Remove CISO Remove InfoSec Remove Risk
article thumbnail

Why Predator is the ultimate CISO movie

Javvad Malik

I was reminded of this by Phil Cracknell who posted on linkedin that in his opinion the Kevin Costner, Whitney Houston classic, Bodyguard was the best infosec movie. The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. Don’t believe me? Well read on.

CISO 246
article thumbnail

News alert: One Identity wins 2024 Cyber Defense Award: Hot Company – PAM category

The Last Watchdog

One Identity embodies three major features we judges look for with the potential to become winners: understanding tomorrows threats today, providing a cost-effective solution and innovating in unexpected ways that can help mitigate cyber risk and get one step ahead of the next breach, said Gary S. Ackerman Jr.

InfoSec 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Assessing Third-Party InfoSec Risk Management

Security Boulevard

Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. The post Assessing Third-Party InfoSec Risk Management appeared first on Security Boulevard.

InfoSec 96
article thumbnail

InfoSec Leaders Weigh in on New SEC Rules Making CISO Hotseat Hotter

SecureWorld News

Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.

CISO 98
article thumbnail

Hacking It as a CISO: Advice for Security Leadership

Dark Reading

A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.

CISO 101
article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. It encompasses everything from ensuring the confidentiality and integrity of information to reducing risks, maintaining compliance, and building trust with customers.

article thumbnail

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

Security Boulevard

The post CISO Stories Podcast: No Insider Cybersecurity Risk? What happens when an employee decides to leave the organization and start their own business – but with your Intellectual property or customer lists? . Guess Again! appeared first on Security Boulevard.

CISO 99