This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Chief Information Security Officers (CISOs) are an essential pillar of an organization’s defense, and they must account for a lot. Especially for new CISOs, this can be a daunting task. The first 90 days for a new CISO are crucial in setting up their security team, so there is little time to waste, and much to accomplish.
Virtual Chief Information Security Officer (vCISO) services (also known as 'Fractional CISO' or 'CISO-as-a-Service') are growing in popularity, especially as growing cyber threats, tightening regulatory demands and strict cyber insurance requirements are driving small to medium-sized enterprises demand for strategic cybersecurity and compliance guidance (..)
In today's perilous cyber risk landscape, CISOs and CIOs must defend their organizations against relentless cyber threats, including ransomware, phishing, attacks on infrastructure, supply chain breaches, malicious insiders, and much more. One of the most effective ways for CISOs and
It helped him when he took on the CISO role at Brunel University London, at a time when cybersecurity wasn’t embedded into the organization’s culture. We featured their stories and advice in a new interactive eBook, called Building Security Resilience: Advice and Stories from Cybersecurity Leaders, that we released today.
With skilled CISOs in short supply, service providers are turning to virtual CISOs. A new eBook by Cynomi explains how service providers/MSPs can quickly and easily expand vCISO service offerings to their customers. [.]
Are you a CISO, CIO, or IT Director? In your role, you're responsible for breach protection – which means you oversee and govern the process of designing, building, maintaining, and continuously enhancing your organization's security program. But getting buy-in from leadership can be difficult when they are a non-technical audience.
Almost half of MSP clients fell victim to a cyberattack within the last 12 months. In the SMB world, the danger is especially acute as only 50% of SMBs have a dedicated internal IT person to take care of cybersecurity. No wonder cybercriminals are targeting SMBs so heavily.
Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO. The CISO and Their Security Staff. The CISO and the cybersecurity team are the primary candidates for cybersecurity training and certifications. Chief Technology Officer?.
As CISO Helen Patton describes it , “One way to close the cybersecurity employee shortage is to hire for potential, not experience. Download the eBook. Change your job requirements and interview protocols accordingly.”. The post Is There Really a Shortage in Cloud Security Skills?
7 Things Every CISO Needs to Know About PKI. With PKI, CISOs and other information security specialists can implement hardware, software, policies, and procedures to better establish, manage, distribute, implement, and protect digital certificates and key policies. What can CISOs do right now to protect machine identities?
Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. CISOs, like Lillian , can now redirect their focus to other critical aspects of cybersecurity. Start with our eBook.
More than any other FinServ regulation, it includes unique components, such as the requirement for a Chief Information Security Officer (CISO) and an annual compliance certification. The regulation is incredibly stringent and sets an unusuallyalbeit necessarilyhigh bar for cybersecurity practices.
Also, “Accidental CISO” (AC), Chief Information Security Officer , who was just trying to get SOC2 and ISAC certifications for a vendor when he was abruptly named CISO of his organization. And finally, Christos Syngelakis, CISO, and Data Privacy Officer at Motor Oil Group.
This post suggests a practical approach to determining and reducing application security risk for federal organizations and announces the Invicti ebook Let’s Talk About Risk. Cybersecurity risk can be hard to define and measure, even though the consequences of a cyberattack are very real.
Editor’s note: This blog post is an excerpt from our eBook, Getting to Know the ISO 27001 Standard: Practical Guidance for Achieving ISO 27001 Certification.
“We were able to implement strong security controls without disrupting the business of helping patients, and Duo has helped us to do it easily and securely,” said John Zuziak, CISO of the University of Louisville Hospital (UofL) where over 500,000 patients are served every year. It was an easy choice for us. Looking for more information?
Similarly, a quarter of CISOs said that their job has affected their mental and/or physical health, as noted by Cyberscoop. Helen Patton | Advisory CISO at Cisco. For even more expert tips, stories, and insights, download Cisco’s new eBook, “ Creating Safe Spaces: Leaders and Practitioners on Mental Health and Avoiding Burnout.”.
