article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.

CISO 263
article thumbnail

The CSO role today: Responsibilities and requirements for the top security job

CSO Magazine

CSO definition. A CSO is a departmental leader responsible for information security, corporate security or both. That's the simplest answer to the question "What is a CSO?", At many companies, the term CSO is still used in this way.

CSO 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Chief Security Concern for Executive Teams

Krebs on Security

Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not anymore. EXECUTIVE SILOS.

CSO 251
article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.

CSO 240
article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. NERC) standards.

CSO 128
article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

While these technological investments have their value, theyre not enough to solve the fundamental problem the majority of risks come from humans. The Allure of Technology in Cybersecurity Cybersecurity professionals, like Gregs car-loving coffee enthusiast, often find comfort in technology. Its the complement, not the crutch.

Risk 100
article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

This was a few years ago, and one can only guess that the role had been created by a technologist who didn’t care about or didn’t understand the business—or, inversely by a businessperson who didn’t understand enough about technology. In either case, the disconnect is real. To read this article in full, please click here

CISO 125