Archive for the ‘CISO’ Category

We’re very much of the opinion that 2019 has the potential to be the year of the CISO. More specifically, 2019 is the year the CISO will need to listen. Listen to their peers, to HR, Sales, Marketing, Finance and to the rest of the board and gather as much information about their motivations and what makes them tick as possible. It’s been said before but it’s worth repeating. The … Read more

The lack of women in cybersecurity has been a major talking point over the last few years, as well it should be. There have been several studies that suggest women comprise as little as 10% of the cybersecurity workforce, and that this number has not improved by any significant amount. We sat down with a specialist IT recruiter to find out why there was such a disparity between the number … Read more

In episode 8 our popular podcast series, CISO Talks, we spoke with a specialist IT recruiter and asked what the role of CISO entails and how to be successful. First, a little clarification. The role of a CISO will vary dramatically depending on the size of the organization and the industry you are in. A CISO in the tier one investment bank, for example, may be under a lot more … Read more

It seems as though the demand for CISOs in the job market today is higher than ever before. CISOs are demanding higher salaries and are being given more responsibility at board level. To find out just how in demand CISOs are, we sat down with Nathan Powell of Henderson Scott – recruitment specialists in IT – to ask for his expert opinion on cybersecurity and the demand for CISOs. So … Read more

We recently interviewed Brian Contos, CISO and VP Technology Innovation at cybersecurity experts Verodin, to find out the one biggest piece of advice that CISOs need to take on board in 2019. Brian was an informative and entertaining guest on our CISOTalks podcast series and had the following to say regarding advice for CISOs: So What Advice Do You Have for CISOs? “In one word; proof. Make sure that you … Read more

In many ways the cybersecurity market has been through a period of maturation and growth over the last few years. Broadsheet newspapers are running 10-page features on it, mainstream news programs are discussing it and board level executives are starting to take notice. In many ways, cybersecurity is now mainstream. However, there is a long way to go yet. Despite the role of the CISO and CIO being given more … Read more

We all know by now that cybersecurity isn’t just an IT problem. The dramatic effects a data breach can have on an organization, in terms of both reputation and damages from non-compliance, mean that everyone from the CMO to the CEO needs to be concerned about data security. One of the biggest problems organizations face is that their employees, particularly those with elevated privileges, mishandle data (most of the time … Read more

MIT Sloan School of Management carried out a study which used a data breach simulation to observe how different groups respond to security incidents. The simulation involved comparing the decisions made by a group of inexperienced students, to a team of security experts. Interestingly, there was little significant difference in the success rates between the two groups. This is not meant to imply that security professionals are irrelevant, more that … Read more

Back in the day, all CISOs needed to do to get their cybersecurity budgets approved was to intentionally confuse the rest of the C-suite by using overly-complex technical language and showing pretty infographics with lots of red. More often than not, fear was used as a tactic to justify spending money on cybersecurity solutions. This evolved over the years as new regulatory bodies introduced standards that made cybersecurity a box-ticking … Read more

You’ve all heard the often-repeated mantra, “prevention is better than cure,” but is this really reflective of what we’re seeing in the cyber-security industry at the moment? With threats evolving at a faster rate, it’s not realistic to assume that any organization is fully capable of preventing data breaches, especially as a large volume of data breaches originate from within. Accidental or malicious insider threats are a common cause of … Read more