The CISO was incredulous and unfortunately had a false sense of security that he shared with others in the organization. The CISO called me in a panic and asked me if I could get the team to bring down the larger results to just an executive summary. We’d love to hear what you think.
This eBook shares how major companies are using distributed ledger technology (DLT) today and the importance of security planning for blockchain operations. In this episode, NetSPI’s Field CISO and host of the podcast Nabil Hannan tackles a pivotal topic: cybersecurity education.
“Duo Beyond has enabled us to push our zero trust strategy faster, allowing us to utilize client systems (ChromeOS to be specific) that were difficult and costly to support, making it very low effort to bring new services online and granting granular access controls,” — Mike Johnson, Former CISO at Lyft.
This creates a complex web of rules and regulations that a CISO needs to navigate to protect their company. Where is a CISO to begin? 2) Identify the regulations that will need to be met, a good starting point is reviewing the Thales Data Security Compliance and Regulations eBook. (3)
What does that imply for the CISOs charged with reducing the digital sovereignty risk their enterprises face while enabling the agility these enterprises need to be competitive? See our eBook “ Achieve Digital Sovereignty with Thales for more on this.”.
Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. CISOs, like Lillian , can now redirect their focus to other critical aspects of cybersecurity. Start with our eBook.
Over the last few years, cybersecurity innovators have been introducing various platforms that support this, and CISOs are starting to aggressively plan for and adopt them. The smarter CISOs/CIOs have embraced this challenge and turned it into an opportunity to educate other business stakeholders, and the laggards are almost bound to follow.
If you’re still getting stiff-armed from the business because they feel that you could jeopardize the rush to deploy LLMs (FOMO is a big part of many AI projects), then consider the recent advice of our Field CISO Nabil Hannan: conduct an AI-focused threat model exercise.
And what steps should CISOs in the manufacturing industry be taking to secure their rapidly evolving supply chain? Mitigating the risks associated with the rapidly changing manufacturing supply chain must be prioritized by CISOs and form part of a comprehensive “ identity-first security ” strategy.
More than any other FinServ regulation, it includes unique components, such as the requirement for a Chief Information Security Officer (CISO) and an annual compliance certification. The regulation is incredibly stringent and sets an unusuallyalbeit necessarilyhigh bar for cybersecurity practices.
This leads the CISO/CIO either into rush decisions or conversely into an analysis-paralysis phase, leading to unfavourable outcomes or no outcomes at all! If you would like to discover what other professionals have said and what advice they give to overcome these challenges, read our How Can You Trust an Untrusted Environment eBook.
Fortunately, this concern can be easily addressed with a CISO who is prepared to talk about the mechanisms behind a Zero Trust approach in an understandable way. If you would like to discover what the experts have said and what advice they give to overcome these challenges and achieve Zero Trust security, read our eBook here.
In my role, I regularly engage with CISOs in all kinds of sectors, representatives at industry bodies, and experts at analyst houses. This gives me an invaluable macroview not only of how the last 12 months have affected organizations and what CISOs are thinking about, but also how the upcoming year is shaping up.
If you’re a security and risk management leader, the new ESG eBook is a must-read, so download the Security Hygiene and Posture Management eBook right now. As a result, organizations are further assessing security posture management processes, examining vendor risk management requirements, and testing security more frequently.
Recently Richard Archdeacon, advisory CISO and Josh Green, Technical Strategist at Duo Security, gave a virtual keynote presentation at the Cybersecurity Leadership Summit 2021 in Berlin where they discussed the Future of Work. Also, for more on the steps to securing the workforce I touched on earlier, there is a great ebook here.
There was the inspiring CISO who gave me advice about my long-term career. Read Cisco’s eBook, Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates. Standing by and supporting each other in the workforce is critical as is being a good motivator, mentor, and positive influence on your peers.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content