization. Was there a previous CISO? It's also extremely important to understand the history of the CISO role in the past.
Nearly half of CISOs will change jobs by 2025 due to stress caused by the risk of being breached while trying to retain staff, according to the Gartner report, Predicts 2023: Cybersecurity Industry Focuses on the Human Deal. To read this article in full, please click here
The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. To read this article in full, please click here Learn the 7 keys to better risk assessment. | Get the latest from CSO by signing up for our newsletters. ].
Cybersecurity’s ongoing battle with a “skills shortage” has seen the sector lose its way regarding talent hiring and retention, says Christian Toon, CISO at London-based law firm Pinsent Masons. To read this article in full, please click here
About 52% of chief information and security officers (CISOs) in the US and UK organizations are unable to fully secure their company secrets, according to a report by code security platform GitGuardian. To read this article in full, please click here
The trial of former Uber CISO Joe Sullivan marks the first time a cybersecurity chief has faced potential criminal liability. To read this article in full, please click here
The hybrid working model, fast-paced digitalization, and increased number of ransomware incidents have changed the security landscape, making CISOs' jobs more complex than ever. To read this article in full, please click here (Insider Story)
Enterprise spending on cybersecurity is expected to hold steady in 2022, as studies show that nearly all CISOs are getting a budget increase or level funding in the new year—only a small fraction of security chiefs will see their budgets fall. To read this article in full, please click here
Security operations centers – the units that manage overall cybersecurity within an organization – have been getting a workout during COVID-19. This shift to remote work has put a spotlight on three inter-related issues for business and cybersecurity leaders in modernizing SOCs to meet the needs of today’s workplace.
AI and machine learning (ML) capabilities present a huge opportunity for digital transformation but open yet another threat surface that CISOs and risk professionals will have to keep tabs on. To read this article in full, please click here
As the role of the CISO continues to grow in importance and gain more responsibility, many cybersecurity practitioners may wonder if they have what it takes to be successful in the role. To read this article in full, please click here Technical expertise and experience are obviously huge assets.
CISO Joanna Burkey believes security leaders must address these frictions to secure the future of the hybrid workplace. Learn the 5 key qualities of successful CISOs, and how to develop them and 7 security incidents that cost CISOs their jobs. IT conflicts create remote working cybersecurity risks.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content