Upcoming Webinar       The Complete Guide to Ransomware [Updated for 2022]       26th May, 2PM EDT      Register Now
Archive for the ‘CISO’ Category

The role of the Chief Information Security Officer (CISO) has evolved over the years. Now, the role is less about implementing IT security technologies, and more about identifying and managing risks and being able to communicate effectively with employees and executives about those risks. The CISO must continuously update their knowledge and have a profound understanding of the regulatory landscape. CISOs now have more responsibilities than ever, and thus they … Read more

The role of CISOs have evolved dramatically over the last few decades, especially in the last few years. As a result, CISOs face ever-increasing responsibilities, such as mapping security strategies to meet new challenges and support key business objectives. The last two years presenting unprecedented security challenges in decades also prompted CISOs to be more proactive in their efforts in 2022. Digital adoption has rapidly accelerated, and as a result, … Read more

  An information security policy (ISP) is arguably the most important cybersecurity policy an organization can have. Essentially, an ISP defines the protocols and procedures for identifying, evaluating, mitigating, and recovering from security threats. An ISP is data-centric, in that its main objective is to protect data confidentiality, integrity, and availability (known as the CIA triad). An ISP will cover a broad range of areas including access control, data classification, … Read more

When we look at the schedules of the CISOs we consult with, we’re almost always faced with an impossibly large list of tasks (all of which are urgent!). CISOs are typically inundated with tasks and a lot of their time is spent translating things to the rest of the business. It’s a critical communications role within a business, so efficiency is key. We spoke with Vladi Sandler, CEO at Lightspin, … Read more

In this episode of CISO Talks we sat down with Gerry Ashison and Matt Goodman, co-founders of Auricoe, to discuss common challenges that CISOs face in the role. There are a number of recurring challenges that you are likely to face as a CISO, including burnout, culture mismatch, high turnover, and more. How can we improve these situations? Let’s take a look. High Turnover of CISOs CISO tenure is shocking … Read more

A Chief Information Officer (CIO) is responsible for the design, implementation and management of our IT systems, and plays an invaluable role in keeping those systems secure. What’s more, there is serious shortage of IT security professionals, and so the last thing we want to do is lose a valuable member of staff or discourage people from pursuing a career as a CIO. However, the life of a CIO is … Read more

Some larger companies will employ both a Chief Information Officer (CIO) and a Chief Information Security Officer (CISO). They are both responsible for protecting and managing sensitive data, although the role of the CIO is much broader. The role of the CISO is to ensure that proper controls are in place to protect the company’s digital assets, while the role of the CIO is to ensure that the CISO has … Read more

Despite the GDPR being over a year old, there still exists a gap between legal and technical that makes guidance more difficult to craft and implement. Despite the fact that the General Data Protection Regulation being probably the most famous compliance regulation in the world, many organizations are still struggling fully understand what’s required of them. An honest and frank look at the way that GDPR has been implemented over … Read more

The frequency and severity of data breaches over the last few years, combined with security incidents threatening well-known brands, has brought cybersecurity to the forefront of many board meetings. Data is being generated at an unprecedented rate and the value of data is increasing, which means that the potential attack surface grows year on year. Many organizations have taken steps to address this problem by increasing their cybersecurity budgets. However, … Read more

When it comes to the world of cyber-security, it’s practically impossible to predict what is around the corner, and it’s no surprise that CISOs are struggling to keep their heads above the water. They are required to deal with a wide-range of attack vectors including APTs, Phishing, DDoS, Ransomware, Cryptojacking, Formjacking, “brute force” password attacks, and more. To make matters worse, a large number of security incidents are caused by … Read more