article thumbnail

Fake CISO Profiles on LinkedIn Target Fortune 500s

Krebs on Security

Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. Of course, Sites is not the real CISO of Chevron.

CISO 307
article thumbnail

How to Succeed As a New Chief Information Security Officer (CISO)

IT Security Guru

As cyber threats increase in frequency and complexity, organizations recognize the importance of having a Chief Information Security Officer (CISO) to protect their sensitive data and infrastructure. Having a clear idea of your challenges and working with a coach can help your CISO first 90 days and adjust more smoothly.

CISO 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

Information privacy and information security are two different things. Related: Tapping hidden pools of security talent Information privacy is the ability to control who (or what) can view or access information that is collected about you or your customers. still available for you to use.

article thumbnail

Build Strong Information Security Policy: Template & Examples

Security Boulevard

One of the best and most important measures you can take to protect your data (and that of your customers) is simply to have a robust information security policy. The post Build Strong Information Security Policy: Template & Examples appeared first on Hyperproof. Of course, that idea sounds simple enough.

article thumbnail

Key Considerations When Hiring a Chief Information Security Officer

CyberSecurity Insiders

In today’s interconnected world, where cyber threats loom large, organizations must prioritize information security. One crucial step towards achieving robust cybersecurity is hiring a competent Chief Information Security Officer (CISO).

article thumbnail

Former Uber CISO Faces Prison Time For Mishandling Cyberattack: Justice, Scapegoating, or Both?

Joseph Steinberg

While there are State laws requiring the disclosure of various data breaches, there is no specific, clear, federal counterpart that details what, when, and how a CISO must handle such matters. Serving as a Chief Information Security Officer is a daunting task. Serving as a Chief Information Security Officer is a daunting task.

CISO 247
article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. The recent release of NIST's Cybersecurity Framework version 2.0

CISO 77