This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Nobody’s saying these companies don’t have CISOs and/or CSOs and CTOs in their employ.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Image: IANS Research.
Many in mainstream media have characterized the DarkSide attack on Colonial Pipeline , which operates a significant portion of the nation’s critical energy infrastructure, as a wake-up call for CIOs and CISOs. Get the latest from CSO by signing up for our newsletters. ]. The first being, “a laissez-faire attitude toward cybersecurity.”
In addition, the study found that just a little more than one in 10 CISOs have all the key traits thought to be crucial for success on a corporate board.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Key findings from the report include: 90% of CISOs are concerned about stress, fatigue, or burnout affecting their team's well-being. between May 20, 2024, and May 24, 2024.
Ransomware has increased nearly 1100% over the last year according to FortiGuard Labs research , impacting organizations of all sizes and across all market sectors. As a result, preparing for a ransomware attack has become a boardroom issue and a top priority for CISOs worldwide. To read this article in full, please click here
This has happened as the cybercrime cartels have evolved beyond wire transfer frauds to target market strategies, take over brokerage accounts, and island-hop into banks, according to the report.
Often, CISOs see budget increases following a breach at their organization or in response to what is happening to industry peers. This can put CISOs and security leaders in precarious situations in which they must compete for budget with other revenue-generating areas of the business. To read this article in full, please click here
Enterprise risk management (ERM) , is the process of assessing risks to identify both threats to a company’s financial well-being and opportunities in the market. A risk management program aims to balance the likelihood of a risk happening against the potential damage that would ensue if it does.
CISOs throughout the telecommunications industry are preparing their data protection programs for a 5G future that will fully arrive in three to five years. Today, consumers have noticed their cellular devices begin to market and show the 5G label.
Featured Duo Talks Evaluating Passwordless: Cutting Through the Noise with Three Metrics In this talk, Duo Product Marketing Manager Ted Kietzman will share three technical metrics you can use to assess a passwordless solution, highlighting some potential pitfalls of “passwordless” along the way.
The report, which was based on a survey of 300 CIOs, CISOs and security executives to get insights on their current IT and security budgets and cybersecurity validation practices, noted that the financial slowdown has had a minimal impact on cybersecurity budgets.
Dave Stirling, CISO of Zions Bancorporation, isn’t waiting for a shakeup in the talent pool or some big shift in the job market to solve the cybersecurity skills gap. Instead, he’s making his own luck. By changing up his own staffing strategy, “by trying different things and seeing what sticks.”
In my last blog post , I described how the market for eXtended Detection and Response (XDR) is evolving and how CISOs should approach this new and promising technology. To read this article in full, please click here (Insider Story)
Every time a user opens an app on their device, it seems they are being asked to provide both information necessary to engage with the app and far too often additional information that falls into the nice-to-have or marketing niche. Having CISOs participating in the discussions on what data is necessary for an app to function is table stakes.
MongoDB CISO Lena Smart wants to make a good impression on prospective employees. That may matter more today than ever before, given how much movement there is in the labor market overall and, more specifically, how fierce competition is for cybersecurity talent. To read this article in full, please click here
BlackBerry CISO Arvind Raman looks beyond job titles when he has open positions to fill and instead focuses on the key skills required to do the work. For example, he has hired finance professionals for risk- and compliance-related work and marketing pros for awareness training projects.
Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them. What do the new SEC rules entail?
As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. CTO, CISO, CSO, etc.) role in an early-stage security startup where I can contribute to the company’s growth, innovation, product strategy, and market penetration. CISO, CSO, etc.)
At the same time, the market for non-fungible tokens (NFTs) skyrockets, with new artists becoming millionaires and more established names like Snoop Dogg, Martha Stewart and Grimes capitalizing on the trend.
Finding qualified staff to replace vacancies or build out an expanding team can be a nightmare for already overburdened CISOs, especially given there’s a pernicious and ongoing shortage of skilled cybersecurity workers in the job market.
Data that S&P Global Market Intelligence compiled last November showed there were 151 M&A cybersecurity deals in the first three quarters of 2021 alone compared to 94 over the same period in 2020, 88 in 2019, and 80 in 2018.
Even in areas where Apple’s iPhone dominates or is comparable in market share, businesses are likely to support or issue Android devices at least as a secondary option. Thus, businesses in many regions are likely to support and issue Android devices to employees as their mainstay mobile devices.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
Our Controls Framework was maybe the most important investment of it all," Jamil Farshchi, CISO at Equifax, said in a recent LinkedIn post. This is crucial because far too many companies—especially SMBs and mid-markets—don't have the time, effort and expertise to make one. into our security transformation. It's interactive.
A fully autonomous security platform presents a big opportunity in the global cybersecurity market which, according to a cybersecurity market report , is to grow to $298.5 Simbian helps every member of the security team from the CISO to the frontline practitioner solve their unique security needs in real-time.
I was fortunate enough to have connected with the previous CISO at the org, and he recruited me into the role. We are no longer an insurance policy; we are now needed for our business to expand, enter new markets, acquire new customers, and establish new lines of business. See, the power of networking is real!
The “people problem” is a phrase I heard in many different occasions when I met with IT managers (CISO, CSO, CIOs), many in leading research labs, national security establishments, and such. It also puts a price on the data—which creates a market for it. What is the “people problem” of cyber security? .
As a result, the CISO is no longer a technical subject matter expert but an executive risk manager who shares a responsibility matrix with the board of directors, CEOs, and other executives to make informed risk decisions.
Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. Krishna Vedula is chief operating officer at 365 Retail Markets.
Learn how the combination of attack surface management (ASM) plus CAASM unlocks visibility and prioritization like no other solution on the market. I started Hubble because it addressed one of the biggest challenges I found as an advisor to CISOs, and as a CISO myself: lack of visibility. We’re not going to stop here.
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. Legendary Entertainment is a global media company with multiple divisions including film, television, digital studios, and comics.
said Dan Meacham, vice president of global security and corporate operations and CSO/CISO at film production company Legendary Entertainment. Or if the tool you’re pushing as one of your own is actually from a third party “and the solution is being repackaged by the vendor and marketed as if it’s their own.”.
And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne. Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups.
CISO Perceptions A critical blind spot for CISOs and cyber risk owners is the divergence in perceptions of their security stack’s effectiveness between leadership and technical teams. Useful resources include: The Professional Association of CISOs at [link].
Tyler Farrar ,CISO, Exabeam. Andy Fernandez, senior manager, product marketing, Zerto , a Hewlett-Packard Enterprise company. Wes Spencer, VP, External CSO, ConnectWise. And, as a last but highly critical step — at least one backup should be immutable — unable to be altered or changed in any way, at any time.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content