Upcoming Webinar         Four Secrets of US HIPAA Compliance         Thursday 20th May, 2pm EST        Register Now
Archive for the ‘CISO’ Category

  An information security policy (ISP) is arguably the most important cybersecurity policy an organization can have. Essentially, an ISP defines the protocols and procedures for identifying, evaluating, mitigating, and recovering from security threats. An ISP is data-centric, in that its main objective is to protect data confidentiality, integrity, and availability (known as the CIA triad). An ISP will cover a broad range of areas including access control, data classification, … Read more

When we look at the schedules of the CISOs we consult with, we’re almost always faced with an impossibly large list of tasks (all of which are urgent!). CISOs are typically inundated with tasks and a lot of their time is spent translating things to the rest of the business. It’s a critical communications role within a business, so efficiency is key. We spoke with Vladi Sandler, CEO at Lightspin, … Read more

In this episode of CISO Talks we sat down with Gerry Ashison and Matt Goodman, co-founders of Auricoe, to discuss common challenges that CISOs face in the role. There are a number of recurring challenges that you are likely to face as a CISO, including burnout, culture mismatch, high turnover, and more. How can we improve these situations? Let’s take a look. High Turnover of CISOs CISO tenure is shocking … Read more

A Chief Information Officer (CIO) is responsible for the design, implementation and management of our IT systems, and plays an invaluable role in keeping those systems secure. What’s more, there is serious shortage of IT security professionals, and so the last thing we want to do is lose a valuable member of staff or discourage people from pursuing a career as a CIO. However, the life of a CIO is … Read more

Some larger companies will employ both a Chief Information Officer (CIO) and a Chief Information Security Officer (CISO). They are both responsible for protecting and managing sensitive data, although the role of the CIO is much broader. The role of the CISO is to ensure that proper controls are in place to protect the company’s digital assets, while the role of the CIO is to ensure that the CISO has … Read more

Despite the GDPR being over a year old, there still exists a gap between legal and technical that makes guidance more difficult to craft and implement. Despite the fact that the General Data Protection Regulation being probably the most famous compliance regulation in the world, many organizations are still struggling fully understand what’s required of them. An honest and frank look at the way that GDPR has been implemented over … Read more

The frequency and severity of data breaches over the last few years, combined with security incidents threatening well-known brands, has brought cybersecurity to the forefront of many board meetings. Data is being generated at an unprecedented rate and the value of data is increasing, which means that the potential attack surface grows year on year. Many organizations have taken steps to address this problem by increasing their cybersecurity budgets. However, … Read more

When it comes to the world of cyber-security, it’s practically impossible to predict what is around the corner, and it’s no surprise that CISOs are struggling to keep their heads above the water. They are required to deal with a wide-range of attack vectors including APTs, Phishing, DDoS, Ransomware, Cryptojacking, Formjacking, “brute force” password attacks, and more. To make matters worse, a large number of security incidents are caused by … Read more

We’re very much of the opinion that 2019 has the potential to be the year of the CISO. More specifically, 2019 is the year the CISO will need to listen. Listen to their peers, to HR, Sales, Marketing, Finance and to the rest of the board and gather as much information about their motivations and what makes them tick as possible. It’s been said before but it’s worth repeating. The … Read more

The lack of women in cybersecurity has been a major talking point over the last few years, as well it should be. There have been several studies that suggest women comprise as little as 10% of the cybersecurity workforce, and that this number has not improved by any significant amount. We sat down with a specialist IT recruiter to find out why there was such a disparity between the number … Read more