This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Vincent Hoang became the CISO in Hawaii in 2016. In this interview, Vince shares his journey and cyber priorities in protecting the Aloha State, particularly among the challenges presented by COVID-19.
Related: How real people are really using GenAI Todays Chief Information Security Officers (CISOs) operate in a pressure cooker: responsible for protecting critical assets, expected to show up in the boardroom with fluency, yet rarely granted the authority, resources or organizational alignment to succeed. Its not a people problem.
Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. Of course, Sites is not the real CISO of Chevron.
Whats on the minds of top local government chief information security officers? In this interview, Michael Dent shares current security and technology priorities, career tips and more.
Responses edited for clarity and length: Ambuj Kumar , CEO, Simbian Kumar While the SEC has fined the corporations, CISOs are worried that they may be held individually responsible and feel targeted by both attackers and now law enforcement. Some have moved away from the CISO role. Stephen Gates , Security SME, Horizon3.ai
Prosecutors charged Sullivan, whom Uber hired as CISO after the 2014 breach, of withholding information about the 2016 incident from the FTC even as its investigators were scrutinizing the company’s data security and privacy practices. Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction.
Cybersecurity governance has undergone a dramatic transformation over the past few decades. From its early days, where security was an afterthought to business operations, to the present, where it has become a board-level discussion, governance has had to adapt to an ever-evolving digital landscape.
According to prosecutors, Sullivan broke multiple laws when he failed to disclose the subsequent breach to government regulators; a federal jury in San Francisco consisting of six women and six men yesterday convicted him of two crimes: obstructing the FTC’s investigation and acting to conceal a felony from authorities. Click To Tweet.
National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing regulatory pressures and sophisticate cyberattacks but often are not covered by their organizations' D&O policies. The post Insurance Firm Introduces Liability Coverage for CISOs appeared first on Security Boulevard.
A leading cyber lawyer in Australia has warned CISOs and other IT leaders their organisations and careers could be at stake if they do not understand data risk and data governance practices.
CISOs can sometimes be their own worst enemy, especially when it comes to communicating with the board of directors. She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. LW: Why do so many CISOs still not get it that FUD and doom-and-gloom don’t work?
The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. These incidents underscore the critical importance of effective governance in cybersecurity programs.
Balonis Frank Balonis , CISO, Kiteworks By 2025, 75% of the global population will be protected under privacy laws, including U.S. state privacy laws, the EUs governance of ethical AI deployment, and updated regulations in India and Japan. The SEC Cybersecurity Disclosure Rule highlights transparency in governance.
Mentioning the phrase “shadow IT” to CISOs often results in an eye-roll or a grimace. As one who spent most of his adult life within government dealing with home-based IT capabilities that far outstripped those in the office, I know this feeling. Sign up for CSO newsletters. ].
CISOs, CIOs, and CTOs, who are already grappling with the complexities of cybersecurity, supply chain vulnerabilities, and data privacy, will face amplified risks without robust AI safeguards. Responsible AI Governance Drives Innovation, Not Chaos The false dilemma that pits regulation against innovation must be dismantled.
1 How to survive without CISA As CISA scales back , its time for enterprises to wake up to a harsh reality: You cant rely on the government to secure your infrastructure. The post Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25 appeared first on Security Boulevard. Insight No.
Whats on the minds of top local government chief information security officers? CISO Michael Dent on Leadership appeared first on Security Boulevard. In this interview, Michael Dent shares current security and technology priorities, career tips and more. The post Fairfax County, Va.,
Guess which CISOs tend to prioritize? Thats why a group of us, led by Evan Lam and Sudheesh Singanamalla, have a new short paper* in NDSS, On the (In)Security of Government Web and Mail Infrastructure : Abstract: Government web infrastructure is a critical part of todays Internet and the functioning of society.
It's a pivotal moment for digital civil liberties, responsible surveillance governance, and the role of private enterprise in defending the cyber ecosystem. Targets included h uman rights defenders, journalists, lawyers, diplomats, and government officials. This is more than a courtroom win.
The role of the CISO has evolved, and so have the responsibilities. Some believe a CISO must have technical knowledge and experience as a cybersecurity professional, others think leadership skills such as being able to communicate with boards are what matters most. To read this article in full, please click here
Do you have control of your information in each country, or does the government also have access (and control) of your data? There is no one-size-fits-all set of rules and therein lays the conundrum for CISOs, especially those whose customer base or digital infrastructure crosses political boundaries.
Theyre totally different tech and governance models. You cant govern what you cant see, Mogull said. His company helps CISOs regain control by discovering and inventorying rogue AI tools, assessing model risks, and monitoring LLM interactions for data leakage or prompt abuse. Theyre not. Harmonization is the only way forward.
