This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The post Report finds women are declining CISO/CSO roles appeared first on TechRepublic. Professional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture.
Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. Joe Nicastro , Field CTO, Legit Security Nicastro Transparency in cybersecurity remains a complex balancing act.
The Chief Information Security Officer (CISO) has become one of the most critical roles in modern organizations. Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities.
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Nobody’s saying these companies don’t have CISOs and/or CSOs and CTOs in their employ.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Image: IANS Research.
Every chief security executive knows that one of the most important—and perhaps challenging—aspects of the job is getting the funding needed to support the cybersecurity program. The person handing the decision making on budgeting is often the CFO, so CISOs would be wise to learn the best ways to interact with these finance professionals.
Like most CSOs, Joe Sullivan was drawn to the role to help prevent cybercrimes. His role as CSO of Uber was something of a shift from his previous job prosecuting cybercriminals as an assistant US attorney, but closer to the tip of the cybersecurity spear.
Effective partnerships between CISOs and their cybersecurity vendors are integral to security success. A well-oiled relationship built on trust, communication and mutual understanding can reap significant benefits for a business’s cybersecurity posture.
In most organizations, it is common for both the CISO and CIO to have responsibilities around cybersecurity—an issue increasingly pivotal to the effective running of any modern business. Clear, defined cybersecurity ownership can prove integral to successful organizational security positioning.
In the guidance issued by the Cybersecurity and Infrastructure Security Agency (CISA) in April 2021 on securing one’s supply chain, a portion of the guidance was dedicated to the threat vector posed to entities during their design phase. Sign up for CSO newsletters. ].
It doesn’t communicate enough to other executives,” says Marinkovic, who provides virtual CISO services through Tiro Security and serves on the Emerging Trends Working Group with the IT governance association ISACA. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
CISOs will have to manage new security challenges in a post-pandemic world. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
The 5 th annual Life and Times of Cybersecurity Professionals report from ESG and the Information Systems Security Association ( ISSA ) provides valuable insight into the challenges cybersecurity pros face, how they see themselves relative to the rest of the organization, and what brings them job satisfaction, among many other data points.
The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs.
Joe Sullivan, the former Chief Security Officer (CSO) of Uber, has been sentenced to three years’ imprisonment and 200 hours of community service for covering up a cyber attack on the company’s servers in 2016, which led to a data breach affecting over 50 million riders and drivers.
The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. These incidents underscore the critical importance of effective governance in cybersecurity programs.
Cybersecurity’s ongoing battle with a “skills shortage” has seen the sector lose its way regarding talent hiring and retention, says Christian Toon, CISO at London-based law firm Pinsent Masons.
Security's all-too-frequent appearance as a front-page headline making topic has put CISOs in the hot seat as CEOs and boards worry that it could be their names next in news stories trying to explain how a breach occurred. Yet the CISO message to the C-suite might not be all that reassuring.
HP CISO Joanna Burkey sees a pivot to business partnership as vital for cybersecurity’s success. Inspiring women to join the sector is essential to this shift.(Insider Insider Story)
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
CISO Joanna Burkey believes security leaders must address these frictions to secure the future of the hybrid workplace. Speaking to CSO, she reflects on her experience with such issues and offers best practices for dealing with them. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ].
These events and many more have changed the business landscape and forced CISOs to steer a course through uncertain waters. To read this article in full, please click here
Being a CISO is a hard job. You can be a superstar, build a world-class cybersecurity program, and follow best practices, providing exceptional protection for the organization. Yup, CISOs have heavy responsibilities. When this happens, it's your fault. How are they dealing with this burden?
Jason Lee joined Zoom in June 2020 to become the videoconferencing platform’s CISO. Lee was tasked with overseeing strategies to drive the organization toward a cybersecurity and privacy posture more in scope with its rapidly advancing customer base, features offering and use requirements, all under increasing public scrutiny.
CISO Bill Brown knows how high-profile cybersecurity breaches like SolarWinds can raise alarm bells among executives and board members when they become headline news. Get the latest from CSO by signing up for our newsletters. ]. Could this happen to us? Should we be concerned?
Neurodiversity within cybersecurity is progressively becoming a topic of regular, meaningful discussion across the sector. To read this article in full, please click here (Insider Story)
Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief Information Security Officer. And it’s not too early to start — for example, with Springboard ’s cybersecurity bootcamp that guarantees you a career in cybersecurity or your tuition back.
The role of the CISO has evolved, and so have the responsibilities. Some believe a CISO must have technical knowledge and experience as a cybersecurity professional, others think leadership skills such as being able to communicate with boards are what matters most.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. This phenomenon is not just anecdotal; several studies have highlighted the alarming prevalence of burnout in the cybersecurity industry.
Corporate boards are asking their CISOs to inform them more often about cybersecurity risks. Here are some common mistakes that CISOs make when speaking to the board, along with advice for avoiding them. To read this article in full, please click here
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
Embrace the challenges of cybersecurity leadership For many of us in the security industry, it ' s the pinnacle of our career. And now, you finally got that call, to be a CISO at an organization. Was there a previous CISO? It's also extremely important to understand the history of the CISO role in the past.
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. Some speculate that Bogac may have been frustrated with the company's slow response to the cyberattack and its lack of investment in cybersecurity measures.
Many in mainstream media have characterized the DarkSide attack on Colonial Pipeline , which operates a significant portion of the nation’s critical energy infrastructure, as a wake-up call for CIOs and CISOs. Get the latest from CSO by signing up for our newsletters. ]. The first being, “a laissez-faire attitude toward cybersecurity.”
In fact, many “CISO priorities lists” are floating out there online and many people claim to know “what CISOs want.” My analyst years taught me to be skeptical about such claims, if only because there are vast differences between CISOs of different organizations, in terms of security maturity, for example.
CISOs know them, too. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
If you work in cybersecurity, you probably already know what CISO stands for: Chief Information Security Officer. The number and prominence of CISOs continues to grow as organizations get more serious about improving their security posture. However, a burning question remains: how do you pronounce CISO? Sih So / Sisso.
Even though there is a growing demand for cybersecurity expertise at the highest levels of business, a significant number of public companies lack even one qualified cybersecurity expert on their board of directors, according to a study by cybersecurity research and advisory firm IANS.
and its Chief CISO, Timothy G. The decision pertains to the company's cybersecurity practices and disclosures before and after the infamous SUNBURST cyberattack. These disclosures were deemed adequate in conveying the potential cybersecurity risks that the company faced at that time.
Just a few months past the initial SolarWinds discovery, it is clear that standardized cybersecurity regulation is needed to outline best practices for companies to follow. Part of this preparedness means understanding how potential legislation could reshape cybersecurity efforts. In March 2021, President Biden signed the $1.9
That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Who should receive cybersecurity training in your organization? How much depends on the extent of the CIO’s involvement in cybersecurity.
We hear it all the time: there are not enough people to fill all the cybersecurity roles (including CISOs) that are currently available, not to mention the openings expected in the coming months and years. Being a CISO sometimes serves as the catalyst to finding a new career path.". People want: Work-life balance.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content