article thumbnail

7 Things Every CISO Needs to Know About PKI

Security Boulevard

7 Things Every CISO Needs to Know About PKI. With PKI, CISOs and other information security specialists can implement hardware, software, policies, and procedures to better establish, manage, distribute, implement, and protect digital certificates and key policies. What can CISOs do right now to protect machine identities?

CISO 52
article thumbnail

Improvise, Adapt, Overcome: Building Security Resilience in a World of Uncertainty

Cisco Security

It helped him when he took on the CISO role at Brunel University London, at a time when cybersecurity wasn’t embedded into the organization’s culture. We featured their stories and advice in a new interactive eBook, called Building Security Resilience: Advice and Stories from Cybersecurity Leaders, that we released today.

CISO 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Creating a Path to Successful Security Hygiene

Cisco Security

If you’re a security and risk management leader, the new ESG eBook is a must-read, so download the Security Hygiene and Posture Management eBook right now. There’s a growing need to secure the perimeter while simplifying the technologies that do so. About the report: Understanding security hygiene trends.

article thumbnail

These Roles Require Cybersecurity Training

CyberSecurity Insiders

An organization’s Chief Information Officer (CIO) or someone in a similar capacity – Chief Digital Information Officer or Information Technology Director – sits atop the security hierarchy in many organizations. Chief Technology Officer?. The CISO and Their Security Staff. Members of the OCIO may include: Deputy CIO?.

article thumbnail

Is There Really a Shortage in Cloud Security Skills?

CyberSecurity Insiders

Prior to the pandemic, the world was immersed in cloud technology – everyone, it seemed, had a migration strategy. Cloud is a highly complex and continually evolving set of technologies and protocols. The fact is, most boards spend too little time listening to their CIOs or CTOs about technology-related issues.

Education 116
article thumbnail

Security resilience: 4 ways to achieve company-wide buy-in

Cisco Security

Also, “Accidental CISO” (AC), Chief Information Security Officer , who was just trying to get SOC2 and ISAC certifications for a vendor when he was abruptly named CISO of his organization. And finally, Christos Syngelakis, CISO, and Data Privacy Officer at Motor Oil Group.

CISO 90
article thumbnail

A reasoned approach to managing digital sovereignty

Thales Cloud Protection & Licensing

What does that imply for the CISOs charged with reducing the digital sovereignty risk their enterprises face while enabling the agility these enterprises need to be competitive? In other words, adding more people and more technology. See our eBook “ Achieve Digital Sovereignty with Thales for more on this.”.