Remove CISO Remove Information Security Remove InfoSec Remove Security Awareness
article thumbnail

Assessing Third-Party InfoSec Risk Management

Security Boulevard

Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. Third-party managers need to have insights into a variety of areas of information security, including.

InfoSec 96
article thumbnail

InfoSec Reviews in Project Management Workflows

Security Boulevard

I have attended numerous security conferences over the past several years, and at each one, I repeatedly hear about the importance of information security being incorporated within the planning and requirement analysis phase of the software development life cycle (SDLC). I agree – this is very important.

InfoSec 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology

Security Boulevard

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.

CISO 57
article thumbnail

Hi-5 With A CISO Andrea Szeiler, Transcom

Security Boulevard

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. She held Audit and Security leadership roles in leading European companies. In 2014 she founded WITSEC, a professional group of women working in IT and Information Security […].

CISO 52
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Prior to Mastercard, Abdullah was the chief information security officer at Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House. She is also the host of the Mastering Cyber podcast.

article thumbnail

The discomfort zone

Notice Bored

This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, Information Security Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. Documented! Maintained!

Risk 72
article thumbnail

New data could help CISOs quantify the value of a strong security culture

SC Magazine

Building a security awareness training program to develop a strong infosec culture requires time and money, and chief information security officers frequently try to make a case for such an investment by citing return on investment and other metrics of success. .” Christiaan Colen / CC BY-SA 2.0 ).

CISO 88