article thumbnail

Fake CISO Profiles on LinkedIn Target Fortune 500s

Krebs on Security

Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. Of course, Sites is not the real CISO of Chevron.

CISO 303
article thumbnail

How to Succeed As a New Chief Information Security Officer (CISO)

IT Security Guru

As cyber threats increase in frequency and complexity, organizations recognize the importance of having a Chief Information Security Officer (CISO) to protect their sensitive data and infrastructure. Having a clear idea of your challenges and working with a coach can help your CISO first 90 days and adjust more smoothly.

CISO 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

Information privacy and information security are two different things. Related: Tapping hidden pools of security talent Information privacy is the ability to control who (or what) can view or access information that is collected about you or your customers. still available for you to use.

article thumbnail

Unlocking the Prioritization Secrets of Top CISOs

Security Boulevard

In the chaotic and ever-changing world of cybersecurity, the line between a good Chief Information Security Officer (CISO) and a top-tier one often boils down to one crucial skill: ruthless prioritization. But how do these elite CISOs navigate the complex landscape of cyber threats and operational demands with such precision?

CISO 63
article thumbnail

Key Considerations When Hiring a Chief Information Security Officer

CyberSecurity Insiders

In today’s interconnected world, where cyber threats loom large, organizations must prioritize information security. One crucial step towards achieving robust cybersecurity is hiring a competent Chief Information Security Officer (CISO).

article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. The recent release of NIST's Cybersecurity Framework version 2.0

CISO 59
article thumbnail

Former Uber CISO Faces Prison Time For Mishandling Cyberattack: Justice, Scapegoating, or Both?

Joseph Steinberg

While there are State laws requiring the disclosure of various data breaches, there is no specific, clear, federal counterpart that details what, when, and how a CISO must handle such matters. Serving as a Chief Information Security Officer is a daunting task. Serving as a Chief Information Security Officer is a daunting task.

CISO 247