This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Hence this blog was born. Let’s stick to mostly technology focused failures. SOC should not spend time / resources managing such technologies. Do They Matter?
The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. This is a perfect metaphor for how a CISO operates in day to day situations. It represents a struggle many CISO’s around the world face. This shows how quickly a CISO can get burnt out on the job.
But if we switch our focus to the world of technology, we seei a starkly different picturea landscape increasingly shaped by control, compliance, and automation. The rapid advancement of technology, particularly in AI and automation, is transforming the way we interact with the digital world.
Google calls attention to our Cyber Public Health work Last week, Bill Reid and Taylor Lehmann, both in the Office of the CISO at Google Cloud, wrote a blog post, Cyber Public Health: A new approach to cybersecurity. Im honored and grateful for their support, and appreciate being quoted.
So how will this affect chief information security officers (CISOs) and security programs? Given the perennial skills and staffing shortage in security, it’s unlikely that CISOs will be asked to make deep budget or staffing cuts, yet they may not come out of this period unscathed. Related: Attack surface management takes center stage.
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. It’s a subtle shift in focus, and requires a fundamental change in how we, as ITDMs, CISOs and cyber risk owners view and action resilience—not as a one-time project, but as an ongoing programme that provides strategic advantage.
The OOT (Organization, Operations, Technology) Approach: The guide advocates for prioritizing organizational and operational changes before finalizing technology decisions. This may challenge the conventional approach in traditional organizations where technology choices often precede organizational adaptation.
Hello, I am Helen Patton, and I am the newest Advisory CISO at Duo. While I was a CISO at Ohio State we partnered with Duo to implement MFA across our organization. There is every type of technology under one institutional umbrella. I am told I am the inspiration for the “CISO Helen” persona. We don’t care. Yes, they do.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. This is where the real opportunity lies, and what Im exploring in this blog. For CISOs and cyber risk owners, this isnt just a riskits a gamble no one can afford to take.
. “We may warn you about messages that ask you to take the conversation to another platform because that can be a sign of a scam,” the company said in a blog post. “These warnings will also give you the choice to report the content without letting the sender know.” A follow-up story on Oct.
One of the hardest and most complex jobs in technology is being a chief information security officer (CISO). The post The Top 3 Mistakes CISOs Make – and How to Fix Them appeared first on Nuspire. The post The Top 3 Mistakes CISOs Make – and How to Fix Them appeared first on Security Boulevard.
As the year 2025 rushes forward, the responsibilities of CISOs are continuing to evolve. To remain relevant, we must continue to stay on top of emerging technologies, such as AI and automation. The year will continue to shape the CISO role into an exciting combination of leadership and tech expertise.
The ascendency of CISOs. Organizations need to assign security teams to manage these identity solutions, and hire a director to manage the team (and they all report to the CISO), or there will never be a change in that high-risk mindset. Prior to his career in information technology, Lance was a professional mountain guide.
As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. I’ve shared some of my lessons learned with a group of CISOs at a recent Bessemer Venture Partners event (that’s the photo at the top of this post).
In addition to publishing blogs and papers, our Cloud Security Podcast by Google episodes have featured experts discussing AIs impact on security, offering practical implementation advice, and addressing emerging challenges. A recap of our key blogs, papers and podcasts on AI security in 2024follows.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. Check Point Software Technologies Ltd. Exposure management can help meet the SEC requirements So what can a CISO do about this? For example, in October 2024, the SEC fined Unisys Corp.,
Thanks to technology, continual rapid change is here to stay. I went through some of them this week at the Cyber Security Virtual Conference: Celebrating Women in Cyber, and with PWC Canada when they engaged me to open their one day event – SheProtects: Future CISO Program. A CISO can work in an operational and or advisory capacity.
The OOT (Organization, Operations, Technology) Approach: The guide advocates for prioritizing organizational and operational changes before finalizing technology decisions. This may challenge the conventional approach in traditional organizations where technology choices often precede organizational adaptation.
This blog has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security. IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall.
In my last blog post , I described how the market for eXtended Detection and Response (XDR) is evolving and how CISOs should approach this new and promising technology. To read this article in full, please click here (Insider Story)
29, roughly the same time Pyle published a blog post about his findings , ConnectWise issued an advisory warning users to be on guard against a new round email phishing attempts that mimic legitimate email alerts the company sends when it detects unusual activity on a customer account. ET: Included statement from ConnectWise CISO.
talk to us :-) These are the episodes: EP52 Securing AI with DeepMind CISO EP68 How We Attack AI? Since I promised to provide no answers in this blog, let me do more questions: 1a What aspects of securing AI are unchanged from securing, well, anything else? BTW, if you have anything fun to say about LLM security (easy!)
