This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The modern enterprise C-suite is undergoing a seismic shift—not over profits or market share, but over who leads technology, shapes strategy, and ultimately defines the future of the business. The digital era has brought with it not just new technologies, but new power dynamics. That’s what this blog is all about.
SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Hence this blog was born. Let’s stick to mostly technology focused failures. SOC should not spend time / resources managing such technologies. Do They Matter?
The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. This is a perfect metaphor for how a CISO operates in day to day situations. It represents a struggle many CISO’s around the world face. This shows how quickly a CISO can get burnt out on the job.
Google calls attention to our Cyber Public Health work Last week, Bill Reid and Taylor Lehmann, both in the Office of the CISO at Google Cloud, wrote a blog post, Cyber Public Health: A new approach to cybersecurity. Im honored and grateful for their support, and appreciate being quoted.
So how will this affect chief information security officers (CISOs) and security programs? Given the perennial skills and staffing shortage in security, it’s unlikely that CISOs will be asked to make deep budget or staffing cuts, yet they may not come out of this period unscathed. Related: Attack surface management takes center stage.
For business leaders, particularly those in tech, understanding the implications of such policies is criticalnot just for protecting their organisations, but for contributing to a future where technology is wielded ethically and responsibly. Thats what this blog is all about. For tech leaders, the choice is clear.
But if we switch our focus to the world of technology, we seei a starkly different picturea landscape increasingly shaped by control, compliance, and automation. The rapid advancement of technology, particularly in AI and automation, is transforming the way we interact with the digital world.
As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. It’s a subtle shift in focus, and requires a fundamental change in how we, as ITDMs, CISOs and cyber risk owners view and action resilience—not as a one-time project, but as an ongoing programme that provides strategic advantage.
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
The OOT (Organization, Operations, Technology) Approach: The guide advocates for prioritizing organizational and operational changes before finalizing technology decisions. This may challenge the conventional approach in traditional organizations where technology choices often precede organizational adaptation.
Hello, I am Helen Patton, and I am the newest Advisory CISO at Duo. While I was a CISO at Ohio State we partnered with Duo to implement MFA across our organization. There is every type of technology under one institutional umbrella. I am told I am the inspiration for the “CISO Helen” persona. We don’t care. Yes, they do.
. “We may warn you about messages that ask you to take the conversation to another platform because that can be a sign of a scam,” the company said in a blog post. “These warnings will also give you the choice to report the content without letting the sender know.” A follow-up story on Oct.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. This is where the real opportunity lies, and what Im exploring in this blog. For CISOs and cyber risk owners, this isnt just a riskits a gamble no one can afford to take.
One of the hardest and most complex jobs in technology is being a chief information security officer (CISO). The post The Top 3 Mistakes CISOs Make – and How to Fix Them appeared first on Nuspire. The post The Top 3 Mistakes CISOs Make – and How to Fix Them appeared first on Security Boulevard.
And get the latest on exposure response strategies and on CISO compensation and job satisfaction. National Institute of Standards and Technology (NIST) released three quantum-resistant algorithm standards in 2024 and expects to release a fourth in 2026. Plus, find out how your company can create a better cybersecurity environment.
As the year 2025 rushes forward, the responsibilities of CISOs are continuing to evolve. To remain relevant, we must continue to stay on top of emerging technologies, such as AI and automation. The year will continue to shape the CISO role into an exciting combination of leadership and tech expertise.
The ascendency of CISOs. Organizations need to assign security teams to manage these identity solutions, and hire a director to manage the team (and they all report to the CISO), or there will never be a change in that high-risk mindset. Prior to his career in information technology, Lance was a professional mountain guide.
As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. I’ve shared some of my lessons learned with a group of CISOs at a recent Bessemer Venture Partners event (that’s the photo at the top of this post).
In addition to publishing blogs and papers, our Cloud Security Podcast by Google episodes have featured experts discussing AIs impact on security, offering practical implementation advice, and addressing emerging challenges. A recap of our key blogs, papers and podcasts on AI security in 2024follows.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. Check Point Software Technologies Ltd. Exposure management can help meet the SEC requirements So what can a CISO do about this? For example, in October 2024, the SEC fined Unisys Corp.,
Thanks to technology, continual rapid change is here to stay. I went through some of them this week at the Cyber Security Virtual Conference: Celebrating Women in Cyber, and with PWC Canada when they engaged me to open their one day event – SheProtects: Future CISO Program. A CISO can work in an operational and or advisory capacity.
The OOT (Organization, Operations, Technology) Approach: The guide advocates for prioritizing organizational and operational changes before finalizing technology decisions. This may challenge the conventional approach in traditional organizations where technology choices often precede organizational adaptation.
