This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
CSO definition. A CSO is a departmental leader responsible for informationsecurity, corporate security or both. That's the simplest answer to the question "What is a CSO?", At many companies, the term CSO is still used in this way. To read this article in full, please click here
Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief informationsecurity officer (CISO) or chief security officer (CSO). Not anymore.
So, it should come as no surprise that there are also many remarkable female pioneers in computer and informationsecurity. Subscribe to CSO newsletters. ]. In honor of Women’s History Month, here are some of these women and their key contributions to the field. Codebreakers and signal hoppers. Codebreakers and signal hoppers.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief InformationSecurity Officer (CISO) in their highest corporate ranks.
CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. NERC) standards.
Dan Meacham is chief informationsecurity officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. Meacham’s architecture allowed the company to ensure the secure editing of projects anywhere in the world via the cloud.
In this Spotlight episode of the Security Ledger podcast, I interview Richard Bird, the CSO of the firm Traceable AI about the challenge of securing application programming interfaces (APIs), which are increasingly being abused to steal sensitive data. Richard Bird is the Chief Security Officer at Traceable.ai. ,
Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Caleb Sima is the CSO at Robinhood.
Nor can technology alone solve the security challenges facing the user community. Joining SC Media Deputy Editor Bradley Barth for the discussion is Dan Meacham, chief informationsecurity officer and CSO at Legendary Entertainment, and Hossein Ghazizadeh, chief services officer at Barracuda Networks.
Those stats come from ISACAs Tech Workplace and Culture 2025 report, which is based on a survey of about 7,700 of its members who work in IT areas such as informationsecurity, governance, assurance, data privacy and risk management.
The role of a Chief InformationSecurity Officer (CISO) is undeniably complex, yet incredibly rewarding. Similarly, SolarWinds and its Chief InformationSecurity Officer faced fraud and internal control failure charges from the SEC. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. She also served as the deputy chief information officer of the White House.
He has been in the informationsecurity and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. A : The ever-changing technology and threats that come along with it. A : The ever-changing technology and threats that come along with it.
An organization’s Chief Information Officer (CIO) or someone in a similar capacity – Chief Digital Information Officer or InformationTechnology Director – sits atop the security hierarchy in many organizations. Chief Technology Officer?. Members of the OCIO may include: Deputy CIO?. Compliance Officer.
An eternal discussion in security is whether technology, process or people are the critical element in informationsecurity at scale. Most security leaders will tell you it’s the people that matter. It requires new positive habits and motivations.
However, the audit found what is underway is not enough, from an informationsecurity perspective: ".if How massive is the IRS informationtechnology infrastructure? billion to operate its current informationtechnology infrastructure, nearly $2.04 IRS legacy system numbers: math error?
Every entity should have an informationtechnology asset disposal (ITAD) program as part of its informationsecurity process and procedure. Indeed, every time an IT asset is purchased, the eventual disposal of that asset should already be defined within an ITAD.
As organizations emerge from the COVID-19 pandemic, hiring is on the rebound—and that is especially true in the informationsecurity ranks where demand has outstripped supply for years.
Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief InformationSecurity Officer. A CISO must have spent years in the field of informationsecurity with a strong technical foundation,” Ramachandran writes. “It GSLC: GIAC Security Leadership.
Jim Routh has joined the company as Chief Security Advisor and Board Participant. Jim is a seasoned cybersecurity leader who recognizes the breakthrough technology that Virsec has pioneered. He will leverage his expertise in transformational security to support innovation while driving positive business results.
Even through the Covid19 pandemic, trends in acquisition and consolidation of informationsecurity oriented companies remained quite strong. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. Top cybersecurity M&A deals for 2021 | CSO Online.
Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief informationsecurity officer (CISO). Thus, supply chain security should be a key area of focus at all times.
