article thumbnail

The CSO role today: Responsibilities and requirements for the top security job

CSO Magazine

CSO definition. A CSO is a departmental leader responsible for information security, corporate security or both. That's the simplest answer to the question "What is a CSO?", At many companies, the term CSO is still used in this way.

CSO 116
article thumbnail

A Chief Security Concern for Executive Teams

Krebs on Security

Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not anymore. EXECUTIVE SILOS.

CSO 251
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.

CSO 217
article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

This was a few years ago, and one can only guess that the role had been created by a technologist who didn’t care about or didn’t understand the business—or, inversely by a businessperson who didn’t understand enough about technology. In either case, the disconnect is real. To read this article in full, please click here

CISO 125
article thumbnail

Recent shadow IT related incidents present lessons to CISOs

CSO Magazine

Sign up for CSO newsletters. ]. Operating within an enclaved system means direct user access to more advanced technologies from their workstations wasn’t happening. They do have the challenge of employees using technology and applications with capabilities that far outstrip their ability to keep up.

CISO 144
article thumbnail

11 technologies improving database security

CSO Magazine

Now, sophisticated tools and technologies are making it possible for database developers to have their cake and, to stay in metaphor, not count the calories by keeping the information private. Databases hold vast amounts of personal information including some very sensitive tidbits, creating headaches for the companies that must curate them.

article thumbnail

New Intel CPU-level threat detection capabilities target ransomware

CSO Magazine

Keep up on the latest thought leadership, insights, how-to, and analysis on IT security through CSO Online’s newsletters. ]. These include things like trusted execution, virtualization, memory encryption, runtime BIOS resilience and threat detection technology ( Intel TDT ). To read this article in full, please click here