29, roughly the same time Pyle published a blog post about his findings , ConnectWise issued an advisory warning users to be on guard against a new round email phishing attempts that mimic legitimate email alerts the company sends when it detects unusual activity on a customer account. ET: Included statement from ConnectWise CISO.
If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams. One of the inspirations for this blog was my eternal favorite read from years ago about LLMs “ChatGPT as muse, not oracle”. In what way is this new technology actually even more risky? Have Fun, Reduce Fail!
This blog has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security. IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall.
talk to us :-) These are the episodes: EP52 Securing AI with DeepMind CISO EP68 How We Attack AI? Since I promised to provide no answers in this blog, let me do more questions: 1a What aspects of securing AI are unchanged from securing, well, anything else? BTW, if you have anything fun to say about LLM security (easy!)
Information security has a foundation of governance, in the form of acceptable use policies and many others, that direct and govern what people can and can’t do with the technology that is in place at an organization.
In my last blog post , I described how the market for eXtended Detection and Response (XDR) is evolving and how CISOs should approach this new and promising technology. To read this article in full, please click here (Insider Story)
You can imagine that one person — the only one in a family comfortable with technology — might be sitting there registering all their family members one by one, directing them all back to the same email address. Think of adults who are trying to register their parents in nursing homes; think of parents trying to register their children.
Gartner says79% of technology buyers regret their last purchase1. This isnt about UI preferences or feature gaps; its about trust lost, budgets wasted, and CISOs left holding the bag when outcomes dont match expectations. That number isnt just high its damning. The question is: why? The answer? Most tools stop at visibility.
Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. 19 and at SecureWorld Dallas on Oct.
However, new research from e2e-assure has revealed that few organisations are taking full advantage of security technologies available today. Having surveyed over 500 CISOs and ITDMs responsible for cybersecurity on the challenges faced with SOCs, their insights are not to be missed. That is if your provider is performing.
Yet given the evolving IT environment, CISOs, sysadmins, and IT security teams are struggling to protect their networks. The lack of the right tools with enough capabilities and the inertia to shift to new technology are the main reasons why advanced VM is not yet adapted universally.
As technology advances and attackers develop ever-more sophisticated tactics, CISOs and security teams face a constant battle of trying to stay ahead of the curve. This year, several key themes are expected to dominate the cybersecurity landscape, shaping the priorities of CISOs and their teams.
By: Gary Perkins, Chief Information Security Officer As we keep a close eye on trends impacting businesses this year, it is impossible to ignore the impacts of Artificial Intelligence and its evolving relationship with technology. One of the key areas experiencing this transformational change is cybersecurity.
There are several methods of active defense that companies can utilize to safeguard their networks, and it’s time for CISOs to start picking. He previously managed development teams at Check Point Software Technologies and was a research assistant in the Atom Chip Lab focusing on theoretical Quantum Mechanics. But you can fight back.
Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. One of our recent blogs highlights tips to help with selecting and confirming trust in your third-party vendors, and this rings true now more than ever. How Do You Select a Trusted Vendor?
It helped him when he took on the CISO role at Brunel University London, at a time when cybersecurity wasn’t embedded into the organization’s culture. Find this blog helpful? View our other blogs on security resilience: Enabling Security Resilience in the Face of Unpredictable Change. 5 Dimensions of security resilience.
One approach to understanding and explaining this is to consider whether, as a CISO, you are a Builder, Fixer, or Scale Operator. Helen Patton helps CISOs understand how they should spend their time by discussing seven circles of security : Technology, data, business, etc. Which kind of CISO are you at this point in time?
The role of the Chief Information Officer has undergone significant transformations over the past few decades, driven by the rapid advancements in technology. Chief should mean something," said Patrick Benoit , Global CISO for Brinks and member of the SecureWorld Houston Advisory Council. "I That is a huge conflict of interest.
See the video at the blog post. In the Administrator’s Guide to Passwordless blog series , Tech Lead Jeremy Erickson covers everything you need to know to determine for yourself why passwordless authentication can be more secure and more usable than today’s leading authentication systems. Advisory CISO J.
By: Igor Volovich, VP, Compliance Strategy Technology and the threats and vulnerabilities that impact its resilience and trustworthiness keep cybersecurity professionals, especially CISOs, constantly vigilant.
Business initiatives demand faster, more efficient outcomes and technology responds. When it comes down to it, C-level goals and CISO initiatives are not all that misaligned. The complexity that has abounded in the past few years has left us more connected and data-driven than ever before. Managed solutions can help.
I want to share a few additional things here on top our official launch blog. src: outline for [link] We also interviewed our CISO and of course I’ve asked the same question. We wanted to separate these, ahem, longer term concerns into something that affects large organizations implementing AI technologies today.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content