Remove CISO Remove Digital transformation Remove eBook
article thumbnail

Security resilience: 4 ways to achieve company-wide buy-in

Cisco Security

Also, “Accidental CISO” (AC), Chief Information Security Officer , who was just trying to get SOC2 and ISAC certifications for a vendor when he was abruptly named CISO of his organization. And finally, Christos Syngelakis, CISO, and Data Privacy Officer at Motor Oil Group. Lead with, “How can I make your life easier?”.

CISO 94
article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

This creates a complex web of rules and regulations that a CISO needs to navigate to protect their company. The problem becomes ever more complex with the parallel process of digital transformation, in which Personally Identifiable Information (PII) flows across traditional on-premises, big data, and cloud environments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Trust Is a Journey and Businesses Have Many Rivers to Cross

Thales Cloud Protection & Licensing

Digital transformation, proliferation of location agnostic technologies and immense data generation have created uncontrolled remote environments and a fragmented enterprise ecosystem, rendering legacy security policies and practices based on trust obsolete. Zero Trust Is a Journey and Businesses Have Many Rivers to Cross.

article thumbnail

The Road to Zero Trust

Thales Cloud Protection & Licensing

Some see this as a catalyst for the so-called digital transformation. Fortunately, this concern can be easily addressed with a CISO who is prepared to talk about the mechanisms behind a Zero Trust approach in an understandable way. By certain estimates remote work has risen by XX% over the past XX months. Encryption.

Risk 77
article thumbnail

Creating a Path to Successful Security Hygiene

Cisco Security

Firms are also deploying new types of devices as part of digital transformation initiatives, further exacerbating the growing attack surface, leading to management challenges, vulnerabilities, and potential system compromises. About the report: Understanding security hygiene trends.