This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous example of the disconnect about a CISO’s role, says Joe Head, CISO search director at UK-based search firm, Intaso. To read this article in full, please click here
Mentioning the phrase “shadow IT” to CISOs often results in an eye-roll or a grimace. Learn the 5 key qualities of successful CISOs, and how to develop them and 7 security incidents that cost CISOs their jobs. To read this article in full, please click here Sign up for CSO newsletters. ].
“It’s like I raise my hand [in an oath] every morning and the mission is to protect and ensure the viability of my company in the cyber world,” says Allison, who has been the CISO at Johnson & Johnson for more than 12 years. To read this article in full, please click here Allison is accustomed to missions.
Being a CISO is a hard job. You must constantly balance business, technology, and regulatory requirements against things like employee and adversary behavior. Yup, CISOs have heavy responsibilities. To read this article in full, please click here When this happens, it's your fault. How are they dealing with this burden?
Today, CISOs face three primary challenges that prevent them from optimally protecting their organizations. First, is the tie to their current technology, which often suffers from complexity and siloed operations that prevent automation. To read this article in full, please click here The second challenge is process-related.
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. To read this article in full, please click here Sign up for CSO newsletters. ]. .
As the world continues to face unprecedented cyber threats, Chief Information Security Officers (CISOs) are facing a growing number of challenges in their roles. In 2023, these challenges are likely to increase, and CISOs will have to be well-equipped to overcome them. Failure to do so can result in hefty fines and penalties.
To read this article in full, please click here But Engle says he didn’t like other aspects of his position, particularly the governance and regulatory requirement tasks that intensified following the 2002 passage of the Sarbanes-Oxley Act.
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
Spy”-type cyberspace race as both criminals and defenders vie to gain the upper hand using new and emerging technologies. Every technology that enables our cyber teams to pinpoint and resolve threats and prevent attacks more quickly and accurately also benefits cybercriminals. We call these threat actors “ Quasi-APTs.”.
As the role of the CISO continues to grow in importance and gain more responsibility, many cybersecurity practitioners may wonder if they have what it takes to be successful in the role. To read this article in full, please click here Technical expertise and experience are obviously huge assets.
Getting back to the article, let's first break down the findings, the implications, and why it's time for a revolution in how we think about security. What if we thought like a psychologist, not just a CISO? This article appeared originally on LinkedIn here. So what do we do? it's WAY easier to hack minds than networks.
Delta Air Lines CISO Debbie Wheeler has a vast environment to secure, ranging from the corporate systems that are typical for any business to customer interfaces to kiosks sitting in airports around the world—and the slew of data coming in from all the applications that they house. To read this article in full, please click here
The past decade has seen an increase in the number of operational technology (OT) attacks and their impact on organizations. The survey also found that CISOs and business leaders consider OT security a top concern. The survey also found that CISOs and business leaders consider OT security a top concern.
An eternal discussion in security is whether technology, process or people are the critical element in information security at scale. To read this article in full, please click here (Insider Story) Most security leaders will tell you it’s the people that matter. It requires new positive habits and motivations.
CSO spoke with security leaders, researchers, and analysts about this significant issue and the implications for CISOs, businesses, and the wider sector. From a moral standpoint, CISOs should absolutely stop using Russian-made security and technology products. To read this article in full, please click here
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. I’ve been capturing aspects of my journey in talks and articles so that others might learn from my experiences. What was my first month like?
Truth, transparency and trust are the three T’s that all CISOs and CSOs should embrace as they march through their daily grind of keeping their enterprise and the data safe and secure. To read this article in full, please click here Failure to adhere to the three T’s can have serious consequences.
In this article, we explore: The current state of cybersecurity governance Emerging challenges that threaten effective governance The future of governance models in a hyperconnected world The state of cybersecurity governance today 1. This article appeared originally on LinkedIn here. I would welcome your options.
AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Everybody within an organization should work to establish and maintain good cybersecurity habits and measures, but much of the security burden falls on the chief information security officer (CISO).
Here's the SecureWorld News article on the announcement from last week, and key quote from an SEC press release on the matter: "Whether a company loses a factory in a fire—or millions of files in a cybersecurity incident—it may be material to investors," said SEC Chair Gary Gensler. CISOs are expected to be a unicorn already.
Back in 2015 and 2017, I ran articles in Inc. For years, in articles, lectures, and books I have discussed how the spread of IoT and AI technologies – both individually and together – are dramatically increasing the danger to human life posed by cyberattacks on healthcare facilities. Axis Security.
