Remove CISO Remove Digital transformation Remove Risk Remove Technology
article thumbnail

50% of CISOs say the push for rapid growth and digital transformation stalls cloud security

SC Magazine

Visitors walk by a cloud sign at the Telekom stand at the CeBIT 2017 Technology Trade Fair on March 21, 2017. New research found that half of CISOs surveyed say their organization’s desire for growth and rapid digital transformation has become detrimental to achieving data security in the cloud.

article thumbnail

How Do You Secure Digital Transformation?

SecureWorld News

It is very likely that the COVID-19 pandemic forced your organization to accelerate its digital transformation (DX) strategies. There are a lot of lingering questions: What do organizations do to transform their infrastructure to where it needs to be from a technology standpoint? How do you secure your new initiatives?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

cybersecurity policy needs to match societal values CISOs must preserve and protect their companies in a fast-changing business environment at a time when their organizations are under heavy bombardment. I had the chance to discuss this state of affairs with Vishal Salvi, CISO of Infosys. Salvi “The CISO role has fundamentally changed.

CISO 261
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Cloud dominance . Security landscape requires adaptation .

CISO 91
article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

With the digital transformation really just beginning, in cloud computing and IoT, it makes sense to bring security into the DevOps conversation. The security team needs to be at the table, working alongside the developers and the operations teams, providing the risk management view for security. Oil and water. Oil and water.

article thumbnail

Three Risk Mitigation Strategies to Address the Latest Data Security Threats

CyberSecurity Insiders

By Dannie Combs , Senior Vice President and CISO, Donnelley Financial Solutions (DFIN) As security threats to data continue to ebb and flow (mostly flow!), Here are three risk mitigation imperatives that can help organizations get a better handle on these latest risks and threats.

Risk 118