Quantcast
Channel: ITProPortal » ciso
Browsing all 19 articles
Browse latest View live

ISACA EuroCACS 2013: Boardrooms not investing enough in cyber-security

Speaking at ISACA’s EuroCACS conference in London this week, IT security insiders claimed enterprise executives are still failing to invest sufficient funds into bolstering cyber-security. The...

View Article



Image may be NSFW.
Clik here to view.

The security blame game: Who should be held accountable for a breach?

With the ever increasing threat of cybercrime knocking on one’s door, many large organisations are reliant on IT security teams to protect their vast network from attack. As many Chief Information...

View Article

Yahoo appoints Alex Stamos as Chief Information Security Officer

Yahoo has made an interesting choice for its new Chief Information Security Officer (CISO), following the departure of Justin Somaini in early 2013 (yes – the position has been vacant for over a year)....

View Article

Image may be NSFW.
Clik here to view.

If mother nature was a CISO: What the animal kingdom can teach us about IT...

People often describe the Internet as a hostile network — which is true — and that got me thinking about other hostile environments where a successful strategy results in resiliency and continuity....

View Article

The modern CISO: How to stand out from the crowd

The role of the chief information security officer (CISO) has gone from being a largely reactive and technical subset of enterprise IT to being proactive and of strategic importance to the business....

View Article


Cyber Security Show panel: Zero-trust model key to security

The threat of third parties and challenge of creating a workable strategy can be better achieved with a zero-trust model. [see_also] Speaking on a panel at the Cyber Security Show which is held under...

View Article

Cyber Security Show: How to turn the board’s attention to cyber

Getting the attention of the board when it comes to information security can be achieved by using the correct language and terms that they understand. Speaking on a panel at the Cyber Security Show...

View Article

CISOs: Why you should care about who’s attacking your firm

Over 95 per cent of chief information security officers (CISOs) say it is at least “moderately likely” that their company will face what they call an “advanced” attack in the next 12 months and, worse,...

View Article


CISOs reveal answers to the most important security questions

What keeps CISOs awake at night? What would they love to have in a perfect world? What do they need to make their job easier and more effective? [see_also] The best way to find out is to gather a dozen...

View Article


Analytics, cloud security and CISO respect: Predictions for 2016

2016 will be the year of cloud security and ROI, a year when CISOs finally get the recognition they deserve, and the year that Europe and the US make up or break up when it comes to data privacy. This...

View Article

Endpoint police: The lead investigator

Over the past decade or so, the role of the CISO has only grown in importance. From humble beginnings working perimeter security, the CISO’s focus used to be almost entirely fixed on making the company...

View Article

When a job title is not enough: Why do CISOs only stay with you for 18 months?

In the past, businesses were run by a small senior management team headed up by a managing director who reported to a president or board of directors. In addition, there were line managers who had a...

View Article

You’re NOT fired: How a CISO can impress the board

Earlier this month, Joseph Valente was named the winner of The Apprentice 2015 and Alan Sugar’s new business partner. Valente triumphed over 17 rivals during the process and will pocket 250,000 to...

View Article


Image may be NSFW.
Clik here to view.

The anatomy of a CISO [Infographic]

Major data breaches continue to highlight how essential it is for businesses to secure their systems, and as a result many organisations are looking to recruit information security officers. [see_also]...

View Article

Cybersecurity takes new priority in the C-suite

Despite being just a few months in, 2016 has seen big changes in the cybersecurity industry. The White House recently proposed a $3.1 billion Information Technology Fund that will enable the...

View Article


RSA highlights need for Red Team Automation simulated cyber attacks

At this month’s San Francisco based RSA conference, the largest global conference for cybersecurity, there were several topics which were prominent. With the proliferation of tools and technologies...

View Article

Why the trust is broken on BYOD

A study by endpoint security pros Code42 has shown that IT decision makers (ITDMs) are close to losing the trust of workers in the rest of their organisations. 67 per cent of the 1500 knowledge workers...

View Article


Ask the expert:­ What’s keeping CISOs awake at night?

The pressure is on for the CISO. Recent high profile data breaches have meant all eyes are on them, as a worrying amount of websites and applications are found to be vulnerable to cyber attack. There...

View Article

5 questions the CISO should ask the Threat Analyst

Threat intelligence data is a powerful tool for understanding attackers and their activities. Once organised in a threat intelligence platform, the data often reveals techniques and methodologies used...

View Article
Browsing all 19 articles
Browse latest View live


Latest Images