The analyst firm discovered that CISOs everywhere are struggling to justify their spending on MSSPs to non-security executives because of a lack of proper metrics and because of technology complexity—among other things. To read this article in full, please click here Sign up for CSO newsletters. ].
DRP is broadly defined as, “telemetry, analysis, processes, and technologies used to identify and mitigate risks associated with digital assets.” CISOs are investing here but challenges remain. To read this article in full, please click here In fact, these changes have led to a CTI subcategory focused on digital risk protection.
The title chief security officer (CSO) was first used principally inside the information technology function to designate the person responsible for IT security. To read this article in full, please click here At many companies, the term CSO is still used in this way.
CISOs have never had an easy time — they’ve certainly faced inordinate challenges in recent years working to secure an ever-expanding and more distributed technology and data landscape. To read this article in full, please click here For security chiefs, such news portends a tougher road ahead.
In my last blog post , I described how the market for eXtended Detection and Response (XDR) is evolving and how CISOs should approach this new and promising technology. To read this article in full, please click here (Insider Story)
Analysts must investigate and remedy thousands of alerts every day while remaining adaptable to an ever-changing technological landscape. RELATED: Battling Burnout: A Growing Concern for CISOs and Security Professionals ] That's why I've written this article because burnout awareness is key.
It will be the CIO, CISO and biz ops who will shoulder the implementation. Geopolitics and technology have always been linked so decisions must be based on corporate culture and values. To read this article in full, please click here Directives and requests will come from the CEO/board.
One crucial step towards achieving robust cybersecurity is hiring a competent Chief Information Security Officer (CISO). The CISO plays a pivotal role in safeguarding an organization’s digital assets and ensuring data privacy. Business Acumen: A CISO must understand the business landscape in which the organization operates.
Despite years of modernization initiatives, CISOs are still contending with an old-school problem: shadow IT, technology that operates within an enterprise but is not officially sanctioned — or on the radar of — the IT department. To read this article in full, please click here
For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks. It’s clear that generative AI is a permanent addition to the enterprise IT toolbox.
Cybersecurity and Infrastructure Security Agency (CISA), formed the Information and communications technology (ICT) Supply Chain Risk Management task force in an effort to unite public and private entities with the goal of developing an actionable strategy to enhance supply chain security. To read this article in full, please click here
The firm describes the At-Bay Stance platform as a “world’s first” that aims to addresses major security technology and skills access gaps by centralizing and prioritizing risks, along with providing expert support to mitigate threats – managed in conjunction with cyber insurance coverage. To read this article in full, please click here
GFCyber is an independent, nonprofit, and non-partisan think tank that helps policymakers address societal challenges created by contemporary technology. It is a collaborative step in the direction that aims to dissect and address the cyber policy and technology issues prevailing in the modern hyper-connected world. About GFCyber.
Specialized, pure-play security companies are being bought by bigger and more generalized technology vendors or by private firms seeking to cash in on the cybersecurity boom. To read this article in full, please click here Many companies secured massive venture capital (VC) investments from private equity firms.
Discover How the Lift mentoring program gives women in cybersecurity a leg up and how these women IT leaders reset the CIO-CISO relationship. To read this article in full, please click here In honor of Women’s History Month, here are some of these women and their key contributions to the field. Subscribe to CSO newsletters. ].
Brazil’s Superior Court of Justice was hit by a ransomware attack on Tuesday during judgment sessions, the attack forced a temporary shut down of the court’s information technology network. ” reads the CISO Advisor. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.
About our CISO Advisor team. I lead Cisco’s global CISO Advisors team, a group of security leaders dedicated to lending our experience to all different kinds of organizations across the world. For us, it’s about supporting other CISOs and security leaders to be the very best version of themselves at their jobs. How we can help.
It was a great event," said Paul Dial, CISO of AECOM, who was part of a closing keynote panel on "CISO: Chief in Name Only." "It The panel was artfully moderated by Dd Budiharto, CISO, Advisory Board Member, and Founder of Cyber Point Advisory, a vCISO firm. One hot subtopic was the reporting structure for CISOs.
CIOs and CISOs have long grappled with the challenge of shadow IT—technology that is being used within an enterprise but that is not officially sanctioned by the IT or security department. To read this article in full, please click here
Related article: SIEMs strive for a comeback. The painful impact of cyber attacks on businesses is worsening despite advances in technology aimed at protecting enterprises from malicious network traffic, insider threats, malware, denial of service attacks and phishing campaigns. CISO need to change the conversation.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content