This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The chief informationsecurity officer (CISO) role has changed dramatically from just a few short years ago. Once confined to technical security, CISOs have emerged as key strategic partners in the C-suite.
Chief InformationSecurity Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. One new challenge CISOs’ suddenly face is how to lock down web conferencing tools, like Zoom, Skype and Webex, without gutting their usefulness. Related: Why U.S. billion, with $7.8
In an era where digitaltransformation drives business across sectors, cybersecurity has transcended its traditional operational role to become a cornerstone of corporate strategy and risk management.
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief InformationSecurity Officer (CISO). And before that she spent about 10 years as a security leader at JPMorgan Chase. Q: Welcome, Helen!
The Collaborative convened the Cloud Computing Task Force of roughly 15 CISOs in February. The Cybersecurity Collaborative launched a Cloud Security Task Force with the mission of helping organizations guide their migrations and secure ongoing digitaltransformation initiatives. Sean Gallup/Getty Images).
We have heard countless times that, during the COVID-19 pandemic, digitaltransformation has advanced three years in three months. This affected all levels of the cybersecurity landscape, and it has had a particularly broad impact for those in the C-Suite, specifically, the Chief InformationSecurity Officer (CISO).
As defenders of digital assets, Chief InformationSecurity Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Key findings from the report include: 90% of CISOs are concerned about stress, fatigue, or burnout affecting their team's well-being.
Executives from security company Kaspersky speak at a global partner conference about informationsecurity is a key business success factor – a reality that is starting to shine a brighter spotlight on security chiefs. Ian Gavan/Getty Images for Kaspersky Lab ). Our profile is certainly getting higher.
Last September, Twitter hired Rinki Sethi as its new chief informationsecurity officer. Other major companies to recently install a new CISO include Uber and Square. Two major themes emerged from the research and interviews conducted with CISOs. Justin Sullivan / Staff).
Our opening keynote, Marching on in 2021: Cyber Resiliency in Security , was filled with five stellar CISOs from different organizations and industry verticals: Mark Eggleston, VP, Chief InformationSecurity and Privacy Officer at Health Partners Plans. Anahi Santiago, CISO at ChristianaCare Health System.
W ith the rise of digitaltransformation initiatives in 2020, a Chief InformationSecurity Officer’s (CISO) already stressful work environment has become even more complex. CISO’s are facing more scrutiny about security posture from the Board of Directors than ever.
Conducted in spring 2024, the study captures insights from Chief InformationSecurity Officers of all 50 U.S. Key findings highlight that while traditional security issues remain, AI-driven attacks are now a significant concern. Since our 2022 survey, nearly half of the states—23 of them to be exact—have new CISOs.
The 47-page report provided significant detail to support the conclusion that “According to agency inspectors general, the average grade of the agencies’ overall informationsecurity maturity is C-.”. The modern CISO is more than “IT security.”
BT Security’s largest ever research project identifies the major trends that are changing the role of the CISO, and the worrying behaviors that show the need for a strategic response. In light of these trends and attitudes, the role of the CISO is simultaneously more critical and more multifaceted than even before.
The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry.
For many Chief InformationSecurity Officers, having the CEO’s ear, at the moment, is proving to be a double-edged sword, Pollard told me. “We We find many CISOs spend their time explaining what threats matter and why, as opposed to why cybersecurity matters in the first place,” he says. That’s the ‘cheat code’ for CISO success.
Moreover, by uncovering hidden APIs, software developers and security administrators can gain a more accurate insight into how to address potential security issues. API Security Maturity in 2025 Chief InformationSecurity Officers (CISOs) are increasingly aware of the number of APIs within their organizations.
It emphasizes the need for encryption, data governance, and secureinformation-sharing practices to prevent and mitigate cyber threats. Compliance with the GBLA requires prioritizing data encryption and robust access controls to protect sensitive consumer information throughout its lifecycle.
Security leaders face the dual challenge of needing to stay competitive in a rapidly evolving business landscape while also defending against increasingly serious cyber threats, reducing complexity, and facilitating their organization’s digitaltransformation.
Whatever the motivation, it is clear that the topic is intriguing, and with the rising importance of the CISO in many organizations, the question is certain to be a part of the discussions with senior management. He expressed his point, emphasizing that informationsecurity is not just about technology. Will Thom and I disagree?
The good news is that there is a very powerful, proven tool that can help companies decipher complex networking security relationships. With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security.
However, as technology has become more complex and pervasive, the CIO's role has expanded to encompass a broader range of responsibilities, including: Strategic IT leadership: CIOs are now expected to be strategic leaders, driving the organization's digitaltransformation agenda and aligning IT initiatives with business goals.
How should boards approach digital risks? Boards play a crucial role in governing digitaltransformation. Make digital risk a board-level responsibility Directors should integrate AI governance, cybersecurity, and data protection into corporate strategy.