From the filing : " Subsequently, certain current and former executive officers and employees of the Company, including the Company's Chief Financial Officer and Chief InformationSecurity Officer, received 'Wells Notices' from the SEC staff, each in connection with the Investigation. federal securities laws."
As solutions to managing cybersecurity threats increase, surprisingly few metrics are available on how well these methods work to secure organizational assets. The National Institute of Standards and Technology (NIST) has pioneered informationsecurity performance measurement model s that can produce metrics.
Germany’s Federal Office for InformationSecurity (BSI) has warned businesses against using Kaspersky virus protection products amid concerns of Russian technology being coerced by Russian government agents and forced to attack target systems against its will or spied on. The warning echoes earlier unconfirmed claims by U.S.
(Source: 138 webinar attendees polled by Tenable, February 2025) Interested in learning how Tenables security team uses Tenable Cloud Security to safeguard our cloud environments?
If you veer towards over-collecting threat intel, you’ll overwhelm teams and technology with too much data. Either way, your balance will suffer, especially if your security team is erring on the “too much” data side. To read this article in full, please click here
In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? Given the magnitude of the problem, could taking a more risk-based approach to security pay off?
Well, informationsecurity, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives. Buerger recently joined Kraft Heinz as its Business InformationSecurity Officer after serving as CISO at a smaller company.
Chief InformationSecurity Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. The state is now looking for the third person to fill that role in a year. And this is increasing cyber risk.
Conducted in spring 2024, the study captures insights from Chief InformationSecurity Officers of all 50 U.S. Key findings highlight that while traditional security issues remain, AI-driven attacks are now a significant concern. Cybersecurity budgets are struggling to match the scale of emerging threats, especially in AI.
My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If GSEC is intended for anyone new to cyber security who has some background in information systems and networks.
A key lesson is that security cannot be bolted on at the end of a technology project. A leading Spanish pharmaceutical company, Insud Pharma, worked with Fortinet to develop a framework that enabled the transformation of the company’s entire value chain, based on best practices in informationsecurity.
These days, informationtechnology (IT) and informationsecurity professionals know this all too well, especially when it comes to configuration assessments. Systems need to be securely configured upon implementation and then assessed frequently to ensure they stay that way.
Sonatype’s world-class open source intelligence, which includes our automated malware detection technology, safeguards your developers, customers, and software supply chains from infections like these. Ax’s expertise lies in security vulnerability research, reverse engineering, and software development.
Our opening keynote, Marching on in 2021: Cyber Resiliency in Security , was filled with five stellar CISOs from different organizations and industry verticals: Mark Eggleston, VP, Chief InformationSecurity and Privacy Officer at Health Partners Plans. Joshua Cloud, Senior Director of InformationSecurity at NFI.
As defenders of digital assets, Chief InformationSecurity Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff.
: Kathleen Moriarty, Chief Technology Officer : “The state of cyber threats is such that we need to pivot to built-in security models. Sean Atkinson, Chief InformationSecurity Officer : “A huge threat in cybersecurity is the misconfiguration of cloud infrastructure.
These resources should provide insights into the organization's risk appetite, technological maturity, and strategic objectives. Pay close attention to past technology investments, previous security approaches, and the organization's historical response to technological and risk challenges.
Former Uber CSO Joe Sullivan was found guilty of obstructing a federal investigation in connection with the attempted cover-up of a 2016 hack at Uber, NIST and Microsoft say that mandatory password expiration is no longer needed but many organizations are still doing it, and how fake executive profiles are becoming a huge problem for […].
According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. For example: passwords being typed or posted, specific motions or commands used to activate control systems to open or unlock doors, etc.”. “For
SolarWinds this week announced that its vice president of security Tim Brown has taken on the additional title of chief informationsecurity officer, as part of the company’s ongoing efforts to institute a secure-by-design posture following the devastating supply chain attack on its Orion IT administration software.
It's no wonder after he speaks he has a line of folks waiting to learn more from him, or just to shake his hand and say thanks for his information sharing. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content