Remove CISO Remove InfoSec Remove Webinar
article thumbnail

How to Become a CISO in 5 Steps

CyberSecurity Insiders

If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.

CISO 112
article thumbnail

Webinar: State of InfoSec Q3 2022

Security Boulevard

Are you curious what threats other CISOs are prioritizing right now? Hundreds of Cybersecurity professionals recently responded to MixMode’s nation-wide survey on InfoSec strategies for the end of 2022. The post Webinar: State of InfoSec Q3 2022 appeared first on Security Boulevard.

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck

The Hacker News

On the one hand, security leaders and CISOs must be able to communicate strategies clearly – instructions, incident response plans, and security policies. Communication is a vital skill for any leader at an organization, regardless of seniority. For security leaders, this goes double. Communicating clearly works on multiple levels.

InfoSec 95
article thumbnail

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

Security Boulevard

In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. Exposure management can help meet the SEC requirements So what can a CISO do about this?

article thumbnail

Empowering Women in Cybersecurity: Insights from ISC2's Latest Study

SecureWorld News

I have a CISO peer who calls himself a 'compulsive interviewer' where he finds himself talking to wait staff, bartenders, retail workers, hospitality workers, those who show unique problem solving skillsworking under pressure or applying pattern matching to anticipate a problem and fixing it before it appears.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The post Water utility CISO offers tips to stay secure as IT and OT converge appeared first on SC Media. Asaavedra32, CC BY-SA 3.0

CISO 82
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

TL,DR: Check out our on-demand webinar Your Zero Trust Roadmap , where we outline the five key steps to secure user access to apps. For more information, check out our on-demand webinar Your Zero Trust Roadmap. So how does one go from MFA to full zero trust maturity? What does that journey look like?