article thumbnail

How CISOs Limit Downtime Without Impacting Security

Security Boulevard

In the last decade the role of the chief information security officer (CISO) has evolved considerably. Not long ago, the CISO was considered a part of the IT team and their main focus was on building firewalls, implementing antivirus and keeping spam emails at bay. Today, however, things are very different. The huge surge in.

CISO 124
article thumbnail

5 Tips to be an awesome CISO

Javvad Malik

I’m not a CISO, I never have been and hope I never will be. It seems like a lot of hard work and stress, and if you’re the CISO at a company when you suffer a breach it’s difficult to blame the intern without a mob of security professionals criticising you. But not if you’re a CISO. Now, before you object, hear me out.

CISO 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

This is why CISOs everywhere should be concerned. CISOs should begin to familiarize themselves with these and evaluate their potential suitability for adoption. Once that ecosystem is understood and its supporting cryptology has been identified, CISOs should develop a plan that considers quantum-resistant technology.

CISO 133
article thumbnail

BSides Knoxville 2023 – Reanna Schultz – Social Engineering: Training The Human Firewall

Security Boulevard

Permalink The post BSides Knoxville 2023 – Reanna Schultz – Social Engineering: Training The Human Firewall appeared first on Security Boulevard. Our thanks to BSides Knoxville for publishing their presenter’s outstanding BSides Knoxville 2023 content on the organizations’ YouTube channel.

article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. This has led to CISOs shifting how they approach protecting the corporate perimeter with additional controls and monitoring tools being used to scan any access to the network. Cloud dominance .

CISO 97
article thumbnail

Enterprise security: Making hot desking secure and accessible on a global scale

Cisco Security

Making hot desking secure and accessible on a global scale The first rule of interviewing a CISO at the Australian division of Laing O’Rourke is this: You can’t dig deep into use cases or cli… Read more on Cisco Blogs Laing O'Rourke used Cisco Secure Firewall and Identity Services Engine to deliver global, secure network access.

CISO 95
article thumbnail

User Deception: The Biggest Cyber Threat CISOs are Forgetting

Mitnick Security

As a CISO, you're always looking for the next big breakthrough to increase your organization's overall security posture. Next-generation firewalls (NGFW), intrusion prevention systems (IPS), and sophisticated anti-virus software are great, but the answer to strong cybersecurity starts with your weakest link: your employees.

CISO 52