article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

By spearheading cybersecurity programs, CISOs empower organizations to fend off cyber threats from criminal enterprises, insider risks, hackers, and other malicious entities that pose significant risks to operations, critical infrastructure, and even national security. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.

CISO 76
article thumbnail

Clorox's Cybersecurity Chief Departs Amidst Incident Recovery Efforts

SecureWorld News

Conversely, if a CISO is to be held accountable in the same manner as a CFO or General Counsel concerning matters of investor confidence, the executive contours of the CISO role should be revisited to ensure that it has sufficient authority, agency, and institutional backing to defend data assets as a fiduciary."

CISO 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New hyperactive phishing campaign uses SuperMailer templates: Report

CSO Magazine

“The SuperMailer-generated emails have been reaching inboxes at an increasingly remarkable volume,” Brah Haas, cyber threat intelligence analyst at Cofense, said in a blog post. To read this article in full, please click here

article thumbnail

December 15 Marks Deadline for SEC's New Cyber Disclosure Rules

SecureWorld News

Understanding the nature of the threat and how to appropriately mitigate that risk should be a shared responsibility, not solely the purview of the CISO or CSO. I would think that boards would want to have that experience, even though it is somewhat difficult to come by.

CISO 90
article thumbnail

BrandPost: How Configuration Assessments Help Improve Cyber Defenses

CSO Magazine

Cyber threats demand identification and remediation. The 2020 Verizon Data Breach Investigations Report (DBIR) notes that vulnerabilities accounted for nearly 20% of hacking breaches. Network performance requires constant monitoring. Hackers are constantly on the lookout for poorly configured or unsecured systems.

article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

Utilize real-world examples, case studies, and industry benchmarks to drive home the importance of investing in cybersecurity defense and creating a culture where everyone plays a role in protecting the organization from cyber threats.

article thumbnail

CISOs Getting Back to 'Business as Usual,' Proofpoint Survey Shows

SecureWorld News

This pronounced shift suggests that security professionals see the threat landscape heating up once again, and have recalibrated their level of concern to match."

CISO 70