Remove CISO Remove Information Security Remove Webinar
article thumbnail

How to Become a CISO in 5 Steps

CyberSecurity Insiders

Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief Information Security Officer. If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. “The

CISO 112
article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

Many organizations are looking for trusted advisors , and this applies to our beloved domain of cyber/information security. If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams. Have Fun, Reduce Fail!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Top 5 trends every CISO needs to know for 2024

Security Boulevard

From the security challenges derived from the rise of artificial intelligence (AI) to the increasing legal liabilities placed on Chief Information Security Officers (CISOs), 2023 has been a busy year for the CISO community – and 2024 shows no signs of slowing down.

CISO 59
article thumbnail

These Roles Require Cybersecurity Training

CyberSecurity Insiders

Cybersecurity is a shared responsibility and since many companies do not have a formal security team in place, managing risk can be a responsibility for many other roles within the organization. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

In other words, it’s not just about implementing MFA to verify user trust, it’s about using phishing-resistant MFA with risk-based authentication , device posture checks and other security controls. TL,DR: Check out our on-demand webinar Your Zero Trust Roadmap , where we outline the five key steps to secure user access to apps.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The post Water utility CISO offers tips to stay secure as IT and OT converge appeared first on SC Media. Asaavedra32, CC BY-SA 3.0

CISO 82
article thumbnail

Build trust in your business: how ISO 27001 & 27701 certification can help

BH Consulting

More and more organisations are making information security a priority. At the same time, many companies are increasingly asking organisations they work with to show they handle all data securely. But how can organisations be confident in the security measures they put in place? Keep confidential data secure.