In this Spotlight podcast* we’re joined by Andrew Jaquith, the CISO at QOMPLX to talk about how the COVID pandemic is highlighting longstanding problems with cyber risk management and cyber resilience. We also talk about how better instrumenting of informationsecurity can help companies get a grip on fast-evolving cyber risks like.
Conference Tracks: Frameworks, Security, & Risk. With businesses embracing digitaltransformation at an unprecedented rate, the legacy approach to risk and compliance management – an emphasis on governance and compliance with limited risk focus, is failing. Transforming the C-Suite.
It will be crucial for everyone to stay informed and prepared.". Top 10 Challenges Facing CISOs in 2023 – "While 2022 was certainly no walk in the park, strong cybersecurity investments and institutional support suggest a light at the end of the tunnel. And digitaltransformation could spark zero-trust projects.".
Recent amendments have focused on addressing vulnerabilities linked to digitaltransformation in aviation, such as the use of cloud technologies and IoT devices. What Are the Requirements for IATA Cyber Security Regulations? are typically required to meet IATAs expectations.
Rolled out earlier this year, the offering combines AT&T’s software-defined networking (SD-WAN) management with Fortinet network and security functions that are delivered in a SASE framework—all packaged into a service that’s managed by AT&T Cybersecurity experts.
In this new guide, we take a close look at the special challenges CISOs face with increasing API usage and evolving security requirements. Digitaltransformation has driven unparalleled business opportunities. Yet, at the same time, the APIs powering all of this digitaltransformation have expanded security risks.
Also, “Accidental CISO” (AC), Chief InformationSecurity Officer , who was just trying to get SOC2 and ISAC certifications for a vendor when he was abruptly named CISO of his organization. And finally, Christos Syngelakis, CISO, and Data Privacy Officer at Motor Oil Group.
The FBI Internet Crime Complaint Center reports that cybercrime has risen 300% in the last 12 months and concerns grow as company leaders determine how to navigate the long-term effects brought on by the pandemic and the acceleration of digitaltransformation started last year. FIND the company’s cybersecurity blind spot.
Rick Doten, Vice President of InformationSecurity at Centene Corporation, says security has finally transitioned away from hampering the business and switched to business enablement: "Ten years ago, the security community was like the Department of 'No.' And that goes back into what you're presenting to the leadership.
Consistent with the federal government’s deployment of InformationSecurity Continuous Monitoring (ISCM), the CDM program is a dynamic approach to fortifying the cybersecurity of government networks and systems. 1: Developing a decision tree approach to security.
Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. This is consistent with new research from Boardroom Insiders which states that 20 percent of Fortune 500 global chief information officers (CIOs) are now women — the largest percentage ever.
Given the magnitude of the problem, could taking a more risk-based approach to security pay off? We're joined by two informationsecurity professionals: Rob Carey is the Vice President and General Manager of Global Public Sector. Given the magnitude of the problem, could taking a more risk-based approach to security pay off?
Greg Woolf, founder of FiVerity, which developed a machine-learning approach to rooting out synthetic identities, says that understanding synthetic identities is not just an issue for the institution’s fraud departments, but chief informationsecurity officers as well. Why is it that CISOs should be getting involved?
Organizations are facing challenging times when it comes to securing their corporate assets, systems, networks and data. We asked leading informationsecurity professionals what the biggest challenges organizations face during their journey to Zero Trust security. Wed, 03/31/2021 - 06:51. Here is what they told us.
The spending on cybersecurity tools, security staff, upgrade of the security operations center, and security awareness training is an aggregation of efforts to reduce the organization’s overall risk posture. Not every threat or possible cyber event can be protected.
Today, businesses operate in a world where over the last few years, more than 85% of business leaders surveyed by Dell and Dimensional Research say they believe security teams can better enable digitaltransformation initiatives if they are included early. Yet few security operations teams are prepared for that.
Additionally, 81 percent of chief informationsecurity officer (CISO) respondents said that “staying ahead of attackers is a constant battle and the cost is unsustainable.”. NetApp is a global, cloud-led, data-centric software company that empowers organizations to lead with data in the age of accelerated digitaltransformation.
They are two different tools, each essential in their own way and critical for chief informationsecurity officers (CISOs) to keep their infrastructure safe. Additionally, security professionals also need to interpret the reports these tools generate.
Some see this as a catalyst for the so-called digitaltransformation. But behind the scenes, this emergence of often untrusted devices (BYOD) and an increased adoption of unsanctioned applications (a trend called “Shadow IT”) has led to security nightmares for IT departments. Here is what they told us.
It emphasizes the need for encryption, data governance, and secureinformation-sharing practices to prevent and mitigate cyber threats. Compliance with the GBLA requires prioritizing data encryption and robust access controls to protect sensitive consumer information throughout its lifecycle.
The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in informationsecurity. Those doors lead to many different types of positions and opportunities, thus making the informationsecurity community dynamic and multifaceted.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content