This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
CSO definition. A CSO is a departmental leader responsible for informationsecurity, corporate security or both. That's the simplest answer to the question "What is a CSO?", At many companies, the term CSO is still used in this way. To read this article in full, please click here
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief informationsecurity officer (CISO) or chief security officer (CSO). Since the two could not work together, the CSO was moved under legal. Not anymore.
So, it should come as no surprise that there are also many remarkable female pioneers in computer and informationsecurity. Subscribe to CSO newsletters. ]. In honor of Women’s History Month, here are some of these women and their key contributions to the field. Codebreakers and signal hoppers.
CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Federal Rules of Civil Procedure (FRCP).
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief InformationSecurity Officer (CISO) in their highest corporate ranks.
Department of Justice just filed federal charges against Uber's former Chief Security Offier (CSO) for allegedly covering up a company data breach and bribing hackers to stay silent about the attack. Did the Uber breach cover up hurt the reputation of security research? What is Uber's former CISO accused of doing?
The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer ( CSO ) or chief informationsecurity officer ( CISO ) for the first time to support a deeper commitment to informationsecurity.
Used to simplify complex terminology or boost sales and marketing campaigns, buzzwords are an inescapable reality for an innovative and fast-paced industry like informationsecurity. Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board.
It is probably fair to say that times have always been good for informationsecurity job candidates. Learn the 6 questions candidates should ask at every security job interview and find out the top cyber security certifications, who they're for, what they cost, and which you need. Sign up for CSO newsletters. ].
The chief informationsecurity officer (CISO) is the executive responsible for an organization's information and data security. Not every company has a top-level security executive: According to IDG's 2020 Security Priorities Study , 61% of surveyed companies do, though that rate goes up to 80% for large enterprises.
When leading informationsecurity for three previous companies, he remembers executives would call him during their morning train commutes after reading about the latest security breach, seeking reassurance. Get the latest from CSO by signing up for our newsletters. ]. Could this happen to us? Should we be concerned?
Dan Meacham is chief informationsecurity officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. Here, he hang out in the voiceover studio. Legendary Entertainment).
[ Learn the 5 key qualities of successful CISOs, and how to develop them and 7 security incidents that cost CISOs their jobs. Sign up for CSO newsletters. ]. In many companies, both large and small, operations and production operate separately from informationsecurity.
According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the informationsecurity risk and threats their organizations face. In commenting on the results, I stated this lack of awareness is “astounding.”
Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Caleb Sima is the CSO at Robinhood.
In this Spotlight episode of the Security Ledger podcast, I interview Richard Bird, the CSO of the firm Traceable AI about the challenge of securing application programming interfaces (APIs), which are increasingly being abused to steal sensitive data. Read the whole entry. » » Click the icon below to listen.
At the same time, AI is also being used to improve the workdays of the state’s cybersecurity personnel by relieving them of the most tedious and time-consuming tasks, Michael Gregg, North Dakota’s chief informationsecurity officer, tells CSO. To read this article in full, please click here
The role of a Chief InformationSecurity Officer (CISO) is undeniably complex, yet incredibly rewarding. Similarly, SolarWinds and its Chief InformationSecurity Officer faced fraud and internal control failure charges from the SEC. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
Joining SC Media Deputy Editor Bradley Barth for the discussion is Dan Meacham, chief informationsecurity officer and CSO at Legendary Entertainment, and Hossein Ghazizadeh, chief services officer at Barracuda Networks. Click here for all of our coverage of the 2021 SC Media Awards.
I recently moderated a session for the CSO Cybersecurity Summit on building resilience and addressing employee anxiety amid organizational transformation.
Those stats come from ISACAs Tech Workplace and Culture 2025 report, which is based on a survey of about 7,700 of its members who work in IT areas such as informationsecurity, governance, assurance, data privacy and risk management.
The Chief InformationSecurity Officer (CISO) has become one of the most critical roles in modern organizations. Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities.
Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief InformationSecurity Officer. A CISO must have spent years in the field of informationsecurity with a strong technical foundation,” Ramachandran writes. “It GSLC: GIAC Security Leadership.
An organization’s Chief Information Officer (CIO) or someone in a similar capacity – Chief Digital Information Officer or Information Technology Director – sits atop the security hierarchy in many organizations. Senior IT executives and CIOs should receive an appropriate level of training.
However, the audit found what is underway is not enough, from an informationsecurity perspective: ".if Aflac CSO Tim Callahan told us as much after his keynote at a SecureWorld conference last year. LISTEN: SecureWorld podcast with Aflac CSO Tim Callahan, "From Bombs to Cybersecurity.". Asset management is difficult.
“Clubhouse cannot provide any privacy promises for conversations held anywhere around the world,” said Alex Stamos, director of Stanford Internet Observatory and former Facebook CSO. ” reported Bloomberg.
Prior to Mastercard, Abdullah was the chief informationsecurity officer at Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House. She is also the host of the Mastering Cyber podcast.
From the filing : " Subsequently, certain current and former executive officers and employees of the Company, including the Company's Chief Financial Officer and Chief InformationSecurity Officer, received 'Wells Notices' from the SEC staff, each in connection with the Investigation.
He has been in the informationsecurity and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes.
It is probably fair to say that times have always been good for informationsecurity job candidates. But as American companies emerge from the restrictions of COVID-19 and face a new workplace ‘normal,’ times are especially good for job seekers, with high demand, growing salaries, and lots of work-from-anywhere opportunities.
There's an estimated 500,000 unfilled cybersecurity positions in the United States today, including 166,000 jobs for informationsecurity analysts—the profession’s most common job title. To read this article in full, please click here (Insider Story)
In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? Given the magnitude of the problem, could taking a more risk-based approach to security pay off?
The vast majority of CISOs have observed positive security culture gains in their organizations in the last year despite a perceived dip in the quality of overall security posture, according to the 10 th annual InformationSecurity Maturity Report published by ClubCISO and Telstra Purple.
In 1994, Steve Katz became the world’s first chief informationsecurity officer (CISO) after Citicorp endured a string of cyberbreaches at the hands of Russian hackers. Cyberattacks continue to drive CISO hiring and informationsecurity investments today, more than a quarter-century after the position first emerged.
economy, according to Dr. Alissa Abdullah, Deputy CSO at MasterCard. The post At Pride Summit: A Warning On Cyber Literacy appeared first on The Security Ledger with Paul F. Poor cyber literacy is at the root of many of the cybersecurity problems plaguing the U.S.
A pioneer in applying robust security controls to allow leading brands to deliver world-class level security capabilities, he formerly served as the CISO for MassMutual, the CSO at Aetna, and the Global Head of Application and Mobile Security for JP Morgan Chase.
Specifically, my interactions with CISOs showed me that while one CISO of a large enterprise is expanding his or her threat hunting team, another may be dealing with the more mundane challenge of patching Windows servers in time (BTW, CSO or CISO ?).
David Estlick, chief informationsecurity officer of Chipotle Mexican Grill joined James Christiansen, vice president and CSO of cloud security transformation at Netskope, to speak about managing corporate expectation. Photo by Steve Dykes/Getty Images). Click here for more coverage of the 2021 RSA Conference. “In
.” The security breach was discovered by GitHub earlier this month when the company noticed suspicious access to Okta’s code repositories. “Upon investigation, we have concluded that such access was used to copy Okta code repositories,” writes David Bradbury, the Okta Chief Security Officer (CSO) in the mail.
Even through the Covid19 pandemic, trends in acquisition and consolidation of informationsecurity oriented companies remained quite strong. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. Top cybersecurity M&A deals for 2021 | CSO Online.
Cryptography is the art of keeping informationsecure by transforming it into form that unintended recipients cannot understand. Cryptography definition.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content