Remove CISO Remove CSO Remove Cyber threats Remove Data breaches
article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.

CISO 71
article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Image: IANS Research.

CSO 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Clorox's Cybersecurity Chief Departs Amidst Incident Recovery Efforts

SecureWorld News

In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. Others suggest that she may have simply felt overwhelmed by the challenges of leading the company's cybersecurity efforts in the aftermath of such a significant breach.

CISO 82
article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.

article thumbnail

Our Top 10 Cybersecurity Podcast Episodes

SecureWorld News

Nation-State Cyber Threats. Details: We discuss the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Details: We discuss the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Also, we cover the top 10 cyber attack methods used by Iran and its hacking groups.

article thumbnail

Cybersecurity Awareness Month: Security Experts Reflect on Safety

CyberSecurity Insiders

Examples of this include keeping software up to date, backing up data, and maintaining good password practices. At the end of the day, lack of education and human error are two of the largest contributors to data breaches. By acting smart now, we can eliminate some of the greatest cyber threats facing our businesses today.”