This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.
Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO).
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Image: IANS Research.
Mentioning the phrase “shadow IT” to CISOs often results in an eye-roll or a grimace. Learn the 5 key qualities of successful CISOs, and how to develop them and 7 security incidents that cost CISOs their jobs. Sign up for CSO newsletters. ]. | Sign up for CSO newsletters. ].
CSO definition. A CSO is a departmental leader responsible for information security, corporate security or both. That's the simplest answer to the question "What is a CSO?", At many companies, the term CSO is still used in this way. But the distinction is not necessarily clean cut, as we'll see in a moment.
Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous example of the disconnect about a CISO’s role, says Joe Head, CISO search director at UK-based search firm, Intaso. In either case, the disconnect is real.
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
“It’s like I raise my hand [in an oath] every morning and the mission is to protect and ensure the viability of my company in the cyber world,” says Allison, who has been the CISO at Johnson & Johnson for more than 12 years. It’s important to understand I’m here to protect this company that is focused on human healthcare.
The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
Being a CISO is a hard job. You must constantly balance business, technology, and regulatory requirements against things like employee and adversary behavior. Yup, CISOs have heavy responsibilities. When this happens, it's your fault. How are they dealing with this burden?
Truth, transparency and trust are the three T’s that all CISOs and CSOs should embrace as they march through their daily grind of keeping their enterprise and the data safe and secure. The case against Uber’s former CSO. Failure to adhere to the three T’s can have serious consequences.
Today, CISOs face three primary challenges that prevent them from optimally protecting their organizations. First, is the tie to their current technology, which often suffers from complexity and siloed operations that prevent automation. The second challenge is process-related. To read this article in full, please click here
CSO spoke with security leaders, researchers, and analysts about this significant issue and the implications for CISOs, businesses, and the wider sector. From a moral standpoint, CISOs should absolutely stop using Russian-made security and technology products. Ending use of Russian security and tech products.
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff.
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
The astute cybersecurity leader is no doubt thinking: “This is a CISO nightmare.” Now we see that Google is jumping into the fray, with the soon-to-be-released tracking device in development apparently codenamed “Grogu” (after the Baby Yoda character in the “Star Wars” spinoff “The Mandalorian”).
Sign up for CSO newsletters. ]. The analyst firm discovered that CISOs everywhere are struggling to justify their spending on MSSPs to non-security executives because of a lack of proper metrics and because of technology complexity—among other things.
Mike Engle started on the CISO career track early in his career, moving up to senior vice president of information and corporate security at Lehman Brothers in the early 2000s Engle says he thought the professional path was a good fit, explaining that he found security technologies, such as encryption, fascinating and the cat-and-mouse aspects of the (..)
As the role of the CISO continues to grow in importance and gain more responsibility, many cybersecurity practitioners may wonder if they have what it takes to be successful in the role. Technical expertise and experience are obviously huge assets.
Our opening keynote, Marching on in 2021: Cyber Resiliency in Security , was filled with five stellar CISOs from different organizations and industry verticals: Mark Eggleston, VP, Chief Information Security and Privacy Officer at Health Partners Plans. Anahi Santiago, CISO at ChristianaCare Health System. How can CISOs innovate?
Delta Air Lines CISO Debbie Wheeler has a vast environment to secure, ranging from the corporate systems that are typical for any business to customer interfaces to kiosks sitting in airports around the world—and the slew of data coming in from all the applications that they house.
The past decade has seen an increase in the number of operational technology (OT) attacks and their impact on organizations. The survey also found that CISOs and business leaders consider OT security a top concern.
Wilson was opening keynote speaker at the recent CSO UK Security Summit where she reflected upon the biggest changes in the risk and security landscape and how CISOs must respond to lead teams and embrace emerging opportunities.
We are unsure what the rest of 2021 has in store, but the most successful CISOs will be the ones ensuring security teams have access to the latest intel and tools to be prepared for emerging threats. James Carder, CSO, LogRhythm. In March 2021, President Biden signed the $1.9
Chief Information Security Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. Cybersecurity officials struggle in Florida. DeSantis appointed former state Rep. And this is increasing cyber risk.
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. For CISOs, the 'C' in the title designates a considerable degree of responsibility for material business value.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. Workforce challenges persist, with states finding it difficult to hire and retain professionals who understand AI technologies and their security implications.
An eternal discussion in security is whether technology, process or people are the critical element in information security at scale. Most security leaders will tell you it’s the people that matter. Changing people's behavior to care about security practices requires more than simply taking poor practices off the table.
Discover How the Lift mentoring program gives women in cybersecurity a leg up and how these women IT leaders reset the CIO-CISO relationship. Subscribe to CSO newsletters. ]. In honor of Women’s History Month, here are some of these women and their key contributions to the field. Codebreakers and signal hoppers.
An organization’s Chief Information Officer (CIO) or someone in a similar capacity – Chief Digital Information Officer or Information Technology Director – sits atop the security hierarchy in many organizations. Chief Technology Officer?. The CISO and Their Security Staff. Members of the OCIO may include: Deputy CIO?.
Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Caleb Sima is the CSO at Robinhood.
SolarWinds this week announced that its vice president of security Tim Brown has taken on the additional title of CISO, as part of the company’s ongoing efforts to institute a secure-by-design posture. (“ SolarWinds letters” by sfoskett at is licensed under CC BY-NC-SA 2.0 ). Tim Brown, SolarWinds’ new CISO.
The data-reliance of digital banking means an AI-driven approach to cybersecurity and risk management is integral to success, UnionDigital Bank CISO Dominic Grunden tells CSO. Working together, the two used autonomous technology to instill a “truly holistic” AI-enhanced security and risk management strategy.
Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. That's a soft skill that even the most adept CISOs are still trying to master.
With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. James Carder, LogRhythm CSO. Begin Your Zero Trust Journey Today.
Dr. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. A : The ever-changing technology and threats that come along with it.
While CISOs and other security leaders have never been blessed with unlimited budgets, many have recently felt the pinch as companies work to weather recent economic constraints. This has created a focus on maximizing the effectiveness of their existing technologies. But how to do it?
DRP is broadly defined as, “telemetry, analysis, processes, and technologies used to identify and mitigate risks associated with digital assets.” CISOs are investing here but challenges remain. In fact, these changes have led to a CTI subcategory focused on digital risk protection. I’ve also dug into the CTI lifecycle.
Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them. I would think that boards would want to have that experience, even though it is somewhat difficult to come by.
CISOs have never had an easy time — they’ve certainly faced inordinate challenges in recent years working to secure an ever-expanding and more distributed technology and data landscape. Even if one doesn’t hit anytime soon, economic volatility, more cautious corporate spending plans, and employee layoffs are already in play.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content