Remove CISO Remove Cybersecurity Remove InfoSec Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Other slides in the deck appear to equate ' security posture ' to vulnerability management and software/systems patching - a rather narrow/specific technical concern for metrics suggested to senior management, although arguably it is a major factor in cybersecurity - or to security strategy.

CISO 63
article thumbnail

Security pros rely on peer groups and open communication for help with stress

SC Magazine

But it’s hard to deny that the last year-and-a-half has been perhaps the most stressful and challenging period in the history of cybersecurity. Benjamin Corll, vice president of cybersecurity and data protection at U.K. Corll said he closely interacts with about 20 other CISOs through the U.S.-based External peer groups.

InfoSec 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The discomfort zone

Notice Bored

This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, Information Security Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. Documented! Maintained! Good luck with that.

Risk 72
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Charting an outcome-driven zero trust program Disclaimer: The word ‘journey’ can annoy many seasoned IT and cybersecurity pros. For strategic guidance and access to hands-on labs, register for one of our free Zero Trust Workshops. And I get it. For more information, check out our on-demand webinar Your Zero Trust Roadmap.

article thumbnail

Democratizing Threat Hunting: How to Make it Happen for Everyone

Cisco Security

In the past, most executives viewed cybersecurity as a rear-view mirror problem; cybersecurity was a reactive practice. In fact, this report will change how we think about running infosec programs.”. Attend a Threat Hunting Workshop. This is not necessarily the best business strategy. Beers with Talos Ep. #97:

Risk 109