Information security has a foundation of governance, in the form of acceptable use policies and many others, that direct and govern what people can and can’t do with the technology that is in place at an organization.
You can imagine that one person — the only one in a family comfortable with technology — might be sitting there registering all their family members one by one, directing them all back to the same email address. Think of adults who are trying to register their parents in nursing homes; think of parents trying to register their children.
Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. 19 and at SecureWorld Dallas on Oct.
However, new research from e2e-assure has revealed that few organisations are taking full advantage of security technologies available today. Having surveyed over 500 CISOs and ITDMs responsible for cybersecurity on the challenges faced with SOCs, their insights are not to be missed. That is if your provider is performing.
As technology advances and attackers develop ever-more sophisticated tactics, CISOs and security teams face a constant battle of trying to stay ahead of the curve. This year, several key themes are expected to dominate the cybersecurity landscape, shaping the priorities of CISOs and their teams.
Yet given the evolving IT environment, CISOs, sysadmins, and IT security teams are struggling to protect their networks. The lack of the right tools with enough capabilities and the inertia to shift to new technology are the main reasons why advanced VM is not yet adapted universally.
By: Gary Perkins, Chief Information Security Officer As we keep a close eye on trends impacting businesses this year, it is impossible to ignore the impacts of Artificial Intelligence and its evolving relationship with technology. One of the key areas experiencing this transformational change is cybersecurity.
There are several methods of active defense that companies can utilize to safeguard their networks, and it’s time for CISOs to start picking. He previously managed development teams at Check Point Software Technologies and was a research assistant in the Atom Chip Lab focusing on theoretical Quantum Mechanics. But you can fight back.
Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. One of our recent blogs highlights tips to help with selecting and confirming trust in your third-party vendors, and this rings true now more than ever. How Do You Select a Trusted Vendor?
It helped him when he took on the CISO role at Brunel University London, at a time when cybersecurity wasn’t embedded into the organization’s culture. Find this blog helpful? View our other blogs on security resilience: Enabling Security Resilience in the Face of Unpredictable Change. 5 Dimensions of security resilience.
One approach to understanding and explaining this is to consider whether, as a CISO, you are a Builder, Fixer, or Scale Operator. Helen Patton helps CISOs understand how they should spend their time by discussing seven circles of security : Technology, data, business, etc. Which kind of CISO are you at this point in time?
The role of the Chief Information Officer has undergone significant transformations over the past few decades, driven by the rapid advancements in technology. Chief should mean something," said Patrick Benoit , Global CISO for Brinks and member of the SecureWorld Houston Advisory Council. "I That is a huge conflict of interest.
By: Igor Volovich, VP, Compliance Strategy Technology and the threats and vulnerabilities that impact its resilience and trustworthiness keep cybersecurity professionals, especially CISOs, constantly vigilant.
See the video at the blog post. In the Administrator’s Guide to Passwordless blog series , Tech Lead Jeremy Erickson covers everything you need to know to determine for yourself why passwordless authentication can be more secure and more usable than today’s leading authentication systems. Advisory CISO J.
Business initiatives demand faster, more efficient outcomes and technology responds. When it comes down to it, C-level goals and CISO initiatives are not all that misaligned. The complexity that has abounded in the past few years has left us more connected and data-driven than ever before. Managed solutions can help.
I want to share a few additional things here on top our official launch blog. src: outline for [link] We also interviewed our CISO and of course I’ve asked the same question. We wanted to separate these, ahem, longer term concerns into something that affects large organizations implementing AI technologies today.
SOC Technology Failures?—?Do Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Hence this blog was born. Let’s stick to mostly technology focused failures. SOC should not spend time / resources managing such technologies. Do They Matter? img src: [link].
Here are three things automated cybersecurity technology does exceptionally well: •Tackle mundane tasks. Just as Virtual CISOs (Chief Information Security Officers) rely on a mix of automated tools and software with the power of the human brain and real-life experience, cybersecurity can’t be 100% automated – at least not just yet.
<a href='/blog?tag=Inbound tag=Inbound Threats'>Inbound Threats</a> <a href='/blog?tag=File tag=File Transfers'>File Transfers</a> <a href='/blog?tag=Email In terms of technology, this means providing the best software tools to enable your remote workforce to collaborate securely.
One of the five main findings in our newly published Security Outcomes Study, Volume 2 , was the clear benefit in having a proactive strategy of refreshing business-critical technologies. How often should a technology refresh take place? As you could guess, this level of technology debt is a drag on security teams.
Today’s CISOs are more than technologists—we strive to make ourselves well-rounded business leaders. In fact, Gartner’s research found that top-performing CISOs regularly meet with three times as many non-IT stakeholders as they do with IT personnel. This way we can more effectively collaborate.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content