Remove Blog Remove CISO Remove Information Security Remove Technology
article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

Information privacy and information security are two different things. Related: Tapping hidden pools of security talent Information privacy is the ability to control who (or what) can view or access information that is collected about you or your customers. still available for you to use.

article thumbnail

GUEST ESSAY: Could CISOs be on the verge of disproving the ‘security-as-a-cost-center’ fallacy?

The Last Watchdog

So how will this affect chief information security officers (CISOs) and security programs? Given the perennial skills and staffing shortage in security, it’s unlikely that CISOs will be asked to make deep budget or staffing cuts, yet they may not come out of this period unscathed.

CISO 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Information Security Breaks The Classic IT Model

Security Boulevard

How Information Security Breaks The Classic IT Model. From The Other Side Of The PO Blog: Part 4. The CISO should be the ultimate authority when reducing cybersecurity operations, personnel, and budgets. Technology Producers and Corporate Consumers. The number of endpoints required to have EDR/XDR security.

article thumbnail

The Top 3 Mistakes CISOs Make – and How to Fix Them

Security Boulevard

One of the hardest and most complex jobs in technology is being a chief information security officer (CISO). The post The Top 3 Mistakes CISOs Make – and How to Fix Them appeared first on Nuspire. The post The Top 3 Mistakes CISOs Make – and How to Fix Them appeared first on Security Boulevard.

CISO 98
article thumbnail

Understanding the Core Principles of Information Security

Centraleyes

To build a robust information security strategy, one must understand and apply the core principles of information security. This blog post will delve into the fundamental principles underpinning effective information security principles and practices. Is The Demise of the CIA Triad Imminent?

article thumbnail

Understanding SEC Cyber Disclosure Rules and CISO Liability

Centraleyes

The SEC’s proposed cybersecurity disclosure rule , known as the Proposed Rule for Public Companies (PRPC), has ushered in a wave of concerns and challenges, particularly for CISOs. This tight timeline raises questions about the rules’ practicality and potential impact on CISOs’ liability.

CISO 52
article thumbnail

Influencer of the Year | Sounil Yu creates ‘must-have playbook in modern information security programs’

SC Magazine

Yu has contributed to cybersecurity models in his own right, having developed the Cyber Defense Matrix that was described by one tech leader as the “must-have playbook in modern information security programs.” Yu said in a blog he penned upon joining JupiterOne that he actually didn’t want to become a CISO.