Tag: Chief Information Security Officers
Your First 90 Days as CISO – 9 Steps to Success
Chief Information Security Officers (CISOs) are an essential pillar of an organization’s defense, and they must account for a lot. Especially for new CISOs,...
7 Tips for Implementing a Personnel Security Program
Why does it seem that some of the most important things in life are often those that are the most overlooked? For example, a...
A Day in the Life of a Modern CISO
Over the last two decades, the role of a CISO has gained significant importance for businesses. The life of a CISO can vary quite...
Cybersecurity: Under Pressure!
If you work in a cybersecurity team, you will be under much pressure these days. According to the latest industry reports, the ongoing pandemic...
Information Security Governance Guide For the CISO
We're not in an information age anymore. We're in the information management age. ~ Chris Hardwick.
Information governance is a corporation's core information policy. The...
Corporate Compliance Strategies to Protect Data
The pandemic has pushed the corporate workforce to remote locations, which has resulted in increased risk to corporate data. As corporations rise to the...
3 Takeaways from 2020 for CISOs to Guide This Year’s Strategy
Last year cast a shockingly bright spotlight on cybersecurity with the risks that surfaced due to the rise of remote work. The year was...
5 Questions Every CISO Should Ask Before Moving Company
The role of a Chief Information Security Officer is a much-coveted position that blends extensive technical know-how, managerial excellence, and strong leadership skills. It’s...
CISOs Must Declare an End to the War Between Security and...
The time has long passed for CISOs and other security leaders to shift their perception regarding cybersecurity compliance assessments. These assessments have traditionally been...
Amid Today’s Threat Landscape, Protecting Active Directory is a CISO-Level Concern
Despite Active Directory’s critical role in today’s IT infrastructure, CISOs rarely list protecting it as a top priority. They assume that policy management and...