Remove Architecture Remove CISO Remove Cyber Risk Remove Information Security
article thumbnail

5 Benefits of Hiring a Virtual Chief Information Security Officer (vCISO)

Security Boulevard

But hiring a full-time chief information security officer (CISO) is not always possible for organizations – nor is it always needed. Read on to learn why you might want to consider a virtual CISO (vCISO), and the benefits that come with that decision. Is a vCISO Right for Your Organization?

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. This is consistent with new research from Boardroom Insiders which states that 20 percent of Fortune 500 global chief information officers (CIOs) are now women — the largest percentage ever.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk. She is also the host of the Mastering Cyber podcast. She also served as the deputy chief information officer of the White House.

article thumbnail

Why do CISOs Keep Quitting on Florida?

SecureWorld News

Chief Information Security Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. And this is increasing cyber risk. Cybersecurity officials struggle in Florida.

CISO 98
article thumbnail

Safety first: Will insurance companies stall or accelerate cybersecurity progress?

SC Magazine

He referenced an insurer’s role in designing pressure relief valves for the steam engines powering Philadelphia in the 1800s: “They said if you wanted to have insurance, you have to have this piece of architecture on your system.” In so doing, “they drove security or solutions to avoid large insurance claims.”. billion in premium. .

Insurance 126
article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

“They have information about a ‘point in time,’ however most would not be aware of a vulnerability and thus a patch, until after a vulnerability scan is complete.”. “In The CIOs and CISOs suggested that while real-time patch status may be known for certain devices, it does not exist for many.”.

article thumbnail

How Smart Organizations Mitigate Cyber Risks in a World of Unknown Unknowns

CyberSecurity Insiders

By Shay Siksik, VP Customer Operations and CISO, XM Cyber. Shay Siksik has been a cybersecurity evangelist for more than a decade, always with a passion for customer service, process improvement, and information security. There are things we know: 2 + 2 = 4, for example. We call this common knowledge.