In my role, I regularly engage with CISOs in all kinds of sectors, representatives at industry bodies, and experts at analyst houses. This gives me an invaluable macroview not only of how the last 12 months have affected organizations and what CISOs are thinking about, but also how the upcoming year is shaping up.
These are all very real situations for today’s CISO. One CISO cannot be everywhere all the time and engage meaningfully with all these groups. The Deputy CISO role isn’t just good for your team and your organization. Characteristics of a great deputy are simple… what makes you a great CISO?
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. Pam is an exceptional leader; dedicated to advancing women in the IT industry, and I’m so glad she’s now joined Cisco to work closely with our community of CISOs and offer advice and guidance based on her incredible experience. Pam Lindemeon.
This is why CISOs everywhere should be concerned. Government secrets: Classified information, military secrets, or other sensitive government information that can be used for espionage. CISOs should begin to familiarize themselves with these and evaluate their potential suitability for adoption.
There are a range of distinct roles/missions that hold the CISO title. The post Different Types of CISOs, Diverse Missions appeared first on Security Boulevard. Their ultimate goals are similar, but how they are positioned to do that varies.
Steinberg, who serves as a cybersecurity expert witness, a cybersecurity advisor to both businesses and governments, and a popular columnist, has led organizations within the cybersecurity industry for over two decades. Steinberg brings important insights about cybersecurity, privacy, and artificial intelligence to this community.”.
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
The post Cybersecurity Insights with Contrast CISO David Lindner | 04/18/25 appeared first on Security Boulevard. This situation demands we revisit our single points of failure and reinforces the need for contingency plans to ensure the continued stability of our security ecosystem.
The indictment of the SolarWinds CISO by the SEC served as a harsh wake-up call to the corporate world. The post What the Charges Against the SolarWinds CISO Mean for Security in 2024 appeared first on Security Boulevard.
In a presentation titled Digital governance for boards and senior executives: AI, cybersecurity, and privacy , she called on her extensive experience advising boards on these areas. Boards and senior executives face several questions about how best to approach the challenges of cybersecurity, privacy, and AI governance.
government. This means that thousands of government contractors will soon be required to implement structured processes for identifying, reporting, and mitigating vulnerabilities, aligning them with U.S. government and among the many contractors and vendors that support federal agencies."
Enterprises must secure AI agents, adopt proactive data governance, and deploy AI-based security platforms. FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. Collaborative efforts between security vendors, AI providers, and businesses will be key to counter automated, scalable attacks.
From a governance standpoint, Agnidipta Sarkar, Vice President of CISO Advisory at ColorTokens, emphasizes the critical role of regulatory frameworks. In his view, prolonged breach response times often indicate inadequate data governance and limited internal controls. Maybe the healthcare industry needs a similar regulation."
The post Cybersecurity Insights with Contrast CISO David Lindner | 03/14/25 appeared first on Security Boulevard. Clinging to outdated tools isnt just risky its a fast track to breach headlines. The choice is clear: Evolve to ADR or get left behind in the wreckage. Your move, tech world.
Some CISOs, at first, were reserved and said, ‘We’re not moving to the cloud.’ Nasser: It’s one of two things, when the legal department comes in, or the government comes in, and there’s a conversation around regulation and privacy. So if you’re a Microsoft shop, you’re on an Office 365 and a Windows 10 migration path.
On January 11, 2023, presiding United States District Judge William Orrick in San Francisco denied the motion of Joe Sullivan, the former CISO of Uber, for a judgment of acquittal. The post Former Uber CISO Conviction Affirmed by Trial Court appeared first on Security Boulevard.
A survey of IT security pros by cybersecurity firm BlackFog found that 70% of them said federal cases like that against SolarWinds' CISO hurt their opinion about the position, but some said they expected the boards of directors would take the issues of security more seriously.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. But theyre just one example of the additional attention governments around the world are giving to cyber risk. Exposure management can help meet the SEC requirements So what can a CISO do about this?
Eades explained how Anetacs founding team interviewed dozens of CISOs before launching a platform purpose-built to tackle this blind spot. Whether you’re a bank, a mining company, or an airline, this is a soft, underlying hygiene problem, says Tim Eades , CEO of Anetac. On-premise was ugly and hard. The cloud is just a mess.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners.
Learn what top CISOs are doing about it and how the conversation about NHI governance is evolving. RSAC 2025 revealed that AI agents are reshaping trust and identity. The post RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale appeared first on Security Boulevard.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content