CISO workshop slides
Notice Bored
AUGUST 5, 2022
A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.
Notice Bored
AUGUST 5, 2022
A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.
SC Magazine
MAY 25, 2021
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. Corll said he closely interacts with about 20 other CISOs through the U.S.-based But how have they been managing?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Duo's Security Blog
OCTOBER 6, 2023
Respect the user’s privacy and productivity by anonymizing location data and eliminating unnecessary decisions when continually verifying trust. .” – Jason Waits, Chief Information Security Officer (CISO), Inductive Automation Ready to start charting your zero trust program? Or, download our white paper How to go from MFA to Zero Trust.
The Falcon's View
AUGUST 29, 2017
The fact is that they'd hired a new General Counsel who also claimed a security background (he had a CISSP), and thus they made him the CISO. It was also the week before Labor Day, which at the time meant it was teacher workshops, and I was on the road for it with 2 young kids at home. 6 months later they eliminated the position.
Notice Bored
JULY 4, 2022
This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, Information Security Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. Documented! Maintained! Good luck with that.
Cisco Security
FEBRUARY 16, 2021
As Wendy Nather , Head of Advisory CISOs, Duo Security at Cisco so eloquently puts it at the beginning of the report, “This is not a marketing report to toss in your swag bag and ignore; this is a report to cuddle up with and read over and over again. In fact, this report will change how we think about running infosec programs.”.
Let's personalize your content