article thumbnail

5 ways to tell you are not CISO material

CSO Magazine

As the role of the CISO continues to grow in importance and gain more responsibility, many cybersecurity practitioners may wonder if they have what it takes to be successful in the role. Technical expertise and experience are obviously huge assets. They know how to make quick decisions and drive change in the organization.

CISO 100
article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. That's a soft skill that even the most adept CISOs are still trying to master.

CISO 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Circle Security debuts platform “purpose-built” to tackle credential-driven threats, cloud attacks

CSO Magazine

Powered by a decentralized architecture, Circle is available as a device-native service, a mobile app, a browser-based solution, and via a developer-focused API, according to the firm. Credential-driven data breaches are the biggest threat vector for most companies.

CISO 75
article thumbnail

BrandPost: 3 Best Practices for Building Security Resilience

CSO Magazine

That’s not surprising, given the rapidly increasing volume of endpoints distributed across complex IT architectures. We don’t secure everything, everywhere, or otherwise business wouldn’t get done,” said Helen Patton, CISO, Cisco Security Business Group.

CISO 82
article thumbnail

News alert: Simbian launches with $10M to build autonomous, GenAI-powered security platform

The Last Watchdog

Its founding team comprises leading AI researchers and security veterans who have created security products in broad use across enterprises today, and have 150+ patents across large language models, cloud computing, encryption, scalable architecture, transistors, and hardware design.

CSO 100
article thumbnail

New SDP 2.0 specification facilitates zero-trust maturity

CSO Magazine

SDP ties closely to the pursuit of implementing a zero-trust architecture, and what follows are the key aspects of SDP 2.0 in zero-trust environments that CISOs and other security leaders need to know. To read this article in full, please click here

CISO 86
article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. James Carder, LogRhythm CSO. What is Zero Trust?